Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 17:18
Ultimo aggiornamento: 15/05/26 17:18
Impatto:
Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 15:50
Ultimo aggiornamento: 15/05/26 15:50
Impatto: Critico (77.05)
Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 15:09
Ultimo aggiornamento: 15/05/26 15:09
Impatto: Medio (63.33)
Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 13:56
Ultimo aggiornamento: 15/05/26 13:56
Impatto: Critico (77.05)
Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 12:36
Ultimo aggiornamento: 15/05/26 12:36
Impatto: Critico (79.48)
Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 11:33
Ultimo aggiornamento: 15/05/26 11:33
Impatto: Alto (65.12)
Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 11:04
Ultimo aggiornamento: 15/05/26 11:04
Impatto: Alto (65.12)
Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 10:35
Ultimo aggiornamento: 15/05/26 10:35
Impatto: Alto (74.48)
Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 10:30
Ultimo aggiornamento: 15/05/26 10:30
Impatto: Critico (78.2)
Agenzia per la cybersicurezza nazionale
Pubblicato: 14/05/26 18:37
Ultimo aggiornamento: 14/05/26 18:37
Impatto: Medio (64.23)
Agenzia per la cybersicurezza nazionale
Pubblicato: 14/05/26 18:04
Ultimo aggiornamento: 14/05/26 18:04
Impatto: Critico (76.66)
Agenzia per la cybersicurezza nazionale
Pubblicato: 14/05/26 16:52
Ultimo aggiornamento: 14/05/26 16:52
Impatto: Alto (65.0)
Agenzia per la cybersicurezza nazionale
Pubblicato: 14/05/26 16:33
Ultimo aggiornamento: 14/05/26 16:33
Impatto: Medio (63.84)
Agenzia per la cybersicurezza nazionale
Pubblicato: 14/05/26 16:23
Ultimo aggiornamento: 14/05/26 16:23
Impatto: Critico (75.89)
Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 17:18
Ultimo aggiornamento: 15/05/26 17:18
Impatto:
Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 15:50
Ultimo aggiornamento: 15/05/26 15:50
Impatto: Critico (77.05)
Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 15:09
Ultimo aggiornamento: 15/05/26 15:09
Impatto: Medio (63.33)
Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 13:56
Ultimo aggiornamento: 15/05/26 13:56
Impatto: Critico (77.05)
Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 12:36
Ultimo aggiornamento: 15/05/26 12:36
Impatto: Critico (79.48)
Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 11:33
Ultimo aggiornamento: 15/05/26 11:33
Impatto: Alto (65.12)
Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 11:04
Ultimo aggiornamento: 15/05/26 11:04
Impatto: Alto (65.12)
Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 10:35
Ultimo aggiornamento: 15/05/26 10:35
Impatto: Alto (74.48)
Agenzia per la cybersicurezza nazionale
Pubblicato: 15/05/26 10:30
Ultimo aggiornamento: 15/05/26 10:30
Impatto: Critico (78.2)
Agenzia per la cybersicurezza nazionale
Pubblicato: 14/05/26 18:37
Ultimo aggiornamento: 14/05/26 18:37
Impatto: Medio (64.23)
Agenzia per la cybersicurezza nazionale
Pubblicato: 14/05/26 18:04
Ultimo aggiornamento: 14/05/26 18:04
Impatto: Critico (76.66)
Agenzia per la cybersicurezza nazionale
Pubblicato: 14/05/26 16:52
Ultimo aggiornamento: 14/05/26 16:52
Impatto: Alto (65.0)
Agenzia per la cybersicurezza nazionale
Pubblicato: 14/05/26 16:33
Ultimo aggiornamento: 14/05/26 16:33
Impatto: Medio (63.84)
Agenzia per la cybersicurezza nazionale
Pubblicato: 14/05/26 16:23
Ultimo aggiornamento: 14/05/26 16:23
Impatto: Critico (75.89)
CVE: GHSA-gvq2-4mf3-84fh
Vendor: -
CVSS: 9.3
Exploitation: Not available
Changed: 17 hours ago
Description: WordPress Plugin Peugeot Music 1.0 contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious files by sending POST requests to the upload.php endpoint. Attackers can upload files with arbitrary extensions by manipulating the 'name' parameter to execute code from the uploads directory.
CVE: GHSA-5r94-357g-jqj4
Vendor: -
CVSS: 9.3
Exploitation: Not available
Changed: 17 hours ago
Description: GitBucket 4.23.1 contains an unauthenticated remote code execution vulnerability that allows attackers to execute arbitrary commands by exploiting weak secret token generation and insecure file upload functionality. Attackers can brute-force the Blowfish encryption key, upload a malicious JAR plugin via the git-lfs endpoint, and execute system commands through an exposed exploit endpoint.
CVE: GHSA-r572-97xj-7hcj
Vendor: -
CVSS: 9.3
Exploitation: Not available
Changed: 17 hours ago
Description: ACL Analytics versions 11.x through 13.0.0.579 contain an arbitrary code execution vulnerability that allows attackers to execute arbitrary commands by leveraging the EXECUTE function. Attackers can use bitsadmin to download malicious PowerShell scripts and execute them with system privileges to establish reverse shells and gain complete system control.
CVE: CVE-2021-47952
Vendor: -
CVSS: 9.3
Exploitation: Not available
Changed: 1 day ago
Description: python jsonpickle 2.0.0 contains a remote code execution vulnerability that allows attackers to execute arbitrary Python commands by deserializing malicious JSON payloads containing py/repr objects. Attackers can craft JSON strings with py/repr directives that invoke the eval function during deserialization to execute system commands and arbitrary code.
CVE: GHSA-3c39-338m-m4vp
Vendor: -
CVSS: 8.1
Exploitation: N/A
Changed: 2 days ago
Description: Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.
CVE: CVE-2026-20182
Vendor: -
CVSS: 10
Exploitation: N/A
Changed: 3 days ago
Description: May 2026: This security advisory provides the details and fix information for a vulnerability that was discovered and fixed after the was disclosed in February 2026. This new advisory is for a new vulnerability in the control connection handshaking. The section of this advisory includes Show Control Connections guidance to help with system checks. A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to the affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.
CVE: CVE-2026-42208
Vendor: -
CVSS: 9.3
Exploitation: N/A
Changed: 9 days ago
Description: LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.81.16 to before version 1.83.7, a database query used during proxy API key checks mixed the caller-supplied key value into the query text instead of passing it as a separate parameter. An unauthenticated attacker could send a specially crafted Authorization header to any LLM API route (for example POST /chat/completions) and reach this query through the proxy's error-handling path. An attacker could read data from the proxy's database and may be able to modify it, leading to unauthorised access to the proxy and the credentials it manages. This issue has been patched in version 1.83.7.
CVE: GHSA-85qr-8rxc-62gv
Vendor: -
CVSS: 9.3
Exploitation: N/A
Changed: 11 days ago
Description: cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.
CVE: CVE-2026-7182
Vendor: -
CVSS: 0.12
Exploitation: 0.12%
Changed: 2 days ago
Description: Diagram's export module is vulnerable to Path Traversal in src attribute due to lack of HTML sanitization. An unauthenticated user could craft the html payload which could include local files from the server and display them in the generated pdf. This issue was fixed in version 1.1.1.
CVE: GHSA-cj88-m5vv-89m3
Vendor: -
CVSS: 0.04
Exploitation: 0.04%
Changed: 2 days ago
Description: PDF Export Module used in DHTMLX's products Gantt and Scheduler is vulnerable to Path Traversal due to lack of HTML sanitization. An unauthenticated user could craft the html payload which could include local files from the server and display them in the generated PDF. This issue was fixed in PDF Export Module version 0.7.6.
CVE: CVE-2026-41553
Vendor: -
CVSS: 0.39
Exploitation: 0.39%
Changed: 2 days ago
Description: PDF Export Module used in DHTMLX's products Gantt and Scheduler is vulnerable to Remote Code Execution due to lack of "data" parameter sanitization. An unauthenticated attacker can inject the malicious JavaScript code to the parameter whose value is processed by Node.js and subsequently executed. This can lead to server compromise. This issue was fixed in PDF Export Module version 0.7.6.
CVE: CVE-2026-44088
Vendor: -
CVSS: 0.34
Exploitation: 0.34%
Changed: 2 days ago
Description: SzafirHost verifies the signature of the downloaded JAR file using class JarInputStream (reading from the beginning of the file), but loads classes using class JarFile/URLClassLoader (reading the Central Directory from the end). It can lead to remote code execution by allowing an attacker to combine a genuine, signed JAR file with a malicious ZIP file, causing the verification to pass but the malicious class to be loaded. This issue was fixed in version 1.2.1.