Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

16207 risultati

VulnerabilitàAlta
CVE-2026-42854 - arduino-esp32: Stack buffer overflow in WebServer multipart boundary parsing leads to remote crash potential RCE

CVE ID :CVE-2026-42854 Published : May 12, 2026, 10:16 p.m. | 14 minutes ago Description :arduino-esp32 is an Arduino core for the ESP32, ESP32-S2, ESP32-S3, ESP32-C3, ESP32-C6 and ESP32-H2 microcontrollers. Prior to 3.3.8, the WebServer multipart form parser in arduino-esp32 allocates a Variable Length Array (VLA) on the stack whose size is derived from an attacker-controlled HTTP header field (Content-Type: multipart/form-data; boundary=...) without enforcing any length limit. Sending a boundary string longer than ~8000 characters overflows the 8192-byte task stack of the loopTask, causing a crash and potential remote code execution. This vulnerability is fixed in 3.3.8. Severity: 9.8 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE3h fa
VulnerabilitàAlta
CVE-2026-42844 - Grav: Low-privileged API users can create super-admin accounts via blueprint-upload

CVE ID :CVE-2026-42844 Published : May 12, 2026, 10:16 p.m. | 14 minutes ago Description :Grav is a file-based Web platform. In Grav 2.0.0-beta.2, a low-privileged authenticated API user with api.media.write can abuse /api/v1/blueprint-upload to write an arbitrary YAML file into user/accounts/, then log in as the newly created account with api.super privileges. This results in full administrative compromise of the Grav API. This vulnerability is fixed in API 1.0.0-beta.17. Severity: 8.7 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE3h fa
VulnerabilitàAlta
CVE-2026-42545 - Granian: DoS via WSGI response header panic

CVE ID :CVE-2026-42545 Published : May 12, 2026, 10:16 p.m. | 14 minutes ago Description :Granian is a Rust HTTP server for Python applications. From 0.2.0 to 2.7.4, Granian aborts a worker process if a WSGI application returns an invalid HTTP response header name or value. The WSGI response conversion path uses .unwrap() on both the header name and header value constructors, so malformed output from the application becomes a process abort instead of a handled error. This vulnerability is fixed in 2.7.4. Severity: 5.9 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE3h fa
VulnerabilitàAlta
CVE-2026-44403 (CVSS 7.2)

Wing FTP Server 8.1.2 contains an authenticated remote code execution vulnerability in the session serialization mechanism that allows authenticated administrators to inject arbitrary Lua code through the domain admin mydirectory field. Attackers can exploit unsafe serialization of session values into Lua source code without proper escaping of closing delimiters, causing the injected code to be executed when the poisoned session is loaded via loadfile().

NVD (NIST)4h fa
VulnerabilitàAlta
CVE-2026-6959 - Nomad vulnerable to arbitrary file read/write on client host through symlink attack

CVE ID :CVE-2026-6959 Published : May 12, 2026, 8:16 p.m. | 14 minutes ago Description :HashiCorp Nomad and Nomad Enterprise prior to 2.0.1 are vulnerable to arbitrary file read and write on the client host as the Nomad process user through a symlink attack. This vulnerability (CVE-2026-6959) is fixed in Nomad 2.0.1, 1.11.5 and 1.10.11. Severity: 6.0 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE5h fa
VulnerabilitàAlta
CVE-2026-7474 - Nomad vulnerable to path traversal in dynamic host volume which may lead to code execution

CVE ID :CVE-2026-7474 Published : May 12, 2026, 8:16 p.m. | 14 minutes ago Description :HashiCorp Nomad and Nomad Enterprise prior to 2.0.1 are vulnerable to code execution on the client host through a path traversal attack. This vulnerability (CVE-2026-7474) is fixed in Nomad 2.0.1, 1.11.5 and 1.10.11. Severity: 8.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE5h fa
VulnerabilitàAlta
CVE-2026-8052 - Nomad's exec2 task driver vulnerable to arbitrary file read/write on client host through symlink attack

CVE ID :CVE-2026-8052 Published : May 12, 2026, 8:16 p.m. | 14 minutes ago Description :HashiCorp Nomad’s exec2 task driver prior to 0.1.2 is vulnerable to arbitrary file read and write on the client host as the Nomad process user through a symlink attack. This vulnerability (CVE-2026-8052) is fixed in version 0.1.2 of the exec2 task driver. Severity: 6.0 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE5h fa
VulnerabilitàAlta
CVE-2026-44874 - Authenticated Arbitrary File Download via AOS-10 Web-Based Management Interface

CVE ID :CVE-2026-44874 Published : May 12, 2026, 8:16 p.m. | 14 minutes ago Description :A vulnerability exists in the web-based management interface of an AOS-10 Gateway that could allow an authenticated remote attacker to access sensitive files on the underlying operating system. Successful exploitation of this vulnerability could result in the disclosure of confidential system information, potentially enabling further attacks against the affected device. Severity: 4.9 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE5h fa
VulnerabilitàAlta
CVE-2026-45185 - Exim GnuTLS Use-After-Free Remote Code Execution Vulnerability

CVE ID :CVE-2026-45185 Published : May 12, 2026, 8:16 p.m. | 14 minutes ago Description :Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable use-after-free in the BDAT body parsing path. It is triggered when a client sends a TLS close_notify mid-body during a CHUNKING transfer, followed by a final cleartext byte on the same TCP connection. This can lead to heap corruption. An unauthenticated network attacker exploiting this vulnerability could execute arbitrary code. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE5h fa
VulnerabilitàAlta
CVE-2026-44865 - Authenticated Command Injection Vulnerabilities in the Web-Based Management Interface of AOS-8 and AOS-10

CVE ID :CVE-2026-44865 Published : May 12, 2026, 8:16 p.m. | 14 minutes ago Description :Command injection vulnerabilities exist in the web-based management interface of AOS-8 and AOS-10 Operating Systems. Successful exploitation of these vulnerabilities could allow an authenticated remote attacker to execute arbitrary commands on the underlying operating system. Severity: 7.2 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE5h fa
VulnerabilitàAlta
CVE-2026-44864 - Authenticated Remote Code Execution via SQL Injection in AOS-8 and AOS-10 Operating Systems

CVE ID :CVE-2026-44864 Published : May 12, 2026, 8:16 p.m. | 14 minutes ago Description :SQL injection vulnerabilities exist in several underlying service components accessible through the AOS-8 and AOS-10 command-line interface and management protocol. An authenticated attacker with administrative privileges could exploit these vulnerabilities by injecting crafted input into parameters that are passed unsanitized to backend database queries. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system. Severity: 7.2 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE5h fa
VulnerabilitàAlta
CVE-2026-44870 - Authenticated Command Injection Vulnerabilities in Command Line Interface (CLI) Service Accessed by PAPI Protocol of AOS-8 and AOS-10 Operating Systems

CVE ID :CVE-2026-44870 Published : May 12, 2026, 8:16 p.m. | 14 minutes ago Description :Command injection vulnerabilities exist in the command line interface (CLI) service accessed by the PAPI protocol of AOS-8 and AOS-10 Operating Systems. Successful exploitation of these vulnerabilities could allow an authenticated remote attacker to execute arbitrary commands on the underlying operating system. Severity: 7.2 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE5h fa

Pagina 3 di 1351

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.