5.2

CVSS3.1

CVE-2026-32591 - Mirror-registry: quay: server-side request forgery in proxy cache upstream registry configuration

A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an upstream registry for proxy caching, Quay makes a network connection to the specified registry hostname without verifying that it points to a legitimate external service. An attack…

πŸ“… Published: April 8, 2026, 5:06 p.m. πŸ”„ Last Modified: April 8, 2026, 7:38 p.m.

7.1

CVSS3.1

CVE-2026-32590 - Mirror-registry: remote code execution using pickle deserialization

A flaw was found in Red Hat Quay's handling of resumable container image layer uploads. The upload process stores intermediate data in the database using a format that, if tampered with, could allow an attacker to execute arbitrary code on the Quay server.

πŸ“… Published: April 8, 2026, 5:04 p.m. πŸ”„ Last Modified: April 8, 2026, 7:14 p.m.

7.1

CVSS3.1

CVE-2026-32589 - Mirror-registry: quay: insecure direct object reference in blobupload

A flaw was found in Red Hat Quay's container image upload process. An authenticated user with push access to any repository on the registry can interfere with image uploads in progress by other users, including those in repositories they do not have access to. This could allow the attacker to read,…

πŸ“… Published: April 8, 2026, 5:04 p.m. πŸ”„ Last Modified: April 8, 2026, 7:38 p.m.

8.1

CVSS3.1

CVE-2026-33466 - Improper Limitation of a Pathname to a Restricted Directory in Logstash Leading to Arbitrary File W…

Improper Limitation of a Pathname to a Restricted Directory (CWE-22) in Logstash can lead to arbitrary file write and potentially remote code execution via Relative Path Traversal (CAPEC-139). The archive extraction utilities used by Logstash do not properly validate file paths within compressed ar…

πŸ“… Published: April 8, 2026, 4:50 p.m. πŸ”„ Last Modified: April 8, 2026, 7:26 p.m.

6.8

CVSS3.1

CVE-2026-33458 - Server-Side Request Forgery (SSRF) in Kibana One Workflow Leading to Information Disclosure

Server-Side Request Forgery (CWE-918) in Kibana One Workflow can lead to information disclosure. An authenticated user with workflow creation and execution privileges can bypass host allowlist restrictions in the Workflows Execution Engine, potentially exposing sensitive internal endpoints and data.

πŸ“… Published: April 8, 2026, 4:47 p.m. πŸ”„ Last Modified: April 8, 2026, 7:26 p.m.

6.5

CVSS3.1

CVE-2026-33459 - Uncontrolled Resource Consumption in Kibana Leading to Denial of Service

Uncontrolled Resource Consumption (CWE-400) in Kibana can lead to denial of service via Excessive Allocation (CAPEC-130). An authenticated user with access to the automatic import feature can submit specially crafted requests with excessively large input values. When multiple such requests are sent…

πŸ“… Published: April 8, 2026, 4:46 p.m. πŸ”„ Last Modified: April 9, 2026, 2:24 p.m.

4.3

CVSS3.1

CVE-2026-33460 - Incorrect Authorization in Kibana Fleet Leading to Information Disclosure

Incorrect Authorization (CWE-863) in Kibana can lead to cross-space information disclosure via Privilege Abuse (CAPEC-122). A user with Fleet agent management privileges in one Kibana space can retrieve Fleet Server policy details from other spaces through an internal enrollment endpoint. The endpo…

πŸ“… Published: April 8, 2026, 4:43 p.m. πŸ”„ Last Modified: April 9, 2026, 2:26 p.m.

5.3

CVSS3.1

CVE-2025-14243 - Mirror-registry: openshift mirror registry: user enumeration via authentication error messages

A flaw was found in the OpenShift Mirror Registry. This vulnerability allows an unauthenticated, remote attacker to enumerate valid usernames and email addresses via different error messages during authentication failures and account creation.

πŸ“… Published: April 8, 2026, 4:41 p.m. πŸ”„ Last Modified: April 8, 2026, 7:22 p.m.

7.7

CVSS3.1

CVE-2026-33461 - Incorrect Authorization in Kibana Fleet Leading to Information Disclosure

Incorrect Authorization (CWE-863) in Kibana can lead to information disclosure via Privilege Abuse (CAPEC-122). A user with limited Fleet privileges can exploit an internal API endpoint to retrieve sensitive configuration data, including private keys and authentication tokens, that should only be a…

πŸ“… Published: April 8, 2026, 4:41 p.m. πŸ”„ Last Modified: April 9, 2026, 2:27 p.m.

7.7

CVSS3.1

CVE-2026-4498 - Execution with Unnecessary Privileges in Kibana Leading to reading index data beyond their direct E…

Execution with Unnecessary Privileges (CWE-250) in Kibana’s Fleet plugin debug route handlers can lead reading index data beyond their direct Elasticsearch RBAC scope via Privilege Abuse (CAPEC-122). This requires an authenticated Kibana user with Fleet sub-feature privileges (such as agents, agent…

πŸ“… Published: April 8, 2026, 4:38 p.m. πŸ”„ Last Modified: April 9, 2026, 2:27 p.m.
Total resulsts: 343514
Page 29 of 34,352
Β« previous page Β» next page
Filters