Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

13417 risultati

VulnerabilitàAlta
CVE-2026-35607 - File Browser: Proxy auth auto-provisioned users inherit Execute permission and Commands

CVE ID :CVE-2026-35607 Published : April 7, 2026, 5:16 p.m. | 39 minutes ago Description :File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to 2.63.1, the fix in commit b6a4fb1 ("self-registered users don't get execute perms") stripped Execute permission and Commands from users created via the signup handler. The same fix was not applied to the proxy auth handler. Users auto-created on first successful proxy-auth login are granted execution capabilities from global defaults, even though the signup path was explicitly changed to prevent execution rights from being inherited by automatically provisioned accounts. This vulnerability is fixed in 2.63.1. Severity: 8.1 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-35606 - File Browser discloses text file content via /api/resources endpoint bypassing Perm.Download check

CVE ID :CVE-2026-35606 Published : April 7, 2026, 5:16 p.m. | 39 minutes ago Description :File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to 2.63.1, the resourceGetHandler in http/resource.go returns full text file content without checking the Perm.Download permission flag. All three other content-serving endpoints (/api/raw, /api/preview, /api/subtitle) correctly verify this permission before serving content. A user with download: false can read any text file within their scope through two bypass paths. This vulnerability is fixed in 2.63.1. Severity: 5.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-35604 - File Browser share links remain accessible after Share/Download permissions are revoked

CVE ID :CVE-2026-35604 Published : April 7, 2026, 5:16 p.m. | 39 minutes ago Description :File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to 2.63.1, when an admin revokes a user's Share and Download permissions, existing share links created by that user remain fully accessible to unauthenticated users. The public share download handler does not re-check the share owner's current permissions. This vulnerability is fixed in 2.63.1. Severity: 8.2 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàCritica
CVE-2026-23696 (CVSS 9.9)

Windmill CE and EE versions 1.276.0 through 1.603.2 contain an SQL injection vulnerability in the folder ownership management functionality that allows authenticated attackers to inject SQL through the owner parameter. An attacker can use the injection to read sensitive data such as the JWT signing secret and administrative user identifiers, forge an administrative token, and then execute arbitrary code via the workflow execution endpoints.

NVD (NIST)07 apr 2026
VulnerabilitàAlta
CVE-2026-22683 (CVSS 8.8)

Windmill versions 1.56.0 through 1.614.0 contain a missing authorization vulnerability that allows users with the Operator role to perform prohibited entity creation and modification actions via the backend API. Although Operators are documented and priced as unable to create or modify entities, the API does not enforce the Operator restriction on workspace endpoints, allowing an Operator to create and update scripts, flows, apps, and raw_apps. Since Operators can also execute scripts via the jobs API, this allows direct privilege escalation to remote code execution within the Windmill deployment. This vulnerability has existed since the introduction of the Operator role in version 1.56.0.

NVD (NIST)07 apr 2026
VulnerabilitàAlta
CVE-2025-14821 (CVSS 7.8)

A flaw was found in libssh. This vulnerability allows local man-in-the-middle attacks, security downgrades of SSH (Secure Shell) connections, and manipulation of trusted host information, posing a significant risk to the confidentiality, integrity, and availability of SSH communications via an insecure default configuration on Windows systems where the library automatically loads configuration files from the C:\etc directory, which can be created and modified by unprivileged local users.

NVD (NIST)07 apr 2026
News
CVE-2025-59528: Flowise CustomMCP Code Injection RCE

CVE-2025-59528: Flowise CustomMCP Code Injection RCE April 7, 2026Status: Actively exploited | CVSS: 10.0 (Critical) | EPSS: 99.25% | Exposure: 12,000+ internet-facing instancesVulnerability SummaryCVE-2025-59528 affects Flowise, a drag & drop interface ... Read more Published Date: Apr 07, 2026 (23 hours, 49 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2026-35616 CVE-2025-59528 CVE-2025-8943 CVE-2025-26319

CVEfeed Newsroom07 apr 2026
News
Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign

Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromised insecure MikroTik and TP-Link routers and modified their settings to turn the ... Read more Published Date: Apr 07, 2026 (1 day ago) Vulnerabilities has been mentioned in this article. CVE-2026-3055 CVE-2025-53521 CVE-2023-50224

CVEfeed Newsroom07 apr 2026
News
Russian hackers hijack internet traffic using vulnerable routers

Russian hackers hijack internet traffic using vulnerable routers The Russian state cyber group APT28 has been compromising routers to hijack web traffic and spy on victims, the UK’s The National Cyber Security Centre (NCSC) has warned. Attackers are exploiting vuln ... Read more Published Date: Apr 07, 2026 (22 hours, 37 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2026-35616 CVE-2026-20093 CVE-2023-50224

CVEfeed Newsroom07 apr 2026
VulnerabilitàAlta
CVE-2026-5381 - runZero Platform task information leak

CVE ID :CVE-2026-5381 Published : April 7, 2026, 3:17 p.m. | 38 minutes ago Description :An issue that could expose task information outside of the authorized organization scope has been resolved. This is an instance of CWE-863: Incorrect Authorization, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N (2.2 Low). This issue was fixed in version 4.0.260205.0 of the runZero Platform. Severity: 2.2 | LOW Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-5382 - runZero Platform MCP endpoint information leak

CVE ID :CVE-2026-5382 Published : April 7, 2026, 3:17 p.m. | 38 minutes ago Description :An issue that could expose records outside of the authorized organization scope through the MCP endpoints has been resolved. This is an instance of CWE-863: Incorrect Authorization, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N (3.0 Low). This issue was fixed in version 4.0.260206.0 of the runZero Platform. Severity: 3.0 | LOW Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026
VulnerabilitàAlta
CVE-2026-5384 - runZero Platform incorrect credential scope

CVE ID :CVE-2026-5384 Published : April 7, 2026, 3:17 p.m. | 38 minutes ago Description :An issue that could allow a credential to be updated and used for a task from outside of the authorized organization scope has been resolved. This is an instance of CWE-863: Incorrect Authorization, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N (5.8 Medium). This issue was fixed in version 4.0.26021.0 of the runZero Platform. Severity: 5.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE07 apr 2026

Pagina 287 di 1119

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.