Agenzia per la cybersicurezza nazionale
Pubblicato: 02/04/26 14:37
Ultimo aggiornamento: 02/04/26 14:37
Impatto: Alto (65.76)
Agenzia per la cybersicurezza nazionale
Pubblicato: 02/04/26 14:10
Ultimo aggiornamento: 02/04/26 14:10
Impatto: Medio (64.23)
Agenzia per la cybersicurezza nazionale
Pubblicato: 02/04/26 13:59
Ultimo aggiornamento: 02/04/26 13:59
Impatto: Critico (79.48)
Agenzia per la cybersicurezza nazionale
Pubblicato: 02/04/26 11:38
Ultimo aggiornamento: 02/04/26 11:38
Impatto: Medio (61.66)
Agenzia per la cybersicurezza nazionale
Pubblicato: 02/04/26 11:13
Ultimo aggiornamento: 02/04/26 11:13
Impatto: Medio (63.07)
Agenzia per la cybersicurezza nazionale
Pubblicato: 01/04/26 16:26
Ultimo aggiornamento: 01/04/26 16:26
Impatto: Critico (76.28)
Agenzia per la cybersicurezza nazionale
Pubblicato: 01/04/26 16:04
Ultimo aggiornamento: 01/04/26 16:04
Impatto: Critico (77.94)
Agenzia per la cybersicurezza nazionale
Pubblicato: 01/04/26 11:45
Ultimo aggiornamento: 01/04/26 11:45
Impatto: Critico (79.48)
Agenzia per la cybersicurezza nazionale
Pubblicato: 01/04/26 10:11
Ultimo aggiornamento: 01/04/26 10:11
Impatto: Medio (63.46)
Agenzia per la cybersicurezza nazionale
Pubblicato: 02/04/26 14:37
Ultimo aggiornamento: 02/04/26 14:37
Impatto: Alto (65.76)
Agenzia per la cybersicurezza nazionale
Pubblicato: 02/04/26 14:10
Ultimo aggiornamento: 02/04/26 14:10
Impatto: Medio (64.23)
Agenzia per la cybersicurezza nazionale
Pubblicato: 02/04/26 13:59
Ultimo aggiornamento: 02/04/26 13:59
Impatto: Critico (79.48)
Agenzia per la cybersicurezza nazionale
Pubblicato: 02/04/26 11:38
Ultimo aggiornamento: 02/04/26 11:38
Impatto: Medio (61.66)
Agenzia per la cybersicurezza nazionale
Pubblicato: 02/04/26 11:13
Ultimo aggiornamento: 02/04/26 11:13
Impatto: Medio (63.07)
Agenzia per la cybersicurezza nazionale
Pubblicato: 01/04/26 16:26
Ultimo aggiornamento: 01/04/26 16:26
Impatto: Critico (76.28)
Agenzia per la cybersicurezza nazionale
Pubblicato: 01/04/26 16:04
Ultimo aggiornamento: 01/04/26 16:04
Impatto: Critico (77.94)
Agenzia per la cybersicurezza nazionale
Pubblicato: 01/04/26 11:45
Ultimo aggiornamento: 01/04/26 11:45
Impatto: Critico (79.48)
Agenzia per la cybersicurezza nazionale
Pubblicato: 01/04/26 10:11
Ultimo aggiornamento: 01/04/26 10:11
Impatto: Medio (63.46)
CVE: CVE-2026-34759
Vendor: OneUptime
CVSS: 9.2
Exploitation: Not available
Changed: 4 hours ago
Description: OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, multiple notification API endpoints are registered without authentication middleware, while sibling endpoints in the same codebase correctly use ClusterKeyAuthorization.isAuthorizedServiceMiddleware. These endpoints are externally reachable via the Nginx proxy at /notification/. Combined with a projectId leak from the public Status Page API, an unauthenticated attacker can purchase phone numbers on the victim's Twilio account and delete all existing alerting numbers. This issue has been patched in version 10.0.42.
CVE: CVE-2026-34758
Vendor: OneUptime
CVSS: 9.1
Exploitation: Not available
Changed: 4 hours ago
Description: OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, unauthenticated access to Notification test and Phone Number management endpoints allows SMS/Call/Email/WhatsApp abuse and phone number purchase. This issue has been patched in version 10.0.42.
CVE: CVE-2026-34745
Vendor: ShaneIsrael
CVSS: 9.1
Exploitation: Not available
Changed: 4 hours ago
Description: Fireshare facilitates self-hosted media and link sharing. Prior to version 1.5.3, the fix for CVE-2026-33645 was applied to the authenticated /api/uploadChunked endpoint but was not applied to the unauthenticated /api/uploadChunked/public endpoint in the same file (app/server/fireshare/api.py). An unauthenticated attacker can exploit the checkSum parameter to write arbitrary files with attacker-controlled content to any writable path on the server filesystem. This issue has been patched in version 1.5.3.
CVE: CVE-2026-34717
Vendor: opf
CVSS: 9.9
Exploitation: Not available
Changed: 5 hours ago
Description: OpenProject is an open-source, web-based project management software. Prior to version 17.2.3, the =n operator in modules/reporting/lib/report/operator.rb:177 embeds user input directly into SQL WHERE clauses without parameterization. This issue has been patched in version 17.2.3.
CVE: CVE-2026-5281
Vendor: Google
CVSS: N/A
Exploitation: N/A
Changed: 1 day ago
Description: Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
CVE: CVE-2026-33634
Vendor: 3 vendors
CVSS: 9.4
Exploitation: N/A
Changed: 9 days ago
Description: Trivy ecosystem supply chain was briefly compromised
CVE: CVE-2026-3055
Vendor: NetScaler
CVSS: 9.3
Exploitation: N/A
Changed: 10 days ago
Description: Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread
CVE: CVE-2025-53521
Vendor: F5
CVSS: 7.5
Exploitation: N/A
Changed: 5 months ago
Description: When a BIG-IP APM Access Policy is configured on a virtual server, undisclosed traffic can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE: CVE-2026-26928
Vendor: Krajowa Izba Rozliczeniowa
CVSS: 8.7
Exploitation: Not available
Changed: 7 hours ago
Description: SzafirHost downloads necessary files in the context of the initiating web page. When called, SzafirHost updates its dynamic library. JAR files are correctly verified based on a list of trusted file hashes, and if a file was not on that list, it was checked to see if it had been digitally signed by the vendor. The application doesn't verify hash or vendor's digital signature of uploaded DLL, SO, JNILIB or DYLIB file. The attacker can provide malicious file which will be saved in users /temp folder and executed by the application. This issue was fixed in version 1.1.0.
CVE: CVE-2026-26927
Vendor: Krajowa Izba Rozliczeniowa
CVSS: 5.1
Exploitation: Not available
Changed: 7 hours ago
Description: Szafir SDK Web is a browser plug-in that can run SzafirHost application which download the necessary files when launched. In Szafir SDK Web it is possible to change the URL (HTTP Origin) of the application call location. An unauthenticated attacker can craft a website that is able to launch SzafirHost application with arbitrary arguments via Szafir SDK Web browser addon. No validation will be performed to check whether the address specified in `document_base_url` parameter is in any way related to the actual address of the calling web application. The URL address specified in `document_base_url` parameter is then shown in the application confirmation prompt. When a victim confirms the execution of the application, it will be called in the context of attacker's website URL and might download additional files and libraries from that website. When victim accepts the application execution for the URL showed in the confirmation prompt with the "remember" option before, the prompt won't be shown and the application will be called in the context of URL provided by the attacker without any interaction. This issue was fixed in version 0.0.17.4.
CVE: CVE-2026-25601
Vendor: Metronik d.o.o.
CVSS: 0.01
Exploitation: 0.01%
Changed: 1 day ago
Description: A vulnerability was identified in MEPIS RM, an industrial software product developed by Metronik. The application contained a hardcoded cryptographic key within the Mx.Web.ComponentModel.dll component. When the option to store domain passwords was enabled, this key was used to encrypt user passwords before storing them in the application’s database. An attacker with sufficient privileges to access the database could extract the encrypted passwords, decrypt them using the embedded key, and gain unauthorized access to the associated ICS/OT environment.
CVE: CVE-2026-4400
Vendor: 1millionbot
CVSS: 0.19
Exploitation: 0.19%
Changed: 2 days ago
Description: Insecure Direct Object Reference (IDOR) vulnerability in 1millionbot Millie chat that allows private conversations of other users being viewed by simply changing the conversation ID. The vulnerability is present in the endpoint 'api.1millionbot.com/api/public/conversations/' and, if exploited, could allow a remote attacker to access other users private chatbot conversations, revealing sensitive or confidential data without requiring credentials or impersonating users. In order for the vulnerability to be exploited, the attacker must have the user's conversation ID.