Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

10601 risultati

VulnerabilitàAlta
CVE-2026-1345 (CVSS 7.3)

IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow an unauthenticated user to execute arbitrary commands as lower user privileges on the system due to improper validation of user supplied input.

NVD (NIST)01 apr 2026
VulnerabilitàAlta
CVE-2026-34871 - Mbed TLS Predictable Seed in PRNG

CVE ID :CVE-2026-34871 Published : April 1, 2026, 7:16 p.m. | 38 minutes ago Description :An issue was discovered in Mbed TLS before 3.6.6 and 4.x before 4.1.0 and TF-PSA-Crypto before 1.1.0. There is a Predictable Seed in a Pseudo-Random Number Generator (PRNG). Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-35000 - ChangeDetection.io < 0.54.7 SafeXPath3Parser Bypass Arbitrary File Read

CVE ID :CVE-2026-35000 Published : April 1, 2026, 7:16 p.m. | 38 minutes ago Description :ChangeDetection.io versions prior to 0.54.7 contain a protection bypass vulnerability in the SafeXPath3Parser implementation that allows attackers to read arbitrary local files by using unblocked XPath 3.0/3.1 functions such as json-doc() and similar file-access primitives. Attackers can exploit the incomplete blocklist of dangerous XPath functions to access sensitive data from the local filesystem. Severity: 7.1 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-34874 - Mbed TLS NULL Pointer Dereference Vulnerability

CVE ID :CVE-2026-34874 Published : April 1, 2026, 7:16 p.m. | 38 minutes ago Description :An issue was discovered in Mbed TLS through 3.6.5 and 4.x through 4.0.0. There is a NULL pointer dereference in distinguished name parsing that allows an attacker to write to address 0. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-25835 - Mbed TLS and TF-PSA-Crypto PRNG Seed Misuse Vulnerability

CVE ID :CVE-2026-25835 Published : April 1, 2026, 7:16 p.m. | 38 minutes ago Description :Mbed TLS before 3.6.6 and TF-PSA-Crypto before 1.1.0 misuse seeds in a Pseudo-Random Number Generator (PRNG). Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-25833 - "Mbed TLS X.509 Buffer Overflow"

CVE ID :CVE-2026-25833 Published : April 1, 2026, 7:16 p.m. | 38 minutes ago Description :Mbed TLS 3.5.0 to 3.6.5 fixed in 3.6.6 and 4.1.0 has a buffer overflow in the x509_inet_pton_ipv6() function Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-34751 - Payload has Unvalidated Input in Password Recovery Endpoints

CVE ID :CVE-2026-34751 Published : April 1, 2026, 6:16 p.m. | 1 hour, 38 minutes ago Description :Payload is a free and open source headless content management system. Prior to version 3.79.1 in @payloadcms/graphql and payload, a vulnerability in the password recovery flow could allow an unauthenticated attacker to perform actions on behalf of a user who initiates a password reset. This issue has been patched in version 3.79.1 for @payloadcms/graphql and payload. Severity: 9.1 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-34875 - Mbed TLS FFDH Key Export Buffer Overflow

CVE ID :CVE-2026-34875 Published : April 1, 2026, 6:16 p.m. | 1 hour, 38 minutes ago Description :An issue was discovered in Mbed TLS through 3.6.5 and TF-PSA-Crypto 1.0.0. A buffer overflow can occur in public key export for FFDH keys. Severity: 9.8 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-5199 - Cross Namespace Access via Batch Operation

CVE ID :CVE-2026-5199 Published : April 1, 2026, 6:16 p.m. | 1 hour, 38 minutes ago Description :A writer role user in an attacker-controlled namespace could signal, delete, and reset workflows or activities in a victim namespace on the same cluster. Exploitation requires the attacker to know or guess specific victim workflow ID(s) and, for signal operations, signal names. This was due to a bug introduced in Temporal Server v1.29.0 which inadvertently allowed an attacker to control the namespace name value instead of using the server's own trusted name value within the batch activity code. The batch activity validated the namespace ID but did not cross-check the namespace name against the worker's bound namespace, allowing the per-namespace worker's privileged credentials to operate on an arbitrary namespace. Exploitation requires a server configuration where internal components have cross-namespace authorization, such as deployment of the internal-frontend service or equivalent TLS-based authorization for internal identities. This vulnerability also impacted Temporal Cloud when the attacker and victim namespaces were on the same cell, with the same preconditions as self-hosted clusters. Severity: 2.3 | LOW Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-34236 - Auth0 PHP SDK Insufficient Entropy in Cookie Encryption

CVE ID :CVE-2026-34236 Published : April 1, 2026, 6:16 p.m. | 1 hour, 38 minutes ago Description :Auth0-PHP is a PHP SDK for Auth0 Authentication and Management APIs. From version 8.0.0 to before version 8.19.0, in applications built with the Auth0 PHP SDK, cookies are encrypted with insufficient entropy, which may result in threat actors brute-forcing the encryption key and forging session cookies. This issue has been patched in version 8.19.0. Severity: 8.2 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-34376 - PdfDing: Password-protected share bypass via direct serve endpoint

CVE ID :CVE-2026-34376 Published : April 1, 2026, 6:16 p.m. | 1 hour, 38 minutes ago Description :PdfDing is a selfhosted PDF manager, viewer and editor offering a seamless user experience on multiple devices. Prior to version 1.7.0, an access-control vulnerability allows unauthenticated users to retrieve password-protected shared PDFs by directly calling the file-serving endpoint without completing the password verification flow. This results in unauthorized access to confidential documents that users expected to be protected by a shared-link password. This issue has been patched in version 1.7.0. Severity: 7.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026
VulnerabilitàAlta
CVE-2026-34397 - himmelblau: NSS fake-primary group lookup reintroduces name collision risk

CVE ID :CVE-2026-34397 Published : April 1, 2026, 6:16 p.m. | 1 hour, 38 minutes ago Description :Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. From versions 2.0.0-alpha to before 2.3.9 and 3.0.0-alpha to before 3.1.1, there is a conditional local privilege escalation vulnerability in an edge-case naming collision. Only authenticated himmelblau users whose mapped CN/short name exactly matches a privileged local group name (e.g., "sudo", "wheel", "docker", "adm") can cause the NSS module to resolve that group name to their fake primary group. If the system uses NSS results for group-based authorization decisions (sudo, polkit, etc.), this can grant the attacker the privileges of that group. This issue has been patched in versions 2.3.9 and 3.1.1. Severity: 6.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE01 apr 2026

Pagina 137 di 884

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.