Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

14489 risultati

News
AI agents found vulns in this popular Linux and Unix print server

AI agents found vulns in this popular Linux and Unix print server In the latest chapter on leaky CUPS, a security researcher and his band of bug-hunting agents have found two flaws that can be chained to allow an unauthenticated attacker to remotely execute code and ... Read more Published Date: Apr 06, 2026 (19 hours, 51 minutes ago) Vulnerabilities has been mentioned in this article.

CVEfeed Newsroom06 apr 2026
VulnerabilitàAlta
CVE-2026-5687 (CVSS 8.8)

A weakness has been identified in Tenda CX12L 16.03.53.12. This issue affects the function fromNatStaticSetting of the file /goform/NatStaticSetting. This manipulation of the argument page causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.

NVD (NIST)06 apr 2026
VulnerabilitàAlta
CVE-2026-5687 - Tenda CX12L NatStaticSetting fromNatStaticSetting stack-based overflow

CVE ID :CVE-2026-5687 Published : April 6, 2026, 10:16 p.m. | 9 hours, 39 minutes ago Description :A weakness has been identified in Tenda CX12L 16.03.53.12. This issue affects the function fromNatStaticSetting of the file /goform/NatStaticSetting. This manipulation of the argument page causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. Severity: 9.0 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5686 (CVSS 8.8)

A security flaw has been discovered in Tenda CX12L 16.03.53.12. This vulnerability affects the function fromRouteStatic of the file /goform/RouteStatic. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks.

NVD (NIST)06 apr 2026
VulnerabilitàAlta
CVE-2026-5685 (CVSS 8.8)

A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the function fromAddressNat of the file /goform/addressNat. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit is publicly available and might be used.

NVD (NIST)06 apr 2026
VulnerabilitàAlta
CVE-2026-5684 (CVSS 8)

A vulnerability was determined in Tenda CX12L 16.03.53.12. Affected by this issue is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack requires access to the local network. The exploit has been publicly disclosed and may be utilized.

NVD (NIST)06 apr 2026
VulnerabilitàAlta
CVE-2026-35473 - WeGIA - Open Redirect - IentradaControle - listarId() - Unvalidated $_GET['nextPage']

CVE ID :CVE-2026-35473 Published : April 6, 2026, 10:16 p.m. | 7 hours, 39 minutes ago Description :WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarId and nomeClasse=IentradaControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.9. Severity: 5.1 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5686 - Tenda CX12L RouteStatic fromRouteStatic stack-based overflow

CVE ID :CVE-2026-5686 Published : April 6, 2026, 10:16 p.m. | 7 hours, 39 minutes ago Description :A security flaw has been discovered in Tenda CX12L 16.03.53.12. This vulnerability affects the function fromRouteStatic of the file /goform/RouteStatic. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. Severity: 9.0 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5684 - Tenda CX12L webExcptypemanFilter fromwebExcptypemanFilter stack-based overflow

CVE ID :CVE-2026-5684 Published : April 6, 2026, 10:16 p.m. | 7 hours, 39 minutes ago Description :A vulnerability was determined in Tenda CX12L 16.03.53.12. Affected by this issue is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack requires access to the local network. The exploit has been publicly disclosed and may be utilized. Severity: 8.6 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-35474 - WeGIA - Open Redirect - atualizacao redirection - Unvalidated $_GET['redirect']

CVE ID :CVE-2026-35474 Published : April 6, 2026, 10:16 p.m. | 7 hours, 39 minutes ago Description :WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, open redirect has been found in WeGIA webapp. The redirect parameter is taken directly from $_GET with no URL validation or whitelist check, then used verbatim in a header("Location: ...") call. This vulnerability is fixed in 3.6.9. Severity: 5.1 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-35444 - SDL_image has a heap buffer overflow READ via unchecked colormap index in XCF loader

CVE ID :CVE-2026-35444 Published : April 6, 2026, 10:16 p.m. | 3 hours, 39 minutes ago Description :SDL_image is a library to load images of various formats as SDL surfaces. In do_layer_surface() in src/IMG_xcf.c, pixel index values from decoded XCF tile data are used directly as colormap indices without validating them against the colormap size (cm_num). A crafted .xcf file with a small colormap and out-of-range pixel indices causes heap out-of-bounds reads of up to 762 bytes past the colormap allocation. Both IMAGE_INDEXED code paths are affected (bpp=1 and bpp=2). The leaked heap bytes are written into the output surface pixel data, making them potentially observable in the rendered image. This vulnerability is fixed with commit 996bf12888925932daace576e09c3053410896f8. Severity: 7.1 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-35454 - Code Extension Marketplace has a Zip Slip Path Traversal

CVE ID :CVE-2026-35454 Published : April 6, 2026, 10:16 p.m. | 5 hours, 39 minutes ago Description :The Code Extension Marketplace is an open-source alternative to the VS Code Marketplace. Prior to 2.4.2, Zip Slip vulnerability in coder/code-marketplace allowed a malicious VSIX file to write arbitrary files outside the extension directory. ExtractZip passed raw zip entry names to a callback that wrote files via filepath.Join with no boundary check; filepath.Join resolved .. components but did not prevent the result from escaping the base path. This vulnerability is fixed in 2.4.2. Severity: 8.7 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026

Pagina 386 di 1208

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.