Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

14280 risultati

VulnerabilitàAlta
CVE-2026-5644 - Cyber-III Student-Management-System batch-notice.php cross site scripting

CVE ID :CVE-2026-5644 Published : April 6, 2026, 10:16 a.m. | 3 hours, 39 minutes ago Description :A security flaw has been discovered in Cyber-III Student-Management-System up to 1a938fa61e9f735078e9b291d2e6215b4942af3f. Affected is an unknown function of the file /admin/Add%20notice/batch-notice.php. Performing a manipulation of the argument $_SERVER['PHP_SELF'] results in cross site scripting. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet. Severity: 4.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5642 (CVSS 7.3)

A vulnerability was determined in Cyber-III Student-Management-System up to 1a938fa61e9f735078e9b291d2e6215b4942af3f. This affects an unknown function of the file /viva/update.php of the component HTTP POST Request Handler. This manipulation of the argument Name causes improper authorization. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.

NVD (NIST)06 apr 2026
VulnerabilitàAlta
CVE-2026-5641 - PHPGurukul Online Shopping Portal Project Parameter update-image1.php sql injection

CVE ID :CVE-2026-5641 Published : April 6, 2026, 10:16 a.m. | 3 hours, 39 minutes ago Description :A vulnerability was found in PHPGurukul Online Shopping Portal Project 2.1. The impacted element is an unknown function of the file /admin/update-image1.php of the component Parameter Handler. The manipulation of the argument filename results in sql injection. The attack may be performed from remote. The exploit has been made public and could be used. Severity: 6.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5642 - Cyber-III Student-Management-System HTTP POST Request update.php improper authorization

CVE ID :CVE-2026-5642 Published : April 6, 2026, 10:16 a.m. | 3 hours, 39 minutes ago Description :A vulnerability was determined in Cyber-III Student-Management-System up to 1a938fa61e9f735078e9b291d2e6215b4942af3f. This affects an unknown function of the file /viva/update.php of the component HTTP POST Request Handler. This manipulation of the argument Name causes improper authorization. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet. Severity: 7.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5643 - Cyber-III Student-Management-System Admin Add Endpoint notice.php cross site scripting

CVE ID :CVE-2026-5643 Published : April 6, 2026, 10:16 a.m. | 3 hours, 39 minutes ago Description :A vulnerability was identified in Cyber-III Student-Management-System up to 1a938fa61e9f735078e9b291d2e6215b4942af3f. This impacts an unknown function of the file /admin/Add%20notice/notice.php of the component Admin Add Endpoint. Such manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet. Severity: 4.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5637 (CVSS 7.3)

A security vulnerability has been detected in projectworlds Car Rental System 1.0. This vulnerability affects unknown code of the file /message_admin.php of the component Parameter Handler. Such manipulation of the argument Message leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

NVD (NIST)06 apr 2026
VulnerabilitàAlta
CVE-2026-5637 - projectworlds Car Rental System Parameter message_admin.php sql injection

CVE ID :CVE-2026-5637 Published : April 6, 2026, 9:16 a.m. | 4 hours, 39 minutes ago Description :A security vulnerability has been detected in projectworlds Car Rental System 1.0. This vulnerability affects unknown code of the file /message_admin.php of the component Parameter Handler. Such manipulation of the argument Message leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. Severity: 7.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5640 - PHPGurukul Online Shopping Portal Project Parameter update-image2.php sql injection

CVE ID :CVE-2026-5640 Published : April 6, 2026, 9:16 a.m. | 4 hours, 39 minutes ago Description :A vulnerability has been found in PHPGurukul Online Shopping Portal Project 2.1. The affected element is an unknown function of the file /admin/update-image2.php of the component Parameter Handler. The manipulation of the argument filename leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. Severity: 6.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5639 - PHPGurukul Online Shopping Portal Project Parameter update-image3.php sql injection

CVE ID :CVE-2026-5639 Published : April 6, 2026, 9:16 a.m. | 4 hours, 39 minutes ago Description :A flaw has been found in PHPGurukul Online Shopping Portal Project 2.1. Impacted is an unknown function of the file /admin/update-image3.php of the component Parameter Handler. Executing a manipulation of the argument filename can lead to sql injection. The attack can be executed remotely. The exploit has been published and may be used. Severity: 6.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5638 - HerikLyma CPPWebFramework path traversal

CVE ID :CVE-2026-5638 Published : April 6, 2026, 9:16 a.m. | 4 hours, 39 minutes ago Description :A vulnerability was detected in HerikLyma CPPWebFramework up to 3.1. This issue affects some unknown processing. Performing a manipulation results in path traversal. Remote exploitation of the attack is possible. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet. Severity: 5.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-37977 - Keycloak: org.keycloak.protocol.oidc.grants.ciba: keycloak: information disclosure via cors header injection due to unvalidated jwt azp claim

CVE ID :CVE-2026-37977 Published : April 6, 2026, 9:16 a.m. | 4 hours, 39 minutes ago Description :A flaw was found in Keycloak. A remote attacker can exploit a Cross-Origin Resource Sharing (CORS) header injection vulnerability in Keycloak's User-Managed Access (UMA) token endpoint. This flaw occurs because the `azp` claim from a client-supplied JSON Web Token (JWT) is used to set the `Access-Control-Allow-Origin` header before the JWT signature is validated. When a specially crafted JWT with an attacker-controlled `azp` value is processed, this value is reflected as the CORS origin, even if the grant is later rejected. This can lead to the exposure of low-sensitivity information from authorization server error responses, weakening origin isolation, but only when a target client is misconfigured with `webOrigins: ["*"]`. Severity: 3.7 | LOW Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
News
A Compromised Tool Opened the Door to a 91GB European Commission Data Leak

A Compromised Tool Opened the Door to a 91GB European Commission Data Leak The European Commission cloud breach did not begin with a dramatic system hack or a visible outage. It started quietly, with a trusted tool, a routine update, and a single compromised credential. With ... Read more Published Date: Apr 06, 2026 (1 day, 4 hours ago) Vulnerabilities has been mentioned in this article. CVE-2024-0132

CVEfeed Newsroom06 apr 2026

Pagina 382 di 1190

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.