Alerts & Advisory dai CERTs

Gli ultimi avvisi di sicurezza dai Computer Emergency Response Teams governativi e non-governativi rilevanti del mondo cybersec

Mostrando 1026-1050 di 3834 risultati
Pagina 42 di 154

Avvisi di Sicurezza

CERT Alert Data #
MSRC Security UpdateCVE-2026-21528 Azure IoT Explorer Information Disclosure Vulnerability19-02-20261026
MSRC Security UpdateCVE-2026-21535 Microsoft Teams Information Disclosure Vulnerability19-02-20261027
MSRC Security UpdateChromium: CVE-2026-2322 Heap buffer overflow in Codecs19-02-20261028
MSRC Security UpdateChromium: CVE-2026-2319 Race in DevTools19-02-20261029
MSRC Security UpdateChromium: CVE-2026-2316 Insufficient policy enforcement in Frames19-02-20261030
MSRC Security UpdateChromium: CVE-2026-2314 Heap buffer overflow in Codecs19-02-20261031
MSRC Security UpdateCVE-2024-40635 containerd has an integer overflow in User ID handling19-02-20261032
MSRC Security UpdateCVE-2025-2295 Potential iSCSI R2T PDU Vulnerability18-02-20261033
MSRC Security UpdateCVE-2023-5764 Ansible: template injection18-02-20261034
MSRC Security UpdateCVE-2023-6864 Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.18-02-20261035
MSRC Security UpdateCVE-2021-32714 Integer Overflow in Chunked Transfer-Encoding18-02-20261036
MSRC Security UpdateCVE-2017-15042 An unintended cleartext issue exists in Go before 1.8.4 and 1.9.x before 1.9.1. RFC 4954 requires that, during SMTP, the PLAIN auth scheme must only be used on network connections secured with TLS. The original implementation of smtp.PlainAuth in Go 1.0 enforced this requirement, and it was documented to do so. In 2013, upstream issue #5184, this was changed so that the server may decide whether PLAIN is acceptable. The result is that if you set up a man-in-the-middle SMTP server that doesn't advertise STARTTLS and does advertise that PLAIN auth is OK, the smtp.PlainAuth implementation sends the username and password.18-02-20261037
MSRC Security UpdateCVE-2023-6856 The WebGL `DrawElementsInstanced` method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver. This issue could allow an attacker to perform remote code execution and sandbox escape. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.18-02-20261038
MSRC Security UpdateCVE-2025-24855 numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal.18-02-20261039
MSRC Security UpdateCVE-2025-71119 powerpc/kexec: Enable SMT before waking offline CPUs18-02-20261040
MSRC Security UpdateCVE-2025-71118 ACPICA: Avoid walking the Namespace if start_node is NULL18-02-20261041
MSRC Security UpdateCVE-2025-71111 hwmon: (w83791d) Convert macros to functions to avoid TOCTOU18-02-20261042
MSRC Security UpdateCVE-2025-71136 media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status()18-02-20261043
MSRC Security UpdateCVE-2025-71116 libceph: make decode_pool() more resilient against corrupted osdmaps18-02-20261044
MSRC Security UpdateCVE-2026-0861 Integer overflow in memalign leads to heap corruption18-02-20261045
MSRC Security UpdateCVE-2017-1000097 On Darwin, user's trust preferences for root certificates were not honored. If the user had a root certificate loaded in their Keychain that was explicitly not trusted, a Go program would still verify a connection using that root certificate.18-02-20261046
MSRC Security UpdateCVE-2025-68780 sched/deadline: only set free_cpus for online runqueues18-02-20261047
MSRC Security UpdateCVE-2025-71069 f2fs: invalidate dentry cache on failed whiteout creation18-02-20261048
MSRC Security UpdateCVE-2025-68794 iomap: adjust read range correctly for non-block-aligned positions18-02-20261049
MSRC Security UpdateCVE-2025-71094 net: usb: asix: validate PHY address before use18-02-20261050
Nessun risultato trovato

Prova a modificare i termini di ricerca

Le Fonti

Questa selezione di advisories è una lista ordinata per data di tutte le pubblicazioni dalle seguenti fonti:

US-CERT CISA
Twitter
Center of Internet Security
Twitter
FR-CERT Alertes
Twitter
FR-CERT Avis
Twitter
EU-ENISA Publications
Twitter
Google TAG
Microsoft Security
Unit42
Twitter
MSRC Security Update
Twitter
CERT-Bund DE
Twitter
CSIRT IT
Twitter
Consiglio Federale CH
Twitter