Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

10245 risultati

VulnerabilitàAlta
CVE-2026-5251 - z-9527 admin User Update Endpoint user.js dynamically-determined object attributes

CVE ID :CVE-2026-5251 Published : April 1, 2026, 3:15 a.m. | 38 minutes ago Description :A vulnerability was identified in z-9527 admin 1.0/2.0. This impacts an unknown function of the file /server/routes/user.js of the component User Update Endpoint. Such manipulation of the argument isAdmin with the input 1 leads to dynamically-determined object attributes. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. Severity: 6.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
News
TrueChaos: The TrueConf Zero-Day That Turned Secure Updates Into a Government Espionage Backdoor

TrueChaos: The TrueConf Zero-Day That Turned Secure Updates Into a Government Espionage Backdoor A trusted communication tool has been turned into a weapon of mass malware distribution. Check Point Research has uncovered a critical zero-day vulnerability in the TrueConf video conferencing platfor ... Read more Published Date: Apr 01, 2026 (1 day, 6 hours ago) Vulnerabilities has been mentioned in this article.

CVEfeed Newsroom01 apr 2026
VulnerabilitàAlta
CVE-2026-3774 - Self-Modifications Affecting Altered Printing and Redaction in Foxit PDF Editor

CVE ID :CVE-2026-3774 Published : April 1, 2026, 2:16 a.m. | 1 hour, 38 minutes ago Description :The application allows PDF JavaScript and document/print actions (such as WillPrint/DidPrint) to update form fields, annotations, or optional content groups (OCGs) immediately before or after redaction, encryption, or printing. These script‑driven updates are not fully covered by the existing redaction, encryption, and printing logic, which, under specific document structures and user workflows, may cause a small amount of sensitive content to remain unremoved or unencrypted as expected, or result in printed output that slightly differs from what was reviewed on screen. Severity: 4.7 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-3775 - Foxit PDF Editor/Reader Update Service Uncontrolled Search Path Element Local Privilege Escalation Vulnerability

CVE ID :CVE-2026-3775 Published : April 1, 2026, 2:16 a.m. | 1 hour, 38 minutes ago Description :The application's update service, when checking for updates, loads certain system libraries from a search path that includes directories writable by low‑privileged users and is not strictly restricted to trusted system locations. Because these libraries may be resolved and loaded from user‑writable locations, a local attacker can place a malicious library there and have it loaded with SYSTEM privileges, resulting in local privilege escalation and arbitrary code execution. Severity: 7.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-3776 - Null pointer dereference in Foxit PDF Editor/Reader when accessing stamp annotation

CVE ID :CVE-2026-3776 Published : April 1, 2026, 2:16 a.m. | 1 hour, 38 minutes ago Description :The application does not validate the presence of required appearance (AP) data before accessing stamp annotation resources. When a PDF contains a stamp annotation missing its AP entry, the code continues to dereference the associated object without a prior null or validity check, which allows a crafted document to trigger a null pointer dereference and crash the application, resulting in denial of service. Severity: 5.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-3780 - Foxit PDF Editor/Reader Installer Uncontrolled Search Path Privilege Escalation

CVE ID :CVE-2026-3780 Published : April 1, 2026, 2:16 a.m. | 1 hour, 38 minutes ago Description :The application's installer runs with elevated privileges but resolves system executables and DLLs using untrusted search paths that can include user-writable directories, allowing a local attacker to place malicious binaries with the same names and have them loaded or executed instead of the legitimate system files, resulting in local privilege escalation. Severity: 7.3 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-3778 - Stack exhaustion caused by cyclic references in Foxit PDF Editor/Reader

CVE ID :CVE-2026-3778 Published : April 1, 2026, 2:16 a.m. | 1 hour, 38 minutes ago Description :The application does not detect or guard against cyclic PDF object references while handling JavaScript in PDF. When pages and annotations are crafted that reference each other in a loop, passing the document to APIs (e.g., SOAP) that perform deep traversal can cause uncontrolled recursion, stack exhaustion, and application crashes. Severity: 6.2 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-3779 - Foxit PDF Editor/Reader List Box Calculate Array Use-After-Free Vulnerability

CVE ID :CVE-2026-3779 Published : April 1, 2026, 2:16 a.m. | 1 hour, 38 minutes ago Description :The application's list box calculate array logic keeps stale references to page or form objects after they are deleted or re-created, which allows crafted documents to trigger a use-after-free when the calculation runs and can potentially lead to arbitrary code execution. Severity: 7.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-3777 - Use after free of view cache in Foxit PDF Editor/Reader

CVE ID :CVE-2026-3777 Published : April 1, 2026, 2:16 a.m. | 1 hour, 38 minutes ago Description :The application does not properly validate the lifetime and validity of internal view cache pointers after JavaScript changes the document zoom and page state. When a script modifies the zoom property and then triggers a page change, the original view object may be destroyed while stale pointers are still kept and later dereferenced, which under crafted JavaScript and document structures can lead to a use-after-free condition and potentially allow arbitrary code execution. Severity: 5.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-4947 - Insecure Direct Object Reference (IDOR) Leading to Signature Forgery in Foxit eSign

CVE ID :CVE-2026-4947 Published : April 1, 2026, 2:16 a.m. | 1 hour, 38 minutes ago Description :Addressed a potential insecure direct object reference (IDOR) vulnerability in the signing invitation acceptance process. Under certain conditions, this issue could have allowed an attacker to access or modify unauthorized resources by manipulating user-supplied object identifiers, potentially leading to forged signatures and compromising the integrity and authenticity of documents undergoing the signing process. The issue was caused by insufficient authorization validation on referenced resources during request processing. Severity: 7.1 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
News
Vim Modeline Vulnerability: How a Crafted File Can Hijack Your System

Vim Modeline Vulnerability: How a Crafted File Can Hijack Your System The Vim project has issued a critical security advisory regarding a high-severity vulnerability that could allow attackers to execute arbitrary commands on a victim’s machine. Designated as CVE-2026-3 ... Read more Published Date: Apr 01, 2026 (1 day, 7 hours ago) Vulnerabilities has been mentioned in this article.

CVEfeed Newsroom01 apr 2026
VulnerabilitàAlta
CVE-2026-5249 - gougucms Record Endpoint record.html cross site scripting

CVE ID :CVE-2026-5249 Published : April 1, 2026, 2:16 a.m. | 1 hour, 38 minutes ago Description :A vulnerability was found in gougucms 4.08.18. This impacts an unknown function of the file \gougucms-master\app\admin\view\user\record.html of the component Record Endpoint. Performing a manipulation of the argument value.content results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. Severity: 5.1 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026

Pagina 120 di 854

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.