Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 3126-3150 di 3854 risultati
Pagina 126 di 155

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2025-40264 be2net: pass wrb_params in case of OS2BMC07-01-20263126
MSRC Security UpdateCVE-2025-40248 vsock: Ignore signal/timeout on connect() if already established07-01-20263127
MSRC Security UpdateCVE-2025-40252 net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end()07-01-20263128
MSRC Security UpdateCVE-2025-40259 scsi: sg: Do not sleep in atomic context07-01-20263129
MSRC Security UpdateCVE-2025-40254 net: openvswitch: remove never-working support for setting nsh fields07-01-20263130
MSRC Security UpdateCVE-2025-40258 mptcp: fix race condition in mptcp_schedule_work()07-01-20263131
MSRC Security UpdateCVE-2025-40257 mptcp: fix a race in mptcp_pm_del_add_timer()07-01-20263132
MSRC Security UpdateCVE-2025-40261 nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl()07-01-20263133
MSRC Security UpdateCVE-2025-39805 net: macb: fix unregister_netdev call order in macb_remove()07-01-20263134
MSRC Security UpdateCVE-2025-38643 wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac()07-01-20263135
MSRC Security UpdateCVE-2025-38627 f2fs: compress: fix UAF of f2fs_inode_info in f2fs_free_dic07-01-20263136
MSRC Security UpdateCVE-2025-38556 HID: core: Harden s32ton() against conversion to 0 bits07-01-20263137
MSRC Security UpdateCVE-2025-22105 bonding: check xdp prog when set bond mode07-01-20263138
MSRC Security UpdateCVE-2025-62224 Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability07-01-20263139
MSRC Security UpdateCVE-2025-4432 Ring: some aes functions may panic when overflow checking is enabled in ring07-01-20263140
MSRC Security UpdateCVE-2025-1744 Out-of-bounds Write in radare207-01-20263141
MSRC Security UpdateCVE-2025-68973 In GnuPG through 2.4.8, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)06-01-20263142
MSRC Security UpdateCVE-2025-68972 In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.06-01-20263143
MSRC Security UpdateCVE-2025-68476 KEDA has Arbitrary File Read via Insufficient Path Validation in HashiCorp Vault Service Account Credential06-01-20263144
MSRC Security UpdateCVE-2025-11964 OOBW in utf_16le_to_utf_8_truncated() in libpcap06-01-20263145
MSRC Security UpdateCVE-2025-11961 OOBR and OOBW in pcap_ether_aton() in libpcap06-01-20263146
MSRC Security UpdateCVE-2025-61594 URI Credential Leakage Bypass over CVE-2025-2722105-01-20263147
MSRC Security UpdateCVE-2025-62408 c-ares has a Use After Free vulnerability when connection is cleaned up after error05-01-20263148
MSRC Security UpdateCVE-2025-3001 PyTorch torch.lstm_cell memory corruption05-01-20263149
MSRC Security UpdateCVE-2000-0006 strace allows local users to read arbitrary files via memory mapped file names.04-01-20263150
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter