Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

9440 risultati

VulnerabilitàAlta
CVE-2026-5179 - SourceCodester Simple Doctors Appointment System login.php sql injection

CVE ID :CVE-2026-5179 Published : March 31, 2026, 5:16 a.m. | 4 hours, 38 minutes ago Description :A vulnerability was detected in SourceCodester Simple Doctors Appointment System 1.0. This affects an unknown part of the file /admin/login.php. The manipulation of the argument Username results in sql injection. The attack can be executed remotely. The exploit is now public and may be used. Severity: 7.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-1710 - WooPayments <= 10.5.1 - Missing Authorization to Unauthenticated Plugin Settings Update via save_upe_appearance_ajax

CVE ID :CVE-2026-1710 Published : March 31, 2026, 5:16 a.m. | 2 hours, 38 minutes ago Description :The WooPayments: Integrated WooCommerce Payments plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'save_upe_appearance_ajax' function in all versions up to, and including, 10.5.1. This makes it possible for unauthenticated attackers to update plugin settings. Severity: 6.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-1797 - Truebooker - Appointment Booking and Scheduler Plugin <= 1.1.4 - Sensitive Information Exposure via Views Files

CVE ID :CVE-2026-1797 Published : March 31, 2026, 5:16 a.m. | 4 hours, 38 minutes ago Description :The Appointment Booking and Scheduler Plugin – Truebooker plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.1.4 through views php files. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed views php files via direct access. Severity: 5.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
News
Notepad++ v8.9.3 Released Addressing cURL Security Vulnerability and Crash Issues

Notepad++ v8.9.3 Released Addressing cURL Security Vulnerability and Crash Issues Notepad++ has officially released version 8.9.3, delivering critical security patches, structural performance enhancements, and resolutions for persistent crash issues. This update finalizes the text ... Read more Published Date: Mar 31, 2026 (1 day, 8 hours ago) Vulnerabilities has been mentioned in this article. CVE-2025-14819

CVEfeed Newsroom4g fa
VulnerabilitàAlta
CVE-2026-5177 - Totolink A3300R cstecgi.cgi setWiFiBasicCfg command injection

CVE ID :CVE-2026-5177 Published : March 31, 2026, 3:15 a.m. | 4 hours, 38 minutes ago Description :A weakness has been identified in Totolink A3300R 17.0.0cu.557_b20221024. Affected by this vulnerability is the function setWiFiBasicCfg of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument rxRate can lead to command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. Severity: 6.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-34073 - cryptography has incomplete DNS name constraint enforcement on peer names

CVE ID :CVE-2026-34073 Published : March 31, 2026, 3:15 a.m. | 4 hours, 38 minutes ago Description :cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Prior to version 46.0.6, DNS name constraints were only validated against SANs within child certificates, and not the "peer name" presented during each validation. Consequently, cryptography would allow a peer named bar.example.com to validate against a wildcard leaf certificate for *.example.com, even if the leaf's parent certificate (or upwards) contained an excluded subtree constraint for bar.example.com. This issue has been patched in version 46.0.6. Severity: 1.7 | LOW Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-34041 - act: Unrestricted set-env and add-path command processing enables environment injection

CVE ID :CVE-2026-34041 Published : March 31, 2026, 3:15 a.m. | 4 hours, 38 minutes ago Description :act is a project which allows for local running of github actions. Prior to version 0.2.86, act unconditionally processes the deprecated ::set-env:: and ::add-path:: workflow commands, which was disabled due to environment injection risks. When a workflow step echoes untrusted data to stdout, an attacker can inject these commands to set arbitrary environment variables or modify the PATH for all subsequent steps in the job. This issue has been patched in version 0.2.86. Severity: 7.7 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-34043 - Serialize JavaScript has CPU Exhaustion Denial of Service via crafted array-like objects

CVE ID :CVE-2026-34043 Published : March 31, 2026, 3:15 a.m. | 4 hours, 38 minutes ago Description :Serialize JavaScript to a superset of JSON that includes regular expressions and functions. Prior to version 7.0.5, there is a Denial of Service (DoS) vulnerability caused by CPU exhaustion. When serializing a specially crafted "array-like" object (an object that inherits from Array.prototype but has a very large length property), the process enters an intensive loop that consumes 100% CPU and hangs indefinitely. This issue has been patched in version 7.0.5. Severity: 5.9 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-34042 - act: actions/cache server allows malicious cache injection

CVE ID :CVE-2026-34042 Published : March 31, 2026, 3:15 a.m. | 4 hours, 38 minutes ago Description :act is a project which allows for local running of github actions. Prior to version 0.2.86, act's built in actions/cache server listens to connections on all interfaces and allows anyone who can connect to it including someone anywhere on the internet to create caches with arbitrary keys and retrieve all existing caches. If they can predict which cache keys will be used by local actions, they can create malicious caches containing whatever files they please most likely allowing arbitrary remote code execution within the docker container. This issue has been patched in version 0.2.86. Severity: 8.2 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-34054 - openssl on Windows built with openssldir set from the build machine (Uncontrolled Search Path Element)

CVE ID :CVE-2026-34054 Published : March 31, 2026, 3:15 a.m. | 4 hours, 38 minutes ago Description :vcpkg is a free and open-source C/C++ package manager. Prior to version 3.6.1#3, vcpkg's Windows builds of OpenSSL set openssldir to a path on the build machine, making that path be attackable later on customer machines. This issue has been patched in version 3.6.1#3. Severity: 7.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-34060 - Ruby LSP has arbitrary code execution through branch setting

CVE ID :CVE-2026-34060 Published : March 31, 2026, 3:15 a.m. | 4 hours, 38 minutes ago Description :Ruby LSP is an implementation of the language server protocol for Ruby. Prior to Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9, the rubyLsp.branch VS Code workspace setting was interpolated without sanitization into a generated Gemfile, allowing arbitrary Ruby code execution when a user opens a project containing a malicious .vscode/settings.json. This issue has been patched in Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9. Severity: 7.1 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-34070 - LangChain Core has Path Traversal vulnerabilites in legacy `load_prompt` functions

CVE ID :CVE-2026-34070 Published : March 31, 2026, 3:15 a.m. | 4 hours, 38 minutes ago Description :LangChain is a framework for building agents and LLM-powered applications. Prior to version 1.2.22, multiple functions in langchain_core.prompts.loading read files from paths embedded in deserialized config dicts without validating against directory traversal or absolute path injection. When an application passes user-influenced prompt configurations to load_prompt() or load_prompt_from_config(), an attacker can read arbitrary files on the host filesystem, constrained only by file-extension checks (.txt for templates, .json/.yaml for examples). This issue has been patched in version 1.2.22. Severity: 7.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa

Pagina 73 di 787

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.