Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 2576-2600 di 3856 risultati
Pagina 104 di 155

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2025-21722 nilfs2: do not force clear folio if buffer is referenced18-02-20262576
MSRC Security UpdateCVE-2019-10638 In the Linux kernel before 5.1.7 a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g. UDP and ICMP). When such traffic is sent to multiple destination IP addresses it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.18-02-20262577
MSRC Security UpdateCVE-2024-44946 kcm: Serialise kcm_sendmsg() for the same socket.18-02-20262578
MSRC Security UpdateCVE-2025-5318 Libssh: out-of-bounds read in sftp_handle()18-02-20262579
MSRC Security UpdateCVE-2025-1220 Null byte termination in hostnames18-02-20262580
MSRC Security UpdateCVE-2024-40979 wifi: ath12k: fix kernel crash during resume18-02-20262581
MSRC Security UpdateCVE-2023-52434 smb: client: fix potential OOBs in smb2_parse_contexts()18-02-20262582
MSRC Security UpdateCVE-2016-9840 inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic18-02-20262583
MSRC Security UpdateCVE-2024-45310 runc can be confused to create empty files/directories on the host18-02-20262584
MSRC Security UpdateCVE-2025-49812 Apache HTTP Server: mod_ssl TLS upgrade attack18-02-20262585
MSRC Security UpdateCVE-2025-21814 ptp: Ensure info->enable callback is always set18-02-20262586
MSRC Security UpdateCVE-2023-27536 An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.18-02-20262587
MSRC Security UpdateCVE-2024-26582 net: tls: fix use-after-free with partial reads and async decrypt18-02-20262588
MSRC Security UpdateCVE-2023-46853 In Memcached before 1.6.22 an off-by-one error exists when processing proxy requests in proxy mode if \n is used instead of \r\n.18-02-20262589
MSRC Security UpdateCVE-2024-11584 cloud-init through 25.1.2 includes the systemd socket unit cloud-init-hotplugd.socket with default SocketMode that grants 0666 permissions, making it world-writable. This is used for the "/run/cloud-init/hook-hotplug-cmd" FIFO. An unprivileged user could trigger hotplug-hook commands.18-02-20262590
MSRC Security UpdateCVE-2024-26928 smb: client: fix potential UAF in cifs_debug_files_proc_show()18-02-20262591
MSRC Security UpdateCVE-2025-21727 padata: fix UAF in padata_reorder18-02-20262592
MSRC Security UpdateCVE-2024-38473 Apache HTTP Server proxy encoding problem18-02-20262593
MSRC Security UpdateCVE-2025-39713 media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()18-02-20262594
MSRC Security UpdateCVE-2024-26585 tls: fix race between tx work scheduling and socket close18-02-20262595
MSRC Security UpdateCVE-2023-46852 In Memcached before 1.6.22 a buffer overflow exists when processing multiget requests in proxy mode if there are many spaces after the "get" substring.18-02-20262596
MSRC Security UpdateCVE-2025-21820 tty: xilinx_uartps: split sysrq handling18-02-20262597
MSRC Security UpdateCVE-2025-53020 Apache HTTP Server: HTTP/2 DoS by Memory Increase18-02-20262598
MSRC Security UpdateCVE-2024-49907 drm/amd/display: Check null pointers before using dc->clk_mgr18-02-20262599
MSRC Security UpdateCVE-2025-21731 nbd: don't allow reconnect after disconnect18-02-20262600
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter