Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

15693 risultati

VulnerabilitàAlta
CVE-2026-5616 - JeecgBoot AI Chat JeecgBizToolsProvider.java missing authentication

CVE ID :CVE-2026-5616 Published : April 6, 2026, 4:16 a.m. | 3 hours, 39 minutes ago Description :A security vulnerability has been detected in JeecgBoot 3.9.0/3.9.1. The impacted element is an unknown function of the file jeecg-boot/jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/airag/JeecgBizToolsProvider.java of the component AI Chat Module. Such manipulation leads to missing authentication. The attack can be executed remotely. The name of the patch is b7c9aeba7aefda9e008ea8fe4fc3daf08d0c5b39/2c1cc88b8d983868df8c520a343d6ff4369d9e59. It is best practice to apply a patch to resolve this issue. The project fixed the issue with a commit which shall be part of the next official release. Severity: 7.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5615 - givanz Vvvebjs File Upload Endpoint upload.php cross site scripting

CVE ID :CVE-2026-5615 Published : April 6, 2026, 4:16 a.m. | 3 hours, 39 minutes ago Description :A weakness has been identified in givanz Vvvebjs up to 2.0.5. The affected element is an unknown function of the file upload.php of the component File Upload Endpoint. This manipulation of the argument uploadAllowExtensions causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. Patch name: 8cac22cff99b8bc701c408aa8e887fa702755336. Applying a patch is the recommended action to fix this issue. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. Severity: 5.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5614 - Belkin F9K1015 formSetPassword stack-based overflow

CVE ID :CVE-2026-5614 Published : April 6, 2026, 4:16 a.m. | 3 hours, 39 minutes ago Description :A security flaw has been discovered in Belkin F9K1015 1.00.10. Impacted is the function formSetPassword of the file /goform/formSetPassword. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. Severity: 9.0 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5610 (CVSS 8.8)

A vulnerability has been found in Belkin F9K1015 1.00.10. Affected by this issue is the function formWISP5G of the file /goform/formWISP5G. Such manipulation of the argument webpage leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

NVD (NIST)06 apr 2026
VulnerabilitàAlta
CVE-2026-5609 (CVSS 8.8)

A flaw has been found in Tenda i12 1.0.0.11(3862). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset of the component Parameter Handler. This manipulation of the argument index/wl_radio causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used.

NVD (NIST)06 apr 2026
VulnerabilitàAlta
CVE-2026-5610 - Belkin F9K1015 formWISP5G stack-based overflow

CVE ID :CVE-2026-5610 Published : April 6, 2026, 2:16 a.m. | 5 hours, 39 minutes ago Description :A vulnerability has been found in Belkin F9K1015 1.00.10. Affected by this issue is the function formWISP5G of the file /goform/formWISP5G. Such manipulation of the argument webpage leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Severity: 9.0 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5608 (CVSS 8.8)

A vulnerability was detected in Belkin F9K1122 1.00.33. Affected is the function formWlanSetup of the file /goform/formWlanSetup. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

NVD (NIST)06 apr 2026
VulnerabilitàAlta
CVE-2026-5608 - Belkin F9K1122 formWlanSetup stack-based overflow

CVE ID :CVE-2026-5608 Published : April 6, 2026, 1:16 a.m. | 6 hours, 38 minutes ago Description :A vulnerability was detected in Belkin F9K1122 1.00.33. Affected is the function formWlanSetup of the file /goform/formWlanSetup. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Severity: 9.0 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5607 - imprvhub mcp-browser-agent URL Parameter handlers.ts CallToolRequestSchema server-side request forgery

CVE ID :CVE-2026-5607 Published : April 6, 2026, 1:16 a.m. | 6 hours, 38 minutes ago Description :A security vulnerability has been detected in imprvhub mcp-browser-agent up to 0.8.0. This impacts the function CallToolRequestSchema of the file src/handlers.ts of the component URL Parameter Handler. The manipulation of the argument request.params.name/request.params.arguments leads to server-side request forgery. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Severity: 6.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
VulnerabilitàAlta
CVE-2026-5609 - Tenda i12 Parameter wifiSSIDset formwrlSSIDset stack-based overflow

CVE ID :CVE-2026-5609 Published : April 6, 2026, 2:16 a.m. | 5 hours, 39 minutes ago Description :A flaw has been found in Tenda i12 1.0.0.11(3862). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset of the component Parameter Handler. This manipulation of the argument index/wl_radio causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used. Severity: 9.0 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE06 apr 2026
News
The CVE Watchtower: Weekly Threat Intelligence Briefing (March 30 – April 5, 2026)

The CVE Watchtower: Weekly Threat Intelligence Briefing (March 30 – April 5, 2026) Welcome to this week’s vulnerability digest. Whether you are a CISO charting out your risk management roadmap or a system administrator gearing up for another weekend of emergency patching, sifting th ... Read more Published Date: Apr 06, 2026 (1 day, 11 hours ago) Vulnerabilities has been mentioned in this article.

CVEfeed Newsroom06 apr 2026
VulnerabilitàAlta
CVE-2026-5605 (CVSS 8.8)

A weakness has been identified in Tenda CH22 1.0.0.1. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.

NVD (NIST)06 apr 2026

Pagina 504 di 1308

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.