Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

17229 risultati

VulnerabilitàCritica
CVE-2017-20237 (CVSS 9.8)

Hirschmann Industrial HiVision versions prior to 06.0.07 and 07.0.03 contains an authentication bypass vulnerability in the master service that allows unauthenticated remote attackers to execute arbitrary commands with administrative privileges. Attackers can invoke exposed interface methods over the remote service to bypass authentication and achieve remote code execution on the underlying operating system.

NVD (NIST)03 apr 2026
News
OpenClaw gives users yet another reason to be freaked out about security

OpenClaw gives users yet another reason to be freaked out about security For more than a month, security practitioners have been warning about the perils of using OpenClaw, the viral AI agentic tool that has taken the development community by storm. A recently fixed vulner ... Read more Published Date: Apr 03, 2026 (3 days ago) Vulnerabilities has been mentioned in this article. CVE-2026-33579

CVEfeed Newsroom03 apr 2026
VulnerabilitàAlta
CVE-2026-3184 - Util-linux: util-linux: access control bypass due to improper hostname canonicalization

CVE ID :CVE-2026-3184 Published : April 3, 2026, 7:17 p.m. | 37 minutes ago Description :A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access. Severity: 3.7 | LOW Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
VulnerabilitàAlta
CVE-2026-2625 - Rust-rpm-sequoia: rust-rpm-sequoia: denial of service via crafted rpm file during signature verification

CVE ID :CVE-2026-2625 Published : April 3, 2026, 7:17 p.m. | 37 minutes ago Description :A flaw was found in rust-rpm-sequoia. An attacker can exploit this vulnerability by providing a specially crafted Red Hat Package Manager (RPM) file. During the RPM signature verification process, this crafted file can trigger an error in the OpenPGP signature parsing code, leading to an unconditional termination of the rpm process. This issue results in an application level denial of service, making the system unable to process RPM files for signature verification. Severity: 4.0 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
News
China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in the region. The campaign has bee ... Read more Published Date: Apr 03, 2026 (2 days, 23 hours ago) Vulnerabilities has been mentioned in this article. CVE-2026-3055 CVE-2025-53521 CVE-2025-31324 CVE-2025-0994

CVEfeed Newsroom03 apr 2026
VulnerabilitàAlta
CVE-2026-5476 - NASA cFS cfe_tbl_passthru_codec.c CFE_TBL_ValidateCodecLoadSize integer overflow

CVE ID :CVE-2026-5476 Published : April 3, 2026, 6:16 p.m. | 1 hour, 38 minutes ago Description :A vulnerability was identified in NASA cFS up to 7.0.0 on 32-bit. Affected is the function CFE_TBL_ValidateCodecLoadSize of the file cfe/modules/tbl/fsw/src/cfe_tbl_passthru_codec.c. The manipulation leads to integer overflow. The complexity of an attack is rather high. The exploitability is told to be difficult. A fix is planned for the upcoming version milestone of the project. Severity: 4.6 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
VulnerabilitàAlta
CVE-2026-32186 - Microsoft Bing Elevation of Privilege Vulnerability

CVE ID :CVE-2026-32186 Published : April 3, 2026, 6:16 p.m. | 1 hour, 38 minutes ago Description :Microsoft Bing Elevation of Privilege Vulnerability Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
VulnerabilitàAlta
CVE-2026-5473 - NASA cFS Pickle pickle.load deserialization

CVE ID :CVE-2026-5473 Published : April 3, 2026, 5:16 p.m. | 2 hours, 38 minutes ago Description :A vulnerability has been found in NASA cFS up to 7.0.0. The impacted element is the function pickle.load of the component Pickle Module. Such manipulation leads to deserialization. The attack needs to be performed locally. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet. Severity: 4.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
VulnerabilitàAlta
CVE-2026-5474 - NASA cFS CCSDS Packet Header to_lab_passthru_encode.c CFE_MSG_GetSize heap-based overflow

CVE ID :CVE-2026-5474 Published : April 3, 2026, 5:16 p.m. | 2 hours, 38 minutes ago Description :A vulnerability was found in NASA cFS up to 7.0.0. This affects the function CFE_MSG_GetSize of the file apps/to_lab/fsw/src/to_lab_passthru_encode.c of the component CCSDS Packet Header Handler. Performing a manipulation results in heap-based buffer overflow. The attacker must have access to the local network to execute the attack. The project was informed of the problem early through an issue report but has not responded yet. Severity: 6.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
VulnerabilitàAlta
CVE-2026-28373 - Stackfield Desktop App Path Traversal Vulnerability

CVE ID :CVE-2026-28373 Published : April 3, 2026, 5:16 p.m. | 2 hours, 38 minutes ago Description :The Stackfield Desktop App before 1.10.2 for macOS and Windows contains a path traversal vulnerability in certain decryption functionality when processing the filePath property. A malicious export can write arbitrary content to any path on the victim's filesystem. Severity: 9.6 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
VulnerabilitàAlta
CVE-2026-5475 - NASA cFS CCSDS Header Size cfe_sb_priv.c CFE_SB_TransmitMsg memory corruption

CVE ID :CVE-2026-5475 Published : April 3, 2026, 6:16 p.m. | 1 hour, 38 minutes ago Description :A vulnerability was determined in NASA cFS up to 7.0.0. This impacts the function CFE_SB_TransmitMsg of the file cfe_sb_priv.c of the component CCSDS Header Size Handler. Executing a manipulation can lead to memory corruption. The project was informed of the problem early through an issue report but has not responded yet. Severity: 5.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
VulnerabilitàAlta
CVE-2026-0545 - Missing Authentication for Critical Function in mlflow/mlflow

CVE ID :CVE-2026-0545 Published : April 3, 2026, 6:16 p.m. | 1 hour, 38 minutes ago Description :In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization when the `basic-auth` app is enabled. This vulnerability affects the latest version of the repository. If job execution is enabled (`MLFLOW_SERVER_ENABLE_JOB_EXECUTION=true`) and any job function is allowlisted, any network client can submit, read, search, and cancel jobs without credentials, bypassing basic-auth entirely. This can lead to unauthenticated remote code execution if allowed jobs perform privileged actions such as shell execution or filesystem changes. Even if jobs are deemed safe, this still constitutes an authentication bypass, potentially resulting in job spam, denial of service (DoS), or data exposure in job results. Severity: 9.1 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026

Pagina 658 di 1436

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.