Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 2501-2525 di 3856 risultati
Pagina 101 di 155

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2025-38089 sunrpc: handle SVC_GARBAGE during svc auth processing as auth error18-02-20262501
MSRC Security UpdateCVE-2022-3509 Parsing issue in protobuf textformat18-02-20262502
MSRC Security UpdateCVE-2021-32292 An issue was discovered in json-c from 20200420 (post 0.14 unreleased code) through 0.15-20200726. A stack-buffer-overflow exists in the auxiliary sample program json_parse which is located in the function parseit.18-02-20262503
MSRC Security UpdateCVE-2024-42516 Apache HTTP Server: HTTP response splitting18-02-20262504
MSRC Security UpdateCVE-2024-20506 ClamAV Privilege Handling Escalation Vulnerability18-02-20262505
MSRC Security UpdateCVE-2024-58055 usb: gadget: f_tcm: Don't free command immediately18-02-20262506
MSRC Security UpdateCVE-2024-57834 media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread18-02-20262507
MSRC Security UpdateCVE-2025-38087 net/sched: fix use-after-free in taprio_dev_notifier18-02-20262508
MSRC Security UpdateCVE-2024-50035 ppp: fix ppp_async_encode() illegal access18-02-20262509
MSRC Security UpdateCVE-2024-21896 The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals namely Buffer.prototype.utf8Write the application can modify the result of path.resolve() which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued the permission model is an experimental feature of Node.js.18-02-20262510
MSRC Security UpdateCVE-2023-27535 An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However certain FTP settings such as CURLOPT_FTP_ACCOUNT CURLOPT_FTP_ALTERNATIVE_TO_USER CURLOPT_FTP_SSL_CCC and CURLOPT_USE_SSL were not included in the configuration match checks causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer potentially allowing unauthorized access to sensitive information.18-02-20262511
MSRC Security UpdateCVE-2024-58076 clk: qcom: gcc-sm6350: Add missing parent_map for two clocks18-02-20262512
MSRC Security UpdateCVE-2025-23048 Apache HTTP Server: mod_ssl access control bypass with session resumption18-02-20262513
MSRC Security UpdateCVE-2025-38088 powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap18-02-20262514
MSRC Security UpdateCVE-2025-27220 In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method.18-02-20262515
MSRC Security UpdateCVE-2024-56763 tracing: Prevent bad count for tracing_cpumask_write18-02-20262516
MSRC Security UpdateCVE-2024-43890 tracing: Fix overflow in get_free_elt()18-02-20262517
MSRC Security UpdateCVE-2024-21891 Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued the permission model is an experimental feature of Node.js.18-02-20262518
MSRC Security UpdateCVE-2024-39884 Apache HTTP Server: source code disclosure with handlers configured via AddType18-02-20262519
MSRC Security UpdateCVE-2024-47706 block bfq: fix possible UAF for bfqq->bic with merge chain18-02-20262520
MSRC Security UpdateCVE-2024-58052 drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table18-02-20262521
MSRC Security UpdateCVE-2025-6032 Podman: podman missing tls verification18-02-20262522
MSRC Security UpdateCVE-2024-24758 Proxy-Authorization header not cleared on cross-origin redirect in fetch in Undici18-02-20262523
MSRC Security UpdateCVE-2024-43914 md/raid5: avoid BUG_ON() while continue reshape after reassembling18-02-20262524
MSRC Security UpdateCVE-2024-56548 hfsplus: don't query the device logical block size multiple times18-02-20262525
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter