Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

17508 risultati

VulnerabilitàAlta
CVE-2026-34742 - Model Context Protocol Go SDK: DNS Rebinding Protection Disabled by Default for Servers Running on Localhost

CVE ID :CVE-2026-34742 Published : April 2, 2026, 7:21 p.m. | 33 minutes ago Description :The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.0, the Model Context Protocol (MCP) Go SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication with StreamableHTTPHandler or SSEHandler, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and send requests to the local MCP server. This could allow an attacker to invoke tools or access resources exposed by the MCP server on behalf of the user in those limited circumstances. This issue has been patched in version 1.4.0. Severity: 7.6 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026
VulnerabilitàAlta
CVE-2026-34730 - Copier `_external_data` allows path traversal and absolute-path local file read without unsafe mode

CVE ID :CVE-2026-34730 Published : April 2, 2026, 7:21 p.m. | 33 minutes ago Description :Copier is a library and CLI app for rendering project templates. Prior to version 9.14.1, Copier's _external_data feature allows a template to load YAML files using template-controlled paths. If untrusted templates are in scope, a malicious template can read attacker-chosen YAML-parseable local files that are accessible to the user running Copier and expose their contents in rendered output. This issue has been patched in version 9.14.1. Severity: 5.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026
VulnerabilitàAlta
CVE-2026-34726 - Copier `_subdirectory` allows template root escape via parent-directory traversal

CVE ID :CVE-2026-34726 Published : April 2, 2026, 7:21 p.m. | 33 minutes ago Description :Copier is a library and CLI app for rendering project templates. Prior to version 9.14.1, Copier's _subdirectory setting is documented as the subdirectory to use as the template root. However, the current implementation accepts parent-directory traversal such as .. and uses it directly when selecting the template root. As a result, a template can escape its own directory and make Copier render files from the parent directory without --UNSAFE. This issue has been patched in version 9.14.1. Severity: 4.4 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026
VulnerabilitàAlta
CVE-2026-34581 - goshs has Auth Bypass via Share Token

CVE ID :CVE-2026-34581 Published : April 2, 2026, 7:21 p.m. | 33 minutes ago Description :goshs is a SimpleHTTPServer written in Go. From version 1.1.0 to before version 2.0.0-beta.2, when using the Share Token it is possible to bypass the limited selected file download with all the gosh functionalities, including code exec. This issue has been patched in version 2.0.0-beta.2. Severity: 8.1 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026
VulnerabilitàAlta
CVE-2026-34735 - Hytale Modding Vulnerable to Remote Code Execution via File Upload Bypass in `FileController`

CVE ID :CVE-2026-34735 Published : April 2, 2026, 7:21 p.m. | 33 minutes ago Description :The Hytale Modding Wiki is a free service for Hytale mods to host their documentation & wikis. In version 1.2.0 and prior, the quickUpload() endpoint validates uploaded files by checking their MIME type (via PHP's finfo, which inspects file contents) but constructs the stored filename using the client-supplied file extension from getClientOriginalExtension(). These two checks are independent: an attacker can upload a file whose content passes the MIME allowlist while using a .php extension. The file is stored on the public disk and is directly accessible via URL, allowing server-side code execution. At time of publication no known patches exist. Severity: 8.7 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026
VulnerabilitàAlta
CVE-2026-34736 - Open edX Platform: Account Activation Bypass via activation_key Exposure in REST API

CVE ID :CVE-2026-34736 Published : April 2, 2026, 7:21 p.m. | 33 minutes ago Description :Open edX Platform enables the authoring and delivery of online learning at any scale. From the maple release to before the ulmo release, an unauthenticated attacker can fully bypass the email verification process by combining two issues: the OAuth2 password grant issuing tokens to inactive users (documented behavior) and the activation_key being exposed in the REST API response at /api/user/v1/accounts/. This issue has been patched in the ulmo release. Severity: 5.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026
VulnerabilitàAlta
CVE-2026-34426 (CVSS 7.6)

OpenClaw versions prior to commit b57b680 contain an approval bypass vulnerability due to inconsistent environment variable normalization between approval and execution paths, allowing attackers to inject attacker-controlled environment variables into execution without approval system validation. Attackers can exploit differing normalization logic to discard non-portable keys during approval processing while accepting them at execution time, bypassing operator review and potentially influencing runtime behavior including execution of attacker-controlled binaries.

NVD (NIST)02 apr 2026
VulnerabilitàAlta
CVE-2026-34425 - OpenClaw - Shell-Bleed Protection Preflight Validation Bypass

CVE ID :CVE-2026-34425 Published : April 2, 2026, 7:21 p.m. | 33 minutes ago Description :OpenClaw versions prior to commit 8aceaf5 contain a preflight validation bypass vulnerability in shell-bleed protection that allows attackers to execute blocked script content by using piped or complex command forms that the parser fails to recognize. Attackers can craft commands such as piped execution, command substitution, or subshell invocation to bypass the validateScriptFileForShellBleed() validation checks and execute arbitrary script content that would otherwise be blocked. Severity: 5.4 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026
VulnerabilitàAlta
CVE-2025-43264 - Apple macOS Image Processing Memory Corruption Vulnerability

CVE ID :CVE-2025-43264 Published : April 2, 2026, 7:20 p.m. | 34 minutes ago Description :The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026
VulnerabilitàAlta
CVE-2025-43257 - Apple macOS Sequoia Sandbox Escape

CVE ID :CVE-2025-43257 Published : April 2, 2026, 7:20 p.m. | 34 minutes ago Description :This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.6. An app may be able to break out of its sandbox. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026
VulnerabilitàAlta
CVE-2025-43238 - Apple macOS Integer Overflow Denial of Service

CVE ID :CVE-2025-43238 Published : April 2, 2026, 7:20 p.m. | 34 minutes ago Description :An integer overflow was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to cause unexpected system termination. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026
VulnerabilitàAlta
CVE-2025-43236 - Apple macOS Kernel Type Confusion Vulnerability

CVE ID :CVE-2025-43236 Published : April 2, 2026, 7:20 p.m. | 34 minutes ago Description :A type confusion issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An attacker may be able to cause unexpected app termination. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026

Pagina 694 di 1459

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.