Cybersecurity & Regolamentazione UE

News & Sicurezza

Aggiornamenti da ENISA, NVD e le principali fonti di cybersecurity europee. Tutto quello che un Responsabile Tecnico deve sapere.

9795 risultati

News
Why ransomware is now after your data — and how to protect your home storage | Kaspersky official blog

Why ransomware is now after your data — and how to protect your home storage | Kaspersky official blog backup Personal backups and home NAS are now in cybercriminals’ crosshairs. We break down exactly how hackers encrypt your data — and how you can stop them. Tom Fosters March 31, 2026 Today — March 31 ... Read more Published Date: Mar 31, 2026 (1 day, 12 hours ago) Vulnerabilities has been mentioned in this article. CVE-2024-10443

CVEfeed Newsroom6g fa
News
Amerikaanse overheid krijgt drie dagen voor installatie Citrix- en F5-updates

Amerikaanse overheid krijgt drie dagen voor installatie Citrix- en F5-updates Federale Amerikaanse overheidsdiensten moeten beveiligingsupdates voor twee actief aangevallen kwetsbaarheden in producten van Citrix en F5 binnen drie dagen installeren. Het Amerikaanse cyberagentsch ... Read more Published Date: Mar 31, 2026 (1 day, 13 hours ago) Vulnerabilities has been mentioned in this article. CVE-2026-3055 CVE-2025-53521

CVEfeed Newsroom6g fa
News
Public PoC Exploit and Full Details Disclosed for Nginx UI’s 9.4 CVSS Backup Flaw

Public PoC Exploit and Full Details Disclosed for Nginx UI’s 9.4 CVSS Backup Flaw The “one-click” simplicity of Nginx UI has hit a major security roadblock. Researchers have unveiled a critical vulnerability in the platform’s backup and restore mechanism, identified as CVE-2026-330 ... Read more Published Date: Mar 31, 2026 (1 day, 13 hours ago) Vulnerabilities has been mentioned in this article.

CVEfeed Newsroom6g fa
VulnerabilitàAlta
CVE-2026-34156 - NocoBase Affected by Sandbox Escape to RCE via console._stdout Prototype Chain Traversal in Workflow Script Node

CVE ID :CVE-2026-34156 Published : March 31, 2026, 1:33 p.m. | 21 minutes ago Description :NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.28, NocoBase's Workflow Script Node executes user-supplied JavaScript inside a Node.js vm sandbox with a custom require allowlist (controlled by WORKFLOW_SCRIPT_MODULES env var). However, the console object passed into the sandbox context exposes host-realm WritableWorkerStdio stream objects via console._stdout and console._stderr. An authenticated attacker can traverse the prototype chain to escape the sandbox and achieve Remote Code Execution as root. This issue has been patched in version 2.0.28. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE6g fa
VulnerabilitàAlta
CVE-2026-34155 - RAUC: Improper Signing of Plain Bundles Exceeding 2 GiB

CVE ID :CVE-2026-34155 Published : March 31, 2026, 1:28 p.m. | 26 minutes ago Description :RAUC controls the update process on embedded Linux systems. Prior to version 1.15.2, RAUC bundles using the 'plain' format exceeding a payload size of 2 GiB cause an integer overflow which results in a signature which covers only the first few bytes of the payload. Given such a bundle with a legitimate signature, an attacker can modify the part of the payload which is not covered by the signature. This issue has been patched in version 1.15.2. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE6g fa
VulnerabilitàAlta
CVE-2026-3308 - CVE-2026-3308

CVE ID :CVE-2026-3308 Published : March 31, 2026, 1:13 p.m. | 41 minutes ago Description :An integer overflow vulnerability in 'pdf-image.c' in Artifex's MuPDF version 1.27.0 allows an attacker to maliciously craft a PDF that can trigger an integer overflow within the 'pdf_load_image_imp' function. This allows a heap out-of-bounds write that could be exploited for arbitrary code execution. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVEfeed CVE6g fa
VulnerabilitàAlta
CVE-2026-5198 (CVSS 7.3)

A vulnerability was determined in code-projects Student Membership System 1.0. The impacted element is an unknown function of the file /admin/index.php of the component Admin Login. This manipulation of the argument username/password causes sql injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

NVD (NIST)6g fa
VulnerabilitàAlta
CVE-2026-4267 (CVSS 7.2)

The Query Monitor – The developer tools panel for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘$_SERVER['REQUEST_URI']’ parameter in all versions up to, and including, 3.20.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

NVD (NIST)6g fa
VulnerabilitàAlta
CVE-2026-34509 (CVSS 7.5)

OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended authorization checks. When a team/channel route allowlist is configured with an empty groupAllowFrom parameter, the message handler synthesizes wildcard sender authorization, permitting any sender in the matched team/channel to trigger replies in allowlisted Teams routes.

NVD (NIST)6g fa
VulnerabilitàAlta
CVE-2026-34506 (CVSS 7.5)

OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended authorization checks. When a team/channel route allowlist is configured with an empty groupAllowFrom parameter, the message handler synthesizes wildcard sender authorization, permitting any sender in the matched team/channel to trigger replies in allowlisted Teams routes.

NVD (NIST)6g fa
VulnerabilitàCritica
CVE-2026-34505 (CVSS 9.8)

OpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets. Attackers can submit repeated authentication requests with invalid secrets without triggering rate limit responses, enabling systematic secret guessing and subsequent forged webhook submission.

NVD (NIST)6g fa
VulnerabilitàAlta
CVE-2026-32988 (CVSS 7.5)

OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability in fs-bridge staged writes where temporary file creation and population are not pinned to a verified parent directory. Attackers can exploit a race condition in parent-path alias changes to write attacker-controlled bytes outside the intended validated path before the final guarded replace step executes.

NVD (NIST)6g fa

Pagina 96 di 817

Resta aggiornato sulla cybersecurity

Iscriviti a CodersRegistry per ricevere gli aggiornamenti più importanti su regolamentazione EU e vulnerabilità critiche.