Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

13144 risultati

VulnerabilitàAlta
CVE-2026-1342 - Security Vulnerabilities have been found in IBM Verify Identity Access and IBM Security Verify Access

CVE ID :CVE-2026-1342 Published : April 7, 2026, 11:21 p.m. | 34 minutes ago Description :IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally authenticated user to execute malicious scripts from outside of its control sphere. Severity: 8.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-5747 - Out-of-bounds Write in Firecracker virtio-pci Transport

CVE ID :CVE-2026-5747 Published : April 8, 2026, 12:16 a.m. | 3 hours, 40 minutes ago Description :An out-of-bounds write issue in the virtio PCI transport in Amazon Firecracker 1.13.0 through 1.14.3 and 1.15.0 on x86_64 and aarch64 might allow a local guest user with root privileges to crash the Firecracker VMM process or potentially execute arbitrary code on the host via modification of virtio queue configuration registers after device activation. Achieving code execution on the host requires additional preconditions, such as the use of a custom guest kernel or specific snapshot configurations. To remediate this, users should upgrade to Firecracker 1.14.4 or 1.15.1 and later. Severity: 8.7 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-4656 - Apache HTTP Server Remote Code Execution Vulnerability

CVE ID :CVE-2026-4656 Published : April 7, 2026, 11:16 p.m. | 2 hours, 39 minutes ago Description :Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-39936 - Stored XSS in Score due to usage of non-reserved data attributes

CVE ID :CVE-2026-39936 Published : April 7, 2026, 11:16 p.m. | 2 hours, 39 minutes ago Description :Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in The Wikimedia Foundation Mediawiki - Score Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Score Extension. Severity: 6.9 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-39935 - XSS-via-i18n in localised wiki names

CVE ID :CVE-2026-39935 Published : April 7, 2026, 11:16 p.m. | 39 minutes ago Description :Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in The Wikimedia Foundation Mediawiki - CampaignEvents Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - CampaignEvents Extension: 1.43.7, 1.44.4, 1.45.2. Severity: 6.9 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2025-20628 - Insufficient granularity of access control for Remote Connector Servers in client mode

CVE ID :CVE-2025-20628 Published : April 7, 2026, 11:16 p.m. | 39 minutes ago Description :An insufficient granularity of access control vulnerability exists in PingIDM (formerly ForgeRock Identity Management) where administrators cannot properly configure access rules for Remote Connector Servers (RCS) running in client mode. This means attackers can spoof a client-mode RCS (if one exists) to intercept and/or modify an identity’s security-relevant properties, such as passwords and account recovery information. This issue is exploitable only when an RCS is configured to run in client mode. Severity: 6.9 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-39937 - Global vanishing does not completely remove user email

CVE ID :CVE-2026-39937 Published : April 7, 2026, 10:16 p.m. | 1 hour, 39 minutes ago Description :Improper removal of sensitive information before storage or transfer vulnerability in The Wikimedia Foundation Mediawiki - CentralAuth Extension allows Resource Leak Exposure.This issue affects non release branches. Severity: 8.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-39934 - Growth Experiments ReassignMenteesJob runs as an infinite loop

CVE ID :CVE-2026-39934 Published : April 7, 2026, 10:16 p.m. | 1 hour, 39 minutes ago Description :Loop with unreachable exit condition ('infinite loop') vulnerability in The Wikimedia Foundation Mediawiki - GrowthExperiments Extension allows Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions.This issue affects Mediawiki - GrowthExperiments Extension: 1.45.2, 1.44.4, 1.43.7. Severity: 6.9 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-39933 - Multiple XSS vulnerabilities in GlobalWatchlist

CVE ID :CVE-2026-39933 Published : April 7, 2026, 10:16 p.m. | 1 hour, 39 minutes ago Description :Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in The Wikimedia Foundation Mediawiki - GlobalWatchlist Extension allows Cross-Site Scripting (XSS).This issue affects non release branches. Severity: 10.0 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-35406 - Aardvark-dns has incorrect error handling for malformed tcp packets

CVE ID :CVE-2026-35406 Published : April 7, 2026, 10:16 p.m. | 1 hour, 39 minutes ago Description :Aardvark-dns is an authoritative dns server for A/AAAA container records. From 1.16.0 to 1.17.0, a truncated TCP DNS query followed by a connection reset causes aardvark-dns to enter an unrecoverable infinite error loop at 100% CPU. This vulnerability is fixed in 1.17.1. Severity: 6.2 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-39847 - Emmett has a path traversal in internal assets handler

CVE ID :CVE-2026-39847 Published : April 7, 2026, 10:16 p.m. | 1 hour, 39 minutes ago Description :Emmett is a full-stack Python web framework designed with simplicity. From 2.5.0 to before 2.8.1, the RSGI static handler for Emmett's internal assets (/__emmett__ paths) is vulnerable to path traversal attacks. An attacker can use ../ sequences (eg /__emmett__/../rsgi/handlers.py) to read arbitrary files outside the assets directory. This vulnerability is fixed in 2.8.1. Severity: 9.1 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-39846 - SiYuan affected by Remote Code Execution in the Electron desktop client via stored XSS in synced table captions

CVE ID :CVE-2026-39846 Published : April 7, 2026, 10:16 p.m. | 1 hour, 39 minutes ago Description :SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious note synced to another user can trigger remote code execution in the SiYuan Electron desktop client. The root cause is that table caption content is stored without safe escaping and later unescaped into rendered HTML, creating a stored XSS sink. Because the desktop renderer runs with nodeIntegration enabled and contextIsolation disabled, attacker-controlled JavaScript executes with access to Node.js APIs. In practice, an attacker can import a crafted note into a synced workspace, wait for the victim to sync, and achieve code execution when the victim opens the note. This vulnerability is fixed in 3.6.4. Severity: 9.0 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026

Pagina 257 di 1096

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.