7.7

CVSS3.1

CVE-2026-33461 - Incorrect Authorization in Kibana Fleet Leading to Information Disclosure

Incorrect Authorization (CWE-863) in Kibana can lead to information disclosure via Privilege Abuse (CAPEC-122). A user with limited Fleet privileges can exploit an internal API endpoint to retrieve sensitive configuration data, including private keys and authentication tokens, that should only be a…

πŸ“… Published: April 8, 2026, 4:41 p.m. πŸ”„ Last Modified: April 9, 2026, 2:27 p.m.

7.7

CVSS3.1

CVE-2026-4498 - Execution with Unnecessary Privileges in Kibana Leading to reading index data beyond their direct E…

Execution with Unnecessary Privileges (CWE-250) in Kibana’s Fleet plugin debug route handlers can lead reading index data beyond their direct Elasticsearch RBAC scope via Privilege Abuse (CAPEC-122). This requires an authenticated Kibana user with Fleet sub-feature privileges (such as agents, agent…

πŸ“… Published: April 8, 2026, 4:38 p.m. πŸ”„ Last Modified: April 9, 2026, 2:27 p.m.

6.5

CVSS3.1

CVE-2026-2377 - Mirror-registry: quay: quay: server-side request forgery via log export functionality

A flaw was found in mirror-registry. Authenticated users can exploit the log export feature by providing a specially crafted web address (URL). This allows the application's backend to make arbitrary requests to internal network resources, a vulnerability known as Server-Side Request Forgery (SSRF)…

πŸ“… Published: April 8, 2026, 4:26 p.m. πŸ”„ Last Modified: April 8, 2026, 7:39 p.m.

6.6

CVSS3.1

CVE-2026-4837 - Eval Injection in Rapid7 Insight Agent

An eval() injection vulnerability in the Rapid7 Insight Agent beaconing logic for Linux versions could theoretically allow an attacker to achieve remote code execution as root via a crafted beacon response. Because the Agent uses mutual TLS (mTLS) to verify commands from the Rapid7 Platform, it is …

πŸ“… Published: April 8, 2026, 3:59 p.m. πŸ”„ Last Modified: April 8, 2026, 7:39 p.m.

6.2

CVSS3.1

CVE-2026-33753 - Improper Certificate Validation in rfc3161-client

rfc3161-client is a Python library implementing the Time-Stamp Protocol (TSP) described in RFC 3161. Prior to 1.0.6, an Authorization Bypass vulnerability in rfc3161-client's signature verification allows any attacker to impersonate a trusted TimeStamping Authority (TSA). By exploiting a logic flaw…

πŸ“… Published: April 8, 2026, 2:54 p.m. πŸ”„ Last Modified: April 8, 2026, 7:26 p.m.

8.6

CVSS4.0

CVE-2026-33229 - XWiki Platform affected by remote code execution with script right through unprotected Velocity scr…

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Prior to 17.4.8 and 17.10.1, an improperly protected scripting API allows any user with script right to bypass the sandboxing of the Velocity scripting API and execute, e.g., arbitrary Python sc…

πŸ“… Published: April 8, 2026, 2:53 p.m. πŸ”„ Last Modified: April 10, 2026, 8:33 p.m.

4.8

CVSS3.1

CVE-2026-39410 - Hono has a non-breaking space prefix bypass in cookie name handling in getCookie()

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, a discrepancy between browser cookie parsing and parse() handling allows cookie prefix protections to be bypassed. Cookie names that are treated as distinct by the browser may be normalized to th…

πŸ“… Published: April 8, 2026, 2:44 p.m. πŸ”„ Last Modified: April 8, 2026, 7:39 p.m.

6.3

CVSS4.0

CVE-2026-39409 - Hono has incorrect IP matching in ipRestriction() for IPv4-mapped IPv6 addresses

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, ipRestriction() does not canonicalize IPv4-mapped IPv6 client addresses (e.g. ::ffff:127.0.0.1) before applying IPv4 allow or deny rules. In environments such as Node.js dual-stack, this can caus…

πŸ“… Published: April 8, 2026, 2:43 p.m. πŸ”„ Last Modified: April 8, 2026, 7:39 p.m.

5.9

CVSS4.0

CVE-2026-39408 - Hono has a path traversal in toSSG() allows writing files outside the output directory

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, a path traversal issue in toSSG() allows files to be written outside the configured output directory during static site generation. When using dynamic route parameters via ssgParams, specially cr…

πŸ“… Published: April 8, 2026, 2:42 p.m. πŸ”„ Last Modified: April 10, 2026, 8:31 p.m.

5.3

CVSS3.1

CVE-2026-39407 - Hono has a middleware bypass via repeated slashes in serveStatic

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, a path handling inconsistency in serveStatic allows protected static files to be accessed by using repeated slashes (//) in the request path. When route-based middleware (e.g., /admin/*) is used …

πŸ“… Published: April 8, 2026, 2:41 p.m. πŸ”„ Last Modified: April 8, 2026, 7:39 p.m.
Total resulsts: 343921
Page 67 of 34,393
Β« previous page Β» next page
Filters