Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

17341 risultati

VulnerabilitàAlta
CVE-2026-5474 - NASA cFS CCSDS Packet Header to_lab_passthru_encode.c CFE_MSG_GetSize heap-based overflow

CVE ID :CVE-2026-5474 Published : April 3, 2026, 5:16 p.m. | 2 hours, 38 minutes ago Description :A vulnerability was found in NASA cFS up to 7.0.0. This affects the function CFE_MSG_GetSize of the file apps/to_lab/fsw/src/to_lab_passthru_encode.c of the component CCSDS Packet Header Handler. Performing a manipulation results in heap-based buffer overflow. The attacker must have access to the local network to execute the attack. The project was informed of the problem early through an issue report but has not responded yet. Severity: 6.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
VulnerabilitàAlta
CVE-2026-28373 - Stackfield Desktop App Path Traversal Vulnerability

CVE ID :CVE-2026-28373 Published : April 3, 2026, 5:16 p.m. | 2 hours, 38 minutes ago Description :The Stackfield Desktop App before 1.10.2 for macOS and Windows contains a path traversal vulnerability in certain decryption functionality when processing the filePath property. A malicious export can write arbitrary content to any path on the victim's filesystem. Severity: 9.6 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
VulnerabilitàAlta
CVE-2026-5475 - NASA cFS CCSDS Header Size cfe_sb_priv.c CFE_SB_TransmitMsg memory corruption

CVE ID :CVE-2026-5475 Published : April 3, 2026, 6:16 p.m. | 1 hour, 38 minutes ago Description :A vulnerability was determined in NASA cFS up to 7.0.0. This impacts the function CFE_SB_TransmitMsg of the file cfe_sb_priv.c of the component CCSDS Header Size Handler. Executing a manipulation can lead to memory corruption. The project was informed of the problem early through an issue report but has not responded yet. Severity: 5.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
VulnerabilitàAlta
CVE-2026-0545 - Missing Authentication for Critical Function in mlflow/mlflow

CVE ID :CVE-2026-0545 Published : April 3, 2026, 6:16 p.m. | 1 hour, 38 minutes ago Description :In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization when the `basic-auth` app is enabled. This vulnerability affects the latest version of the repository. If job execution is enabled (`MLFLOW_SERVER_ENABLE_JOB_EXECUTION=true`) and any job function is allowlisted, any network client can submit, read, search, and cancel jobs without credentials, bypassing basic-auth entirely. This can lead to unauthenticated remote code execution if allowed jobs perform privileged actions such as shell execution or filesystem changes. Even if jobs are deemed safe, this still constitutes an authentication bypass, potentially resulting in job spam, denial of service (DoS), or data exposure in job results. Severity: 9.1 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
News
14,000+ F5 BIG-IP APM Exposed Online as Attackers Actively Exploiting RCE Vulnerability

14,000+ F5 BIG-IP APM Exposed Online as Attackers Actively Exploiting RCE Vulnerability A critical security flaw in F5’s BIG-IP Access Policy Manager (APM) is currently under active exploitation, leaving thousands of enterprise networks at risk. The vulnerability, officially tracked as C ... Read more Published Date: Apr 03, 2026 (2 days, 23 hours ago) Vulnerabilities has been mentioned in this article. CVE-2025-53521

CVEfeed Newsroom03 apr 2026
VulnerabilitàAlta
CVE-2026-5471 - Investory Toy Planet Trouble App app.investory.toyfactory google-services-desktop.json hard-coded key

CVE ID :CVE-2026-5471 Published : April 3, 2026, 4:16 p.m. | 3 hours, 38 minutes ago Description :A vulnerability was detected in Investory Toy Planet Trouble App up to 1.5.5 on Android. Impacted is an unknown function of the file assets/google-services-desktop.json of the component app.investory.toyfactory. The manipulation of the argument current_key results in use of hard-coded cryptographic key . The attack must be initiated from a local position. The exploit is now public and may be used. Severity: 3.3 | LOW Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
VulnerabilitàAlta
CVE-2026-5472 - ProjectsAndPrograms School Management System Profile Picture settings.php unrestricted upload

CVE ID :CVE-2026-5472 Published : April 3, 2026, 4:16 p.m. | 3 hours, 38 minutes ago Description :A flaw has been found in ProjectsAndPrograms School Management System up to 6b6fae5426044f89c08d0dd101c7fa71f9042a59. The affected element is an unknown function of the file /admin_panel/settings.php of the component Profile Picture Handler. This manipulation of the argument File causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been published and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. Severity: 6.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
VulnerabilitàAlta
CVE-2026-35214 - Budibase: Path traversal in plugin file upload enables arbitrary directory deletion and file write

CVE ID :CVE-2026-35214 Published : April 3, 2026, 4:16 p.m. | 3 hours, 38 minutes ago Description :Budibase is an open-source low-code platform. Prior to version 3.33.4, the plugin file upload endpoint (POST /api/plugin/upload) passes the user-supplied filename directly to createTempFolder() without sanitizing path traversal sequences. An attacker with Global Builder privileges can craft a multipart upload with a filename containing ../ to delete arbitrary directories via rmSync and write arbitrary files via tarball extraction to any filesystem path the Node.js process can access. This issue has been patched in version 3.33.4. Severity: 8.7 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
VulnerabilitàAlta
CVE-2026-35216 - Budibase: Unauthenticated Remote Code Execution via Webhook Trigger and Bash Automation Step

CVE ID :CVE-2026-35216 Published : April 3, 2026, 4:16 p.m. | 3 hours, 38 minutes ago Description :Budibase is an open-source low-code platform. Prior to version 3.33.4, an unauthenticated attacker can achieve Remote Code Execution (RCE) on the Budibase server by triggering an automation that contains a Bash step via the public webhook endpoint. No authentication is required to trigger the exploit. The process executes as root inside the container. This issue has been patched in version 3.33.4. Severity: 9.0 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
VulnerabilitàAlta
CVE-2026-35218 - Budibase: Stored XSS via unsanitized entity names rendered with {@html} in Builder Command Palette

CVE ID :CVE-2026-35218 Published : April 3, 2026, 4:16 p.m. | 3 hours, 38 minutes ago Description :Budibase is an open-source low-code platform. Prior to version 3.32.5, Budibase's Builder Command Palette renders entity names (tables, views, queries, automations) using Svelte's {@html} directive without any sanitization. An authenticated user with Builder access can create a table, automation, view, or query whose name contains an HTML payload (e.g. ). When any Builder-role user in the same workspace opens the Command Palette (Ctrl+K), the payload executes in their browser, stealing their session cookie and enabling full account takeover. This issue has been patched in version 3.32.5. Severity: 8.7 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
VulnerabilitàAlta
CVE-2026-31818 - Budibase: Server-Side Request Forgery via REST Connector with Empty Default Blacklist

CVE ID :CVE-2026-31818 Published : April 3, 2026, 4:16 p.m. | 3 hours, 38 minutes ago Description :Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completely ineffective because the BLACKLIST_IPS environment variable is not set by default in any of the official deployment configurations. When this variable is empty, the blacklist function unconditionally returns false, allowing all requests through without restriction. This issue has been patched in version 3.33.4. Severity: 9.6 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026
VulnerabilitàAlta
CVE-2026-25044 - Budibase: Command Injection in Bash Automation Step

CVE ID :CVE-2026-25044 Published : April 3, 2026, 3:38 p.m. | 16 minutes ago Description :Budibase is an open-source low-code platform. Prior to version 3.33.4, the bash automation step executes user-provided commands using execSync without proper sanitization or validation. User input is processed through processStringSync which allows template interpolation, potentially allowing arbitrary command execution. This issue has been patched in version 3.33.4. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE03 apr 2026

Pagina 668 di 1446

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.