Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

9479 risultati

VulnerabilitàAlta
CVE-2026-34054 - openssl on Windows built with openssldir set from the build machine (Uncontrolled Search Path Element)

CVE ID :CVE-2026-34054 Published : March 31, 2026, 3:15 a.m. | 4 hours, 38 minutes ago Description :vcpkg is a free and open-source C/C++ package manager. Prior to version 3.6.1#3, vcpkg's Windows builds of OpenSSL set openssldir to a path on the build machine, making that path be attackable later on customer machines. This issue has been patched in version 3.6.1#3. Severity: 7.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-34060 - Ruby LSP has arbitrary code execution through branch setting

CVE ID :CVE-2026-34060 Published : March 31, 2026, 3:15 a.m. | 4 hours, 38 minutes ago Description :Ruby LSP is an implementation of the language server protocol for Ruby. Prior to Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9, the rubyLsp.branch VS Code workspace setting was interpolated without sanitization into a generated Gemfile, allowing arbitrary Ruby code execution when a user opens a project containing a malicious .vscode/settings.json. This issue has been patched in Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9. Severity: 7.1 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-34070 - LangChain Core has Path Traversal vulnerabilites in legacy `load_prompt` functions

CVE ID :CVE-2026-34070 Published : March 31, 2026, 3:15 a.m. | 4 hours, 38 minutes ago Description :LangChain is a framework for building agents and LLM-powered applications. Prior to version 1.2.22, multiple functions in langchain_core.prompts.loading read files from paths embedded in deserialized config dicts without validating against directory traversal or absolute path injection. When an application passes user-influenced prompt configurations to load_prompt() or load_prompt_from_config(), an attacker can read arbitrary files on the host filesystem, constrained only by file-extension checks (.txt for templates, .json/.yaml for examples). This issue has been patched in version 1.2.22. Severity: 7.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-32727 - SciTokens: Authorization Bypass via Path Traversal in Scope Validation

CVE ID :CVE-2026-32727 Published : March 31, 2026, 3:15 a.m. | 2 hours, 38 minutes ago Description :SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.7, the Enforcer is vulnerable to a path traversal attack where an attacker can use dot-dot (..) in the scope claim of a token to escape the intended directory restriction. This occurs because the library normalizes both the authorized path (from the token) and the requested path (from the application) before comparing them using startswith. This issue has been patched in version 1.9.7. Severity: 8.1 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-34036 - Dolibarr Core Discloses Sensitive Data via Authenticated Local File Inclusion in selectobject.php

CVE ID :CVE-2026-34036 Published : March 31, 2026, 3:15 a.m. | 4 hours, 38 minutes ago Description :Dolibarr is an enterprise resource planning (ERP) and customer relationship management (CRM) software package. In versions 22.0.4 and prior, there is a Local File Inclusion (LFI) vulnerability in the core AJAX endpoint /core/ajax/selectobject.php. By manipulating the objectdesc parameter and exploiting a fail-open logic flaw in the core access control function restrictedArea(), an authenticated user with no specific privileges can read the contents of arbitrary non-PHP files on the server (such as .env, .htaccess, configuration backups, or logs…). At time of publication, there are no publicly available patches. Severity: 6.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-34040 - Moby: AuthZ plugin bypass with oversized request body

CVE ID :CVE-2026-34040 Published : March 31, 2026, 3:15 a.m. | 4 hours, 38 minutes ago Description :Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows attackers to bypass authorization plugins (AuthZ). This issue has been patched in version 29.3.1. Severity: 8.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-32716 - SciTokens: Authorization Bypass via Incorrect Scope Path Prefix Checking

CVE ID :CVE-2026-32716 Published : March 31, 2026, 3:15 a.m. | 2 hours, 38 minutes ago Description :SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.6, the Enforcer incorrectly validates scope paths by using a simple prefix match (startswith). This allows a token with access to a specific path (e.g., /john) to also access sibling paths that start with the same prefix (e.g., /johnathan, /johnny), which is an Authorization Bypass. This issue has been patched in version 1.9.6. Severity: 8.1 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-33997 - Moby: Off-by-one error in plugin privilege validation

CVE ID :CVE-2026-33997 Published : March 31, 2026, 3:15 a.m. | 2 hours, 38 minutes ago Description :Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows plugins privilege validation to be bypassed during docker plugin install. Due to an error in the daemon's privilege comparison logic, the daemon may incorrectly accept a privilege set that differs from the one approved by the user. Plugins that request exactly one privilege are also affected, because no comparison is performed at all. This issue has been patched in version 29.3.1. Severity: 6.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-32714 - SciTokens vulnerable to SQL Injection in KeyCache

CVE ID :CVE-2026-32714 Published : March 31, 2026, 3:15 a.m. | 2 hours, 38 minutes ago Description :SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.6, the KeyCache class in scitokens was vulnerable to SQL Injection because it used Python's str.format() to construct SQL queries with user-supplied data (such as issuer and key_id). This allowed an attacker to execute arbitrary SQL commands against the local SQLite database. This issue has been patched in version 1.9.6. Severity: 9.8 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-5178 - Totolink A3300R cstecgi.cgi setIptvCfg command injection

CVE ID :CVE-2026-5178 Published : March 31, 2026, 4:16 a.m. | 3 hours, 37 minutes ago Description :A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_b20221024. Affected by this issue is the function setIptvCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument vlanPriLan3 leads to command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. Severity: 6.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE4g fa
VulnerabilitàAlta
CVE-2026-5176 (CVSS 7.3)

A security flaw has been discovered in Totolink A3300R 17.0.0cu.557_b20221024. Affected is the function setSyslogCfg of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument provided results in command injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.

NVD (NIST)4g fa
VulnerabilitàAlta
CVE-2026-4020 (CVSS 7.5)

The Gravity SMTP plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.1.4. This is due to a REST API endpoint registered at /wp-json/gravitysmtp/v1/tests/mock-data with a permission_callback that unconditionally returns true, allowing any unauthenticated visitor to access it. When the ?page=gravitysmtp-settings query parameter is appended, the plugin's register_connector_data() method populates internal connector data, causing the endpoint to return approximately 365 KB of JSON containing the full System Report. This makes it possible for unauthenticated attackers to retrieve detailed system configuration data including PHP version, loaded extensions, web server version, document root path, database server type and version, WordPress version, all active plugins with versions, active theme, WordPress configuration details, database table names, and any API keys/tokens configured in the plugin.

NVD (NIST)4g fa

Pagina 77 di 790

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.