Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

14012 risultati

VulnerabilitàAlta
CVE-2026-35411 - Directus is an Open Redirect in Admin 2FA Setup Page

CVE ID :CVE-2026-35411 Published : April 6, 2026, 9:33 p.m. | 22 minutes ago Description :Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.1, Directus is vulnerable to an open redirect via the redirect query parameter on the /admin/tfa-setup page. When an administrator who has not yet configured Two-Factor Authentication (2FA) visits a crafted URL, they are presented with the legitimate Directus 2FA setup page. After completing the setup process, the application redirects the user to the attacker-controlled URL specified in the redirect parameter without any validation. This vulnerability could be used in phishing attacks targeting Directus administrators, as the initial interaction occurs on a trusted domain. This vulnerability is fixed in 11.16.1. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-35410 - Directus has an Open Redirect via Parser Bypass in OAuth2/SAML Authentication Flow

CVE ID :CVE-2026-35410 Published : April 6, 2026, 9:32 p.m. | 23 minutes ago Description :Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.1, an open redirect vulnerability exists in the login redirection logic. The isLoginRedirectAllowed function fails to correctly identify certain malformed URLs as external, allowing attackers to bypass redirect allow-list validation and redirect users to arbitrary external domains upon successful authentication. This vulnerability is fixed in 11.16.1. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5709 - AWS Research and Engineering Studio (RES) FileBrowser Command Injection

CVE ID :CVE-2026-5709 Published : April 6, 2026, 10:16 p.m. | 9 hours, 39 minutes ago Description :Unsanitized input in the FileBrowser API in AWS Research and Engineering Studio (RES) version 2024.10 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands on the cluster-manager EC2 instance via crafted input when using the FileBrowser functionality. To remediate this issue, users are advised to upgrade to RES version 2026.03 or apply the corresponding mitigation patch to their existing environment. Severity: 8.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-35409 - Directus has a SSRF Protection Bypass via IPv4-Mapped IPv6 Addresses in File Import

CVE ID :CVE-2026-35409 Published : April 6, 2026, 9:31 p.m. | 24 minutes ago Description :Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.0, a Server-Side Request Forgery (SSRF) protection bypass has been identified and fixed in Directus. The IP address validation mechanism used to block requests to local and private networks could be circumvented using IPv4-Mapped IPv6 address notation. This vulnerability is fixed in 11.16.0. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-35408 - Directus is Missing Cross-Origin Opener Policy

CVE ID :CVE-2026-35408 Published : April 6, 2026, 9:30 p.m. | 25 minutes ago Description :Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, Directus's Single Sign-On (SSO) login pages lacked a Cross-Origin-Opener-Policy (COOP) HTTP response header. Without this header, a malicious cross-origin window that opens the Directus login page retains the ability to access and manipulate the window object of that page. An attacker can exploit this to intercept and redirect the OAuth authorization flow to an attacker-controlled OAuth client, causing the victim to unknowingly grant access to their authentication provider account (e.g. Google, Discord). This vulnerability is fixed in 11.17.0. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5685 - Tenda CX12L addressNat fromAddressNat stack-based overflow

CVE ID :CVE-2026-5685 Published : April 6, 2026, 10:16 p.m. | 7 hours, 39 minutes ago Description :A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the function fromAddressNat of the file /goform/addressNat. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit is publicly available and might be used. Severity: 9.0 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5708 - Improper Control of User-Modifiable Attributes in RES CreateSession API

CVE ID :CVE-2026-5708 Published : April 6, 2026, 10:16 p.m. | 9 hours, 39 minutes ago Description :Unsanitized control of user-modifiable attributes in the session creation component in AWS Research and Engineering Studio (RES) prior to version 2026.03 could allow an authenticated remote user to escalate privileges, assume the virtual desktop host instance profile permissions, and interact with AWS resources and services via a crafted API request. To remediate this issue, users are advised to upgrade to RES version 2026.03 or apply the corresponding mitigation patch to their existing environment. Severity: 8.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5707 - Command Injection via Virtual Desktop Session Name in AWS Research and Engineering Studio (RES)

CVE ID :CVE-2026-5707 Published : April 6, 2026, 10:16 p.m. | 9 hours, 39 minutes ago Description :Unsanitized input in an OS command in the virtual desktop session name handling in AWS Research and Engineering Studio (RES) version 2025.03 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands as root on the virtual desktop host via a crafted session name. To remediate this issue, users are advised to upgrade to RES version 2026.03 or apply the corresponding mitigation patch to their existing environment. Severity: 8.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-35404 - Open edX Platform has an Open Redirect in Survey Views via Unvalidated redirect_url Parameter

CVE ID :CVE-2026-35404 Published : April 6, 2026, 9:22 p.m. | 33 minutes ago Description :Open edX Platform enables the authoring and delivery of online learning at any scale. he view_survey endpoint accepts a redirect_url GET parameter that is passed directly to HttpResponseRedirect() without any URL validation. When a non-existent survey name is provided, the server issues an immediate HTTP 302 redirect to the attacker-controlled URL. Additionally, the same unvalidated URL is embedded in a hidden form field and returned in a JSON response after form submission, where client-side JavaScript performs location.href = url. This enables phishing and credential theft attacks against authenticated Open edX users. This vulnerability is fixed with commit 76462f1e5fa9b37d2621ad7ad19514b403908970. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-22675 - OCS Inventory NG Server Stored XSS via User-Agent

CVE ID :CVE-2026-22675 Published : April 6, 2026, 9:19 p.m. | 35 minutes ago Description :OCS Inventory NG Server version 2.12.3 and prior contain a stored cross-site scripting vulnerability that allows unauthenticated attackers to execute arbitrary JavaScript by submitting malicious User-Agent HTTP headers to the /ocsinventory endpoint. Attackers can register rogue agents or craft requests with malicious User-Agent values that are stored without sanitation and rendered with insufficient encoding in the web console, leading to arbitrary JavaScript execution in the browsers of authenticated users viewing the statistics dashboard. Severity: 5.4 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-35475 - WeGIA - Open Redirect - backup redirection — Unvalidated $_GET['redirect']

CVE ID :CVE-2026-35475 Published : April 6, 2026, 10:16 p.m. | 7 hours, 39 minutes ago Description :WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, the redirect parameter is taken directly from $_GET with no URL validation or whitelist check, then used verbatim in a header("Location: ...") call. This vulnerability is fixed in 3.6.9. Severity: 5.1 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5683 - Tenda CX12L P2pListFilter fromP2pListFilter stack-based overflow

CVE ID :CVE-2026-5683 Published : April 6, 2026, 9:16 p.m. | 39 minutes ago Description :A vulnerability was found in Tenda CX12L 16.03.53.12. Affected by this vulnerability is the function fromP2pListFilter of the file /goform/P2pListFilter. Performing a manipulation of the argument page results in stack-based buffer overflow. The attack must originate from the local network. The exploit has been made public and could be used. Severity: 5.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026

Pagina 348 di 1168

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.