Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

18048 risultati

VulnerabilitàAlta
CVE-2026-29909 - MRCMS Directory Enumeration Vulnerability

CVE ID :CVE-2026-29909 Published : March 30, 2026, 5:16 p.m. | 37 minutes ago Description :MRCMS V3.1.2 contains an unauthenticated directory enumeration vulnerability in the file management module. The /admin/file/list.do endpoint lacks authentication controls and proper input validation, allowing remote attackers to enumerate directory contents on the server without any credentials. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE30 mar 2026
VulnerabilitàAlta
CVE-2026-27508 - Smoothwall Express < 3.1 Update 13 Reflected XSS in redirect.cgi via url Parameter

CVE ID :CVE-2026-27508 Published : March 30, 2026, 5:16 p.m. | 37 minutes ago Description :Smoothwall Express versions prior to 3.1 Update 13 contain a reflected cross-site scripting vulnerability in the /redirect.cgi endpoint due to improper sanitation of the url parameter. Attackers can craft malicious URLs with javascript: schemes that execute arbitrary JavaScript in victims' browsers when clicked through the unsanitized link. Severity: 5.4 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE30 mar 2026
VulnerabilitàAlta
CVE-2026-29954 - KubePlus SSRF/Arbitrary HTTP Header Injection

CVE ID :CVE-2026-29954 Published : March 30, 2026, 5:16 p.m. | 37 minutes ago Description :In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components have an SSRF vulnerability when processing the chartURL field of ResourceComposition resources. The field is only URL-encoded without validating the target address. More critically, when kubeconfiggenerator uses wget to download charts, the chartURL is directly concatenated into the command, allowing attackers to inject wget's `--header` option to achieve arbitrary HTTP header injection. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE30 mar 2026
VulnerabilitàAlta
CVE-2026-26352 - Smoothwall Express < 3.1 Update 13 Stored XSS in vpnmain.cgi via VPN_IP Parameter

CVE ID :CVE-2026-26352 Published : March 30, 2026, 5:16 p.m. | 37 minutes ago Description :Smoothwall Express versions prior to 3.1 Update 13 contain a stored cross-site scripting vulnerability in the /cgi-bin/vpnmain.cgi script due to improper sanitation of the VPN_IP parameter. Authenticated attackers can inject arbitrary JavaScript through VPN configuration settings that executes when the affected page is viewed by other users. Severity: 5.4 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE30 mar 2026
VulnerabilitàAlta
CVE-2026-4046 - iconv crash due to assertion failure with untrusted input

CVE ID :CVE-2026-4046 Published : March 30, 2026, 6:16 p.m. | 1 hour, 37 minutes ago Description :The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application. This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them. Severity: 7.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE30 mar 2026
News
15-Year-Old strongSwan Flaw Lets Attackers Crash VPNs via Integer Underflow

15-Year-Old strongSwan Flaw Lets Attackers Crash VPNs via Integer Underflow A 15-year-old flaw in strongSwan’s EAP-TTLS plugin could let hackers knock VPNs offline. Research from Bishop Fox reveals how a simple math error leads to massive memory corruption and service collaps ... Read more Published Date: Mar 30, 2026 (1 day, 17 hours ago) Vulnerabilities has been mentioned in this article. CVE-2026-25075 CVE-2025-31324

CVEfeed Newsroom30 mar 2026
VulnerabilitàAlta
CVE-2025-66215 - OpenSC: Stack-buffer-overflow WRITE in card-oberthur

CVE ID :CVE-2025-66215 Published : March 30, 2026, 5:06 p.m. | 47 minutes ago Description :OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, an attacker with physical access to the computer at the time user or administrator uses a token can cause a stack-buffer-overflow WRITE in card-oberthur. The attack requires crafted USB device or smart card that would present the system with specially crafted responses to the APDUs. This issue has been patched in version 0.27.0. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE30 mar 2026
VulnerabilitàAlta
CVE-2025-66038 - OpenSC: `sc_compacttlv_find_tag` can return out-of-bounds pointers

CVE ID :CVE-2025-66038 Published : March 30, 2026, 5:03 p.m. | 50 minutes ago Description :OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, sc_compacttlv_find_tag searches a compact-TLV buffer for a given tag. In compact-TLV, a single byte encodes the tag (high nibble) and value length (low nibble). With a 1-byte buffer {0x0A}, the encoded element claims tag=0 and length=10 but no value bytes follow. Calling sc_compacttlv_find_tag with search tag 0x00 returns a pointer equal to buf+1 and outlen=10 without verifying that the claimed value length fits within the remaining buffer. In cases where the sc_compacttlv_find_tag is provided untrusted data (such as being read from cards/files), attackers may be able to influence it to return out-of-bounds pointers leading to downstream memory corruption when subsequent code tries to dereference the pointer. This issue has been patched in version 0.27.0. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE30 mar 2026
VulnerabilitàAlta
CVE-2025-66037 - OpenSC: Out of Bounds vulnerability

CVE ID :CVE-2025-66037 Published : March 30, 2026, 5:01 p.m. | 52 minutes ago Description :OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, feeding a crafted input to the fuzz_pkcs15_reader harness causes OpenSC to perform an out-of-bounds heap read in the X.509/SPKI handling path. Specifically, sc_pkcs15_pubkey_from_spki_fields() allocates a zero-length buffer and then reads one byte past the end of that allocation. This issue has been patched in version 0.27.0. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE30 mar 2026
VulnerabilitàAlta
CVE-2026-5125 - raine consult-llm-mcp server.ts child_process.execSync os command injection

CVE ID :CVE-2026-5125 Published : March 30, 2026, 6:16 p.m. | 1 hour, 37 minutes ago Description :A vulnerability was detected in raine consult-llm-mcp up to 2.5.3. Affected by this vulnerability is the function child_process.execSync of the file src/server.ts. The manipulation of the argument git_diff.base_ref/git_diff.files results in os command injection. The attack is only possible with local access. The exploit is now public and may be used. Upgrading to version 2.5.4 addresses this issue. The patch is identified as 4abf297b34e5e8a9cb364b35f52c5f0ca1d599d3. Upgrading the affected component is recommended. Severity: 5.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE30 mar 2026
VulnerabilitàAlta
CVE-2025-49010 - OpenSC: Stack-buffer-overflow WRITE in GET RESPONSE

CVE ID :CVE-2025-49010 Published : March 30, 2026, 4:59 p.m. | 54 minutes ago Description :OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, an attacker with physical access to the computer at the time user or administrator uses a token can cause a stack-buffer-overflow write in GET RESPONSE. The attack requires crafted USB device or smart card that would present the system with specially crafted responses to the APDUs. This issue has been patched in version 0.27.0. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE30 mar 2026
VulnerabilitàAlta
CVE-2026-5123 - osrg GoBGP bgp.go DecodeFromBytes off-by-one

CVE ID :CVE-2026-5123 Published : March 30, 2026, 4:16 p.m. | 1 hour, 37 minutes ago Description :A weakness has been identified in osrg GoBGP up to 4.3.0. This impacts the function DecodeFromBytes of the file pkg/packet/bgp/bgp.go. Executing a manipulation of the argument data[1] can lead to off-by-one. The attack may be launched remotely. Attacks of this nature are highly complex. The exploitability is said to be difficult. This patch is called 67c059413470df64bc20801c46f64058e88f800f. A patch should be applied to remediate this issue. Severity: 6.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE30 mar 2026

Pagina 799 di 1504

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.