Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

13165 risultati

VulnerabilitàAlta
CVE-2026-39355 - Genealogy is Missing Authorization in `TeamController::transferOwnership()` Allows Any Authenticated User to Hijack Any Team (Broken Access Control)

CVE ID :CVE-2026-39355 Published : April 7, 2026, 7:16 p.m. | 39 minutes ago Description :Genealogy is a family tree PHP application. Prior to 5.9.1, a critical broken access control vulnerability in the genealogy application allows any authenticated user to transfer ownership of arbitrary non-personal teams to themselves. This enables complete takeover of other users’ team workspaces and unrestricted access to all genealogy data associated with the compromised team. This vulnerability is fixed in 5.9.1. Severity: 9.9 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-39360 - RustFS has an authorization bypass in multipart UploadPartCopy enables cross-bucket object exfiltration

CVE ID :CVE-2026-39360 Published : April 7, 2026, 7:16 p.m. | 39 minutes ago Description :RustFS is a distributed object storage system built in Rust. Prior to alpha.90, RustFS contains a missing authorization check in the multipart copy path (UploadPartCopy). A low-privileged user who cannot read objects from a victim bucket can still exfiltrate victim objects by copying them into an attacker-controlled multipart upload and completing the upload. This breaks tenant isolation in multi-user / multi-tenant deployments. This vulnerability is fixed in alpha.90. Severity: 5.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-39345 - OrangeHRM Affected by Arbitrary File Read via Path Traversal in Email Template Loader

CVE ID :CVE-2026-39345 Published : April 7, 2026, 7:16 p.m. | 39 minutes ago Description :OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to 5.8, OrangeHRM Open Source fails to restrict email template file resolution to the intended plugins directory, allowing an authenticated actor who can influence the template path to read arbitrary local files. This vulnerability is fixed in 5.8.1. Severity: 4.6 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-39346 - OrangeHRM has Improper Access Control Allowing Access to Disabled Modules via URL Encoding

CVE ID :CVE-2026-39346 Published : April 7, 2026, 7:16 p.m. | 39 minutes ago Description :OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to 5.8, OrangeHRM Open Source allowed authenticated users to bypass disabled-module access controls via URL-encoded request paths and access functionality of modules disabled by an administrator. This vulnerability is fixed in 5.8.1. Severity: 5.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-39347 - OrangeHRM's Self‑Appraisal Submission of Admin Users Can Be Modified After Completion

CVE ID :CVE-2026-39347 Published : April 7, 2026, 7:16 p.m. | 39 minutes ago Description :OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to 5.8, OrangeHRM Open Source accepts changes to self-appraisal submissions for administrator users after those submissions have been marked completed, breaking integrity of finalized appraisal records. This vulnerability is fixed in 5.8.1. Severity: 5.1 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-39348 - OrangeHRM is Missing Authorization Checks in AbstractFileController Subclasses Expose Job Specification and Vacancy Attachments

CVE ID :CVE-2026-39348 Published : April 7, 2026, 7:16 p.m. | 39 minutes ago Description :OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to 5.8, OrangeHRM Open Source omits authorization on job specification and vacancy attachment download handlers, allowing authenticated low-privilege users to read attachments via direct reference to attachment identifiers. This vulnerability is fixed in 5.8.1. Severity: 5.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2025-71058 - Fortinet FortiDNS DNS Cache Poisoning

CVE ID :CVE-2025-71058 Published : April 7, 2026, 7:16 p.m. | 39 minutes ago Description :Dual DHCP DNS Server 8.01 improperly accepts and caches UDP DNS responses without validating that the response originates from a legitimate configured upstream DNS server. The implementation matches responses primarily by TXID and inserts results into the cache, enabling a remote attacker to inject forged responses and poison the DNS cache, potentially redirecting victims to attacker-controlled destinations. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-22711 - Stored XSS through system messages in WikiLove

CVE ID :CVE-2026-22711 Published : April 7, 2026, 7:16 p.m. | 39 minutes ago Description :Improper neutralization of alternate XSS syntax vulnerability in The Wikimedia Foundation Mediawiki - Wikilove Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Wikilove Extension: 1.43.7, 1.44.4, 1.45.2. Severity: 6.9 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-39365 - Vite has a Path Traversal in Optimized Deps `.map` Handling

CVE ID :CVE-2026-39365 Published : April 7, 2026, 7:13 p.m. | 42 minutes ago Description :Vite is a frontend tooling framework for JavaScript. From 6.0.0 to before 6.4.2, 7.3.2, and 8.0.5, the dev server’s handling of .map requests for optimized dependencies resolves file paths and calls readFile without restricting ../ segments in the URL. As a result, it is possible to bypass the server.fs.strict allow list and retrieve .map files located outside the project root, provided they can be parsed as valid source map JSON. This vulnerability is fixed in 6.4.2, 7.3.2, and 8.0.5. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-39364 - Vite has a `server.fs.deny` bypass with queries

CVE ID :CVE-2026-39364 Published : April 7, 2026, 7:12 p.m. | 43 minutes ago Description :Vite is a frontend tooling framework for JavaScript. From 7.1.0 to before 7.3.2 and 8.0.5, on the Vite dev server, files that should be blocked by server.fs.deny (e.g., .env, *.crt) can be retrieved with HTTP 200 responses when query parameters such as ?raw, ?import&raw, or ?import&url&inline are appended. This vulnerability is fixed in 7.3.2 and 8.0.5. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-39363 - Vite Affected by Arbitrary File Read via Vite Dev Server WebSocket

CVE ID :CVE-2026-39363 Published : April 7, 2026, 7:10 p.m. | 45 minutes ago Description :Vite is a frontend tooling framework for JavaScript. From 6.0.0 to before 6.4.2, 7.3.2, and 8.0.5, if it is possible to connect to the Vite dev server’s WebSocket without an Origin header, an attacker can invoke fetchModule via the custom WebSocket event vite:invoke and combine file://... with ?raw (or ?inline) to retrieve the contents of arbitrary files on the server as a JavaScript string (e.g., export default "..."). The access control enforced in the HTTP request path (such as server.fs.allow) is not applied to this WebSocket-based execution path. This vulnerability is fixed in 6.4.2, 7.3.2, and 8.0.5. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-39322 - PolarLearn: Any password authenticates banned accounts and grants API access

CVE ID :CVE-2026-39322 Published : April 7, 2026, 7:03 p.m. | 52 minutes ago Description :PolarLearn is a free and open-source learning program. In 0-PRERELEASE-15 and earlier, POST /api/v1/auth/sign-in creates a valid session for banned accounts before verifying the supplied password. That session is then accepted across authenticated /api routes, enabling account data access and authenticated actions as the banned user. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026

Pagina 263 di 1098

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.