News & Sicurezza
Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.
966 risultati
CVE ID : CVE-2026-1893 Published : Feb. 11, 2026, 5:16 a.m. | 3 hours, 7 minutes ago Description : The Orbisius Random Name Generator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'btn_label' parameter in the 'orbisius_random_name_generator' shortcode in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Severity: 6.4 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Windows Notepad Vulnerability Allows Attackers to Execute Malicious Code Remotely Windows Notepad RCE Vulnerability Microsoft has patched a critical remote code execution (RCE) flaw in the Windows Notepad app, tracked as CVE-2026-20841, which could let attackers run malicious code ... Read more Published Date: Feb 11, 2026 (9 hours, 52 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2026-21533 CVE-2026-20841
Billions at Risk: Critical Windows Notepad Flaw Allows Remote Code Execution It is the quintessential “harmless” application: Windows Notepad. But a newly discovered vulnerability has turned this humble text editor into a potential gateway for hackers. In its February 2026 Pat ... Read more Published Date: Feb 11, 2026 (10 hours, 57 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2026-20841 CVE-2026-24858 CVE-2026-21509 CVE-2025-65108
Patch Panic: Microsoft Fixes 6 Active Zero-Days in Feb 2026 Update Microsoft has released its security update for February 2026, addressing 61 vulnerabilities across its ecosystem. But the headline isn’t the volume of patches—it’s the urgency. The tech giant is activ ... Read more Published Date: Feb 11, 2026 (11 hours, 48 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2026-21533 CVE-2026-21525 CVE-2026-21519 CVE-2026-21514 CVE-2026-21513 CVE-2026-21510 CVE-2026-24858 CVE-2026-21509 CVE-2024-49039 CVE-2024-30051
Null Byte Nightmare: Critical WPvivid Backup Flaw (CVSS 9.8) Exposes 800K WordPress Sites A critical security vulnerability has been discovered in WPvivid Backup, a popular WordPress plugin used by over 800,000 websites to safeguard their data. The flaw, tracked as CVE-2026-1357, carries a ... Read more Published Date: Feb 11, 2026 (12 hours, 11 minutes ago) Vulnerabilities has been mentioned in this article.
Windows Remote Desktop Services 0-Day Vulnerability Exploited in the Wild to Escalate Privileges Windows Remote Desktop Services 0-Day Vulnerability Microsoft has patched CVE-2026-21533, a zero-day elevation of privilege vulnerability in Windows Remote Desktop Services (RDS) that attackers are ex ... Read more Published Date: Feb 11, 2026 (12 hours, 20 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2026-21533
The Lucky Wheel Giveaway plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0.22 via the conditional_tags parameter. This is due to the plugin using PHP's eval() function on user-controlled input without proper validation or sanitization. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
CVE ID : CVE-2025-14541 Published : Feb. 11, 2026, 2:15 a.m. | 6 hours, 8 minutes ago Description : The Lucky Wheel Giveaway plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0.22 via the conditional_tags parameter. This is due to the plugin using PHP's eval() function on user-controlled input without proper validation or sanitization. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server. Severity: 7.2 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...
GitLab Patch Alert: High-Severity Web IDE Flaw Exposes Private Repos GitLab has released a sweeping security update for its Community (CE) and Enterprise (EE) editions, patching a high-severity vulnerability that could have allowed unauthenticated attackers to steal ac ... Read more Published Date: Feb 11, 2026 (12 hours, 59 minutes ago) Vulnerabilities has been mentioned in this article.
CVE ID : CVE-2025-13431 Published : Feb. 11, 2026, 2:15 a.m. | 6 hours, 8 minutes ago Description : The SlimStat Analytics plugin for WordPress is vulnerable to time-based SQL Injection via the ‘args’ parameter in all versions up to, and including, 5.3.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Severity: 6.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2026-1231 Published : Feb. 11, 2026, 2:15 a.m. | 6 hours, 8 minutes ago Description : The Beaver Builder Page Builder – Drag and Drop Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `js` Global Settings parameter in all versions up to, and including, 2.10.0.5 due to missing capability checks on save_global_settings() function and insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Custom-level access and above who have been granted beaver builder access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Severity: 6.4 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID : CVE-2025-15524 Published : Feb. 11, 2026, 2:15 a.m. | 6 hours, 8 minutes ago Description : The Gallery by FooGallery plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajax_get_gallery_info() function in all versions up to, and including, 3.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve metadata (name, image count, thumbnail URL) of private, draft, and password-protected galleries by enumerating gallery IDs. Severity: 4.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Pagina 27 di 81