Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

15432 risultati

VulnerabilitàAlta
CVE-2026-4788 - Multiple Vulnerabilities affect IBM Tivoli Netcool Impact

CVE ID :CVE-2026-4788 Published : April 8, 2026, 1:16 a.m. | 2 hours, 39 minutes ago Description :IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.37 stores sensitive information in log files that could be read by a local user. Severity: 8.4 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE08 apr 2026
VulnerabilitàCritica
CVE-2026-1346 (CVSS 9.3)

IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally authenticated user to escalate their privileges to root due to execution with unnecessary privileges than required.

NVD (NIST)08 apr 2026
VulnerabilitàAlta
CVE-2026-1343 (CVSS 7.2)

IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 allows an attacker to contact internal authentication endpoints which are protected by the Reverse Proxy.

NVD (NIST)08 apr 2026
VulnerabilitàAlta
CVE-2026-1343 - Security Vulnerabilities have been found in IBM Verify Identity Access and IBM Security Verify Access

CVE ID :CVE-2026-1343 Published : April 8, 2026, 1:16 a.m. | 2 hours, 39 minutes ago Description :IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 allows an attacker to contact internal authentication endpoints which are protected by the Reverse Proxy. Severity: 7.2 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE08 apr 2026
VulnerabilitàAlta
CVE-2026-1346 - Security Vulnerabilities have been found in IBM Verify Identity Access and IBM Security Verify Access

CVE ID :CVE-2026-1346 Published : April 8, 2026, 1:16 a.m. | 2 hours, 39 minutes ago Description :IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally authenticated user to escalate their privileges to root due to execution with unnecessary privileges than required. Severity: 9.3 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE08 apr 2026
VulnerabilitàAlta
CVE-2026-32280 - Unexpected work during chain building in crypto/x509

CVE ID :CVE-2026-32280 Published : April 8, 2026, 2:16 a.m. | 3 hours, 40 minutes ago Description :During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE08 apr 2026
VulnerabilitàAlta
CVE-2026-32281 - Inefficient policy validation in crypto/x509

CVE ID :CVE-2026-32281 Published : April 8, 2026, 2:16 a.m. | 3 hours, 40 minutes ago Description :Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE08 apr 2026
VulnerabilitàAlta
CVE-2026-32288 - Unbounded allocation for old GNU sparse in archive/tar

CVE ID :CVE-2026-32288 Published : April 8, 2026, 2:16 a.m. | 3 hours, 40 minutes ago Description :tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the "old GNU sparse map" format. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE08 apr 2026
VulnerabilitàAlta
CVE-2026-27140 - Code execution vulnerability in SWIG code generation in cmd/go

CVE ID :CVE-2026-27140 Published : April 8, 2026, 2:16 a.m. | 1 hour, 40 minutes ago Description :SWIG file names containing 'cgo' and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE08 apr 2026
VulnerabilitàAlta
CVE-2026-32283 - Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls

CVE ID :CVE-2026-32283 Published : April 8, 2026, 2:16 a.m. | 3 hours, 40 minutes ago Description :If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE08 apr 2026
VulnerabilitàAlta
CVE-2026-27143 - Missing bound checks can lead to memory corruption in safe Go in cmd/compile

CVE ID :CVE-2026-27143 Published : April 8, 2026, 2:16 a.m. | 1 hour, 40 minutes ago Description :Arithmetic over induction variables in loops were not correctly checked for underflow or overflow. As a result, the compiler would allow for invalid indexing to occur at runtime, potentially leading to memory corruption. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE08 apr 2026
VulnerabilitàAlta
CVE-2026-33810 - Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509

CVE ID :CVE-2026-33810 Published : April 8, 2026, 2:16 a.m. | 3 hours, 40 minutes ago Description :When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE08 apr 2026

Pagina 446 di 1286

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.