Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 751-775 di 3834 risultati
Pagina 31 di 154

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2025-68808 media: vidtv: initialize local pointers upon transfer of memory ownership21-02-2026751
MSRC Security UpdateCVE-2025-68753 ALSA: firewire-motu: add bounds check in put_user loop for DSP events21-02-2026752
MSRC Security UpdateCVE-2025-68755 staging: most: remove broken i2c driver21-02-2026753
MSRC Security UpdateCVE-2025-68781 usb: phy: fsl-usb: Fix use-after-free in delayed work during device removal21-02-2026754
MSRC Security UpdateCVE-2022-22576 An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S) IMAP(S) POP3(S) and LDAP(S) (openldap only).21-02-2026755
MSRC Security UpdateCVE-2025-34468 libcoap Stack-Based Buffer Overflow in Address Resolution DoS or Potential RCE21-02-2026756
MSRC Security UpdateCVE-2025-66382 In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.21-02-2026757
MSRC Security UpdateCVE-2025-68823 ublk: fix deadlock when reading partition table21-02-2026758
MSRC Security UpdateCVE-2022-32206 curl < 7.84.0 supports "chained" HTTP compression algorithms meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb" makingcurl end up spending enormous amounts of allocated heap memory or trying toand returning out of memory errors.21-02-2026759
MSRC Security UpdateCVE-2022-27782 libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However several TLS andSSH settings were left out from the configuration match checks making themmatch too easily.21-02-2026760
MSRC Security UpdateCVE-2026-22702 virtualenv Has TOCTOU Vulnerabilities in Directory Creation21-02-2026761
MSRC Security UpdateCVE-2026-21860 Werkzeug safe_join() allows Windows special device names with compound extensions21-02-2026762
MSRC Security UpdateCVE-2025-40289 drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM21-02-2026763
MSRC Security UpdateCVE-2025-65637 A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters.21-02-2026764
MSRC Security UpdateCVE-2025-21839 KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop21-02-2026765
MSRC Security UpdateCVE-2025-15444 Crypt::Sodium::XS module versions prior to 0.000042, for Perl, include a vulnerable version of libsodium21-02-2026766
MSRC Security UpdateCVE-2025-48637 In multiple functions of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.21-02-2026767
MSRC Security UpdateCVE-2023-46847 Squid: denial of service in http digest authentication21-02-2026768
MSRC Security UpdateCVE-2025-2953 PyTorch torch.mkldnn_max_pool2d denial of service21-02-2026769
MSRC Security UpdateCVE-2023-5824 Squid: dos against http and https21-02-2026770
MSRC Security UpdateCVE-2025-14819 OpenSSL partial chain store policy bypass21-02-2026771
MSRC Security UpdateCVE-2025-12084 Quadratic complexity in node ID cache clearing21-02-2026772
MSRC Security UpdateCVE-2025-15079 libssh global known_hosts override21-02-2026773
MSRC Security UpdateCVE-2025-61727 Improper application of excluded DNS name constraints when verifying wildcard names in crypto/x50921-02-2026774
MSRC Security UpdateCVE-2020-36426 An issue was discovered in Arm Mbed TLS before 2.24.0. mbedtls_x509_crl_parse_der has a buffer over-read (of one byte).21-02-2026775
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter