Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

10503 risultati

VulnerabilitàAlta
CVE-2026-35092 (CVSS 7.5)

A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading to a denial of service. This vulnerability specifically affects Corosync deployments configured to use totemudp/totemudpu mode.

NVD (NIST)01 apr 2026
VulnerabilitàAlta
CVE-2026-35091 (CVSS 8.2)

A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration.

NVD (NIST)01 apr 2026
VulnerabilitàAlta
CVE-2026-35094 - Libinput: libinput: information disclosure via dangling pointer in lua plugin handling

CVE ID :CVE-2026-35094 Published : April 1, 2026, 2:16 p.m. | 1 hour, 37 minutes ago Description :A flaw was found in libinput. An attacker capable of deploying a Lua plugin file in specific system directories can exploit a dangling pointer vulnerability. This occurs when a garbage collection cleanup function is called, leaving a pointer that can then be printed to system logs. This could potentially expose sensitive data if the memory location is re-used, leading to information disclosure. For this exploit to work, Lua plugins must be enabled in libinput and loaded by the compositor. Severity: 3.3 | LOW Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-34999 - OpenViking 0.2.5 < 0.2.14 Bot Proxy Endpoints Allow Unauthenticated Access

CVE ID :CVE-2026-34999 Published : April 1, 2026, 2:16 p.m. | 1 hour, 37 minutes ago Description :OpenViking versions 0.2.5 prior to 0.2.14 contain a missing authentication vulnerability in the bot proxy router that allows remote unauthenticated attackers to access protected bot proxy functionality by sending requests to the POST /bot/v1/chat and POST /bot/v1/chat/stream endpoints. Attackers can bypass authentication checks and interact directly with the upstream bot backend through the OpenViking proxy without providing valid credentials. Severity: 6.9 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-34430 - ByteDance DeerFlow LocalSandboxProvider Host Bash Escape

CVE ID :CVE-2026-34430 Published : April 1, 2026, 2:16 p.m. | 1 hour, 37 minutes ago Description :ByteDance Deer-Flow versions prior to commit 92c7a20 contain a sandbox escape vulnerability in bash tool handling that allows attackers to execute arbitrary commands on the host system by bypassing regex-based validation using shell features such as directory changes and relative paths. Attackers can exploit the incomplete shell semantics modeling to read and modify files outside the sandbox boundary and achieve arbitrary command execution through subprocess invocation with shell interpretation enabled. Severity: 8.6 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-30522 - SourceCodester Loan Management System Server-Side Validation Bypass

CVE ID :CVE-2026-30522 Published : April 1, 2026, 2:16 p.m. | 1 hour, 37 minutes ago Description :A Business Logic vulnerability exists in SourceCodester Loan Management System v1.0 due to improper server-side validation. The application allows administrators to create "Loan Plans" with specific penalty rates for overdue payments. While the frontend interface prevents users from entering negative numbers in the "Monthly Overdue Penalty" field, this constraint is not enforced on the backend. An authenticated attacker can bypass the client-side restriction by manipulating the HTTP POST request to submit a negative value for the penalty_rate. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-30287 - Deep Thought Industries ACE Scanner PDF Scanner File Overwrite Vulnerability

CVE ID :CVE-2026-30287 Published : April 1, 2026, 2:16 p.m. | 1 hour, 37 minutes ago Description :An arbitrary file overwrite vulnerability in Deep Thought Industries ACE Scanner PDF Scanner v1.4.5 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-30289 - Tinybeans Private Family Album App File Overwrite Vulnerability

CVE ID :CVE-2026-30289 Published : April 1, 2026, 2:16 p.m. | 1 hour, 37 minutes ago Description :An arbitrary file overwrite vulnerability in Tinybeans Private Family Album App v5.9.5-prod allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
News
NocoBase Critical Alert: Sandbox Escape Grants Attackers Root Access

NocoBase Critical Alert: Sandbox Escape Grants Attackers Root Access A critical vulnerability has been unearthed in NocoBase, the AI-powered platform designed for infinite extensibility. The flaw, tracked as CVE-2026-34156, carries a maximum CVSS score of 10, indicatin ... Read more Published Date: Apr 01, 2026 (1 day ago) Vulnerabilities has been mentioned in this article.

CVEfeed Newsroom01 apr 2026
VulnerabilitàAlta
CVE-2026-35092 - Corosync: corosync: denial of service via integer overflow in join message validation

CVE ID :CVE-2026-35092 Published : April 1, 2026, 1:18 p.m. | 35 minutes ago Description :A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading to a denial of service. This vulnerability specifically affects Corosync deployments configured to use totemudp/totemudpu mode. Severity: 7.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-35091 - Corosync: corosync: denial of service and information disclosure via crafted udp packet

CVE ID :CVE-2026-35091 Published : April 1, 2026, 1:18 p.m. | 35 minutes ago Description :A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration. Severity: 8.2 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-29014 - MetInfo CMS Unauthenticated PHP Code Injection RCE

CVE ID :CVE-2026-29014 Published : April 1, 2026, 1:16 p.m. | 37 minutes ago Description :MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code injection vulnerability that allows remote attackers to execute arbitrary code by sending crafted requests with malicious PHP code. Attackers can exploit insufficient input neutralization in the execution path to achieve remote code execution and gain full control over the affected server. Severity: 9.3 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026

Pagina 134 di 876

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.