Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

15755 risultati

VulnerabilitàAlta
CVE-2026-5590 - net: ip/tcp: Null pointer dereference can be triggered by a race condition

CVE ID :CVE-2026-5590 Published : April 5, 2026, 4:16 a.m. | 7 hours, 39 minutes ago Description :A race condition during TCP connection teardown can cause tcp_recv() to operate on a connection that has already been released. If tcp_conn_search() returns NULL while processing a SYN packet, a NULL pointer derived from stale context data is passed to tcp_backlog_is_full() and dereferenced without validation, leading to a crash. Severity: 6.4 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE05 apr 2026
VulnerabilitàAlta
CVE-2026-5539 - code-projects Simple Laundry System Parameter modifymember.php cross site scripting

CVE ID :CVE-2026-5539 Published : April 5, 2026, 4:16 a.m. | 5 hours, 39 minutes ago Description :A flaw has been found in code-projects Simple Laundry System 1.0. This affects an unknown part of the file /modifymember.php of the component Parameter Handler. This manipulation of the argument firstName causes cross site scripting. The attack can be initiated remotely. The exploit has been published and may be used. Severity: 5.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE05 apr 2026
VulnerabilitàAlta
CVE-2026-5535 - FedML-AI FedML MQTT Message FileUtils.java path traversal

CVE ID :CVE-2026-5535 Published : April 5, 2026, 3:16 a.m. | 6 hours, 39 minutes ago Description :A security flaw has been discovered in FedML-AI FedML up to 0.8.9. This impacts an unknown function of the file FileUtils.java of the component MQTT Message Handler. Performing a manipulation of the argument dataSet results in path traversal. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. Severity: 5.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE05 apr 2026
VulnerabilitàAlta
CVE-2026-5534 (CVSS 7.3)

A vulnerability was identified in itsourcecode Online Enrollment System 1.0. This affects an unknown function of the file /sms/user/index.php?view=edit&id=10 of the component Parameter Handler. Such manipulation of the argument USERID leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used.

NVD (NIST)05 apr 2026
VulnerabilitàAlta
CVE-2026-5534 - itsourcecode Online Enrollment System Parameter index.php sql injection

CVE ID :CVE-2026-5534 Published : April 5, 2026, 3:16 a.m. | 6 hours, 39 minutes ago Description :A vulnerability was identified in itsourcecode Online Enrollment System 1.0. This affects an unknown function of the file /sms/user/index.php?view=edit&id=10 of the component Parameter Handler. Such manipulation of the argument USERID leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used. Severity: 7.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE05 apr 2026
VulnerabilitàAlta
CVE-2026-5538 - QingdaoU OnlineJudge judge_server_heartbeat Endpoint JudgeServer.service_url server-side request forgery

CVE ID :CVE-2026-5538 Published : April 5, 2026, 4:16 a.m. | 5 hours, 39 minutes ago Description :A vulnerability was detected in QingdaoU OnlineJudge up to 1.6.1. Affected by this issue is the function service_url of the file JudgeServer.service_url of the component judge_server_heartbeat Endpoint. The manipulation results in server-side request forgery. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way. Severity: 6.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE05 apr 2026
News
CVE-2026-35616 — Fortinet FortiClient EMS Critical Pre-Auth RCE

CVE-2026-35616 — Fortinet FortiClient EMS Critical Pre-Auth RCE April 5, 2026Executive SummaryFortinet FortiClient Endpoint Management Server (EMS) versions 7.4.5 and 7.4.6 contain a critical improper access control vulnerability (CWE-284) in the API authenticatio ... Read more Published Date: Apr 05, 2026 (2 days, 5 hours ago) Vulnerabilities has been mentioned in this article. CVE-2026-35616 CVE-2026-21643

CVEfeed Newsroom05 apr 2026
VulnerabilitàAlta
CVE-2026-5537 - halex CourseSEL HTTP GET Parameter IndexController.class.php check_sel sql injection

CVE ID :CVE-2026-5537 Published : April 5, 2026, 4:16 a.m. | 5 hours, 39 minutes ago Description :A security vulnerability has been detected in halex CourseSEL up to 1.1.0. Affected by this vulnerability is the function check_sel of the file Apps/Index/Controller/IndexController.class.php of the component HTTP GET Parameter Handler. The manipulation of the argument seid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Severity: 6.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE05 apr 2026
VulnerabilitàAlta
CVE-2026-5536 - FedML-AI FedML gRPC server grpc_server.py sendMessage deserialization

CVE ID :CVE-2026-5536 Published : April 5, 2026, 4:16 a.m. | 5 hours, 39 minutes ago Description :A weakness has been identified in FedML-AI FedML up to 0.8.9. Affected is the function sendMessage of the file grpc_server.py of the component gRPC server. Executing a manipulation can lead to deserialization. The attack may be performed from remote. The vendor was contacted early about this disclosure but did not respond in any way. Severity: 7.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE05 apr 2026
VulnerabilitàAlta
CVE-2026-5533 - badlogic pi-mono SVG Artifact SvgArtifact.ts cross site scripting

CVE ID :CVE-2026-5533 Published : April 5, 2026, 2:16 a.m. | 7 hours, 39 minutes ago Description :A vulnerability was determined in badlogic pi-mono 0.58.4. The impacted element is an unknown function of the file packages/web-ui/src/tools/artifacts/SvgArtifact.ts of the component SVG Artifact Handler. This manipulation causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. Severity: 5.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE05 apr 2026
VulnerabilitàAlta
CVE-2026-5530 - Ollama Model Pull API download.go server-side request forgery

CVE ID :CVE-2026-5530 Published : April 5, 2026, 1:16 a.m. | 6 hours, 38 minutes ago Description :A flaw has been found in Ollama up to 18.1. This issue affects some unknown processing of the file server/download.go of the component Model Pull API. Executing a manipulation can lead to server-side request forgery. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way. Severity: 6.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE05 apr 2026
VulnerabilitàAlta
CVE-2026-5529 - Dromara lamp-cloud DefUserController pageUser improper authorization

CVE ID :CVE-2026-5529 Published : April 5, 2026, 1:16 a.m. | 6 hours, 38 minutes ago Description :A vulnerability was detected in Dromara lamp-cloud up to 5.8.1. This vulnerability affects the function pageUser of the file /defUser/pageUser of the component DefUserController. Performing a manipulation results in improper authorization. The attack can be initiated remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet. Severity: 5.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE05 apr 2026

Pagina 521 di 1313

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.