Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

17626 risultati

VulnerabilitàAlta
CVE-2026-5323 - priyankark a11y-mcp index.js A11yServer server-side request forgery

CVE ID :CVE-2026-5323 Published : April 2, 2026, 7:15 a.m. | 38 minutes ago Description :A vulnerability was found in priyankark a11y-mcp up to 1.0.5. This vulnerability affects the function A11yServer of the file src/index.js. The manipulation results in server-side request forgery. The attack must be initiated from a local position. The exploit has been made public and could be used. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases. Upgrading to version 1.0.6 is able to resolve this issue. The patch is identified as e3e11c9e8482bd06b82fd9fced67be4856f0dffc. It is recommended to upgrade the affected component. The vendor acknowledged the issue but provides additional context for the CVSS rating: "a11y-mcp is a local stdio MCP server - it has no HTTP endpoint and is not network-accessible. The caller is always the local user or an LLM acting on their behalf with user approval." Severity: 5.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026
News
Critical 9.2 Severity Flaw in Gigabyte Control Center Exposed

Critical 9.2 Severity Flaw in Gigabyte Control Center Exposed According to a security advisory promulgated by Gigabyte, the Gigabyte Control Center (GCC) is affected by an arbitrary file-write vulnerability; a malevolent actor who successfully weaponizes this fr ... Read more Published Date: Apr 02, 2026 (23 hours, 47 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2026-5281 CVE-2026-3502 CVE-2026-33032 CVE-2026-4415 CVE-2026-32760 CVE-2026-21962

CVEfeed Newsroom02 apr 2026
News
Symantec DLP Agent Vulnerability Let Attackers Escalate Privileges

Symantec DLP Agent Vulnerability Let Attackers Escalate Privileges A high-severity security flaw has been identified in the Symantec Data Loss Prevention (DLP) Agent for Windows. Tracked as CVE-2026-3991, this vulnerability allows a low-privileged local attacker to e ... Read more Published Date: Apr 02, 2026 (22 hours, 7 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2026-3991

CVEfeed Newsroom02 apr 2026
VulnerabilitàAlta
CVE-2026-5322 (CVSS 7.3)

A vulnerability has been found in AlejandroArciniegas mcp-data-vis bc597e391f184d2187062fd567599a3cb72adf51/de5a51525a69822290eaee569a1ab447b490746d. This affects the function Request of the file src/servers/database/server.js of the component MCP Handler. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.

NVD (NIST)02 apr 2026
VulnerabilitàAlta
CVE-2026-4347 (CVSS 8.1)

The MW WP Form plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation via the 'generate_user_filepath' function and the 'move_temp_file_to_upload_dir' function in all versions up to, and including, 5.1.0. This makes it possible for unauthenticated attackers to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php). The vulnerability is only exploitable if a file upload field is added to the form and the “Saving inquiry data in database” option is enabled.

NVD (NIST)02 apr 2026
VulnerabilitàAlta
CVE-2026-1540 - Spam Protect for Contact Form 7 < 1.2.10 - Editor+ Remote Code Execution

CVE ID :CVE-2026-1540 Published : April 2, 2026, 6:16 a.m. | 1 hour, 38 minutes ago Description :The Spam Protect for Contact Form 7 WordPress plugin before 1.2.10 allows logging to a PHP file, which could allow an attacker with editor access to achieve Remote Code Execution by using a crafted header Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026
VulnerabilitàAlta
CVE-2026-5322 - AlejandroArciniegas mcp-data-vis MCP server.js request sql injection

CVE ID :CVE-2026-5322 Published : April 2, 2026, 5:30 a.m. | 24 minutes ago Description :A vulnerability has been found in AlejandroArciniegas mcp-data-vis bc597e391f184d2187062fd567599a3cb72adf51/de5a51525a69822290eaee569a1ab447b490746d. This affects the function Request of the file src/servers/database/server.js of the component MCP Handler. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026
VulnerabilitàAlta
CVE-2026-4347 - MW WP Form <= 5.1.0 - Unauthenticated Arbitrary File Move via move_temp_file_to_upload_dir

CVE ID :CVE-2026-4347 Published : April 2, 2026, 5:28 a.m. | 26 minutes ago Description :The MW WP Form plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation via the 'generate_user_filepath' function and the 'move_temp_file_to_upload_dir' function in all versions up to, and including, 5.1.0. This makes it possible for unauthenticated attackers to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php). The vulnerability is only exploitable if a file upload field is added to the form and the “Saving inquiry data in database” option is enabled. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026
VulnerabilitàAlta
CVE-2026-5321 - vanna-ai vanna FastAPI/Flask Server cross-domain policy

CVE ID :CVE-2026-5321 Published : April 2, 2026, 5:16 a.m. | 2 hours, 38 minutes ago Description :A flaw has been found in vanna-ai vanna up to 2.0.2. Affected by this issue is some unknown functionality of the component FastAPI/Flask Server. Executing a manipulation can lead to permissive cross-domain policy with untrusted domains. The attack can be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Severity: 5.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026
VulnerabilitàAlta
CVE-2026-5320 (CVSS 7.3)

A vulnerability was detected in vanna-ai vanna up to 2.0.2. Affected by this vulnerability is an unknown functionality of the file /api/vanna/v2/ of the component Chat API Endpoint. Performing a manipulation results in missing authentication. The attack can be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

NVD (NIST)02 apr 2026
VulnerabilitàAlta
CVE-2026-5320 - vanna-ai vanna Chat API Endpoint v2 missing authentication

CVE ID :CVE-2026-5320 Published : April 2, 2026, 5:16 a.m. | 2 hours, 38 minutes ago Description :A vulnerability was detected in vanna-ai vanna up to 2.0.2. Affected by this vulnerability is an unknown functionality of the file /api/vanna/v2/ of the component Chat API Endpoint. Performing a manipulation results in missing authentication. The attack can be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Severity: 7.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026
VulnerabilitàAlta
CVE-2026-5318 - LibRaw JPEG DHT losslessjpeg.cpp initval out-of-bounds write

CVE ID :CVE-2026-5318 Published : April 2, 2026, 3:16 a.m. | 4 hours, 38 minutes ago Description :A weakness has been identified in LibRaw up to 0.22.0. This impacts the function HuffTable::initval of the file src/decompressors/losslessjpeg.cpp of the component JPEG DHT Parser. This manipulation of the argument bits[] causes out-of-bounds write. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 0.22.1 will fix this issue. Patch name: a6734e867b19d75367c05f872ac26322464e3995. It is advisable to upgrade the affected component. Severity: 5.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE02 apr 2026

Pagina 717 di 1469

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.