14289 results (0.041 seconds)

CVSS: 8.7EPSS: %CPEs: 1EXPL: 0

18 Mar 2026 — The Azure Blob Storage for Craft CMS plugin provides an Azure Blob Storage integration for Craft CMS. In versions on the 2.x branch prior to 2.1.1, unauthenticated users can view a list of buckets the plugin has access to. The `DefaultController->actionLoadContainerData()` endpoint allows unauthenticated users with a valid CSRF token to view a list of buckets that the plugin is allowed to see. Because Azure can return sensitive data in error messages, additional attack vectors are also exposed. Users should... • https://github.com/craftcms/azure-blob/commit/cf69db45f393b3508a32f89ac8235554a2f026ff • CWE-862: Missing Authorization •

CVSS: 5.8EPSS: %CPEs: -EXPL: 0

18 Mar 2026 — This issue may lead to information disclosure and enable attackers to map internal network infrastructure. • https://access.redhat.com/security/cve/CVE-2026-4366 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 2.4EPSS: %CPEs: 1EXPL: 0

18 Mar 2026 — The Google Cloud Storage for Craft CMS plugin provides a Google Cloud Storage integration for Craft CMS. In versions on the 2.x branch prior to 2.2.1, the `DefaultController->actionLoadBucketData()` endpoint allows unauthenticated users with a valid CSRF token to view a list of buckets that the plugin is allowed to see. Users should update to version 2.2.1 of the plugin to mitigate the issue. • https://github.com/craftcms/google-cloud/commit/651bacaa5f5fd7813e4075e0747b1d706391fb2c • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.9EPSS: %CPEs: 1EXPL: 0

18 Mar 2026 — The Amazon S3 for Craft CMS plugin provides an Amazon S3 integration for Craft CMS. In versions 2.0.2 through 2.2.4, unauthenticated users can view a list of buckets the plugin has access to. The `BucketsController->actionLoadBucketData()` endpoint allows unauthenticated users with a valid CSRF token to view a list of buckets that the plugin is allowed to see. Users should update to version 2.2.5 of the plugin to mitigate the issue. • https://github.com/craftcms/aws-s3/commit/ef8904d8b6856e4a52893a9e1e52988ae110aa3f • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.6EPSS: %CPEs: 2EXPL: 0

18 Mar 2026 — The `core_get_fragment` callback `editelement` and the `mod_customcert_save_element` web service both fail to verify that the supplied `elementid` belongs to the authorized context, enabling cross-course information disclosure and data tampering. • https://github.com/mdjnelson/moodle-mod_customcert/commit/a1494a80fb953f187f7888a7394cbf9d13c28468 • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 7.7EPSS: %CPEs: -EXPL: 0

18 Mar 2026 — This allows the attacker to inject an encrypted assertion for an arbitrary principal, leading to unauthorized access and potential information disclosure. • https://access.redhat.com/errata/RHSA-2026:3925 • CWE-1287: Improper Validation of Specified Type of Input •

CVSS: 6.5EPSS: %CPEs: 1EXPL: 0

17 Mar 2026 — IBM Planning Analytics Local 2.1.0 through 2.1.17 could allow an unauthorized access to sensitive application data and administrative functionalities due to lack of proper access controls. • https://www.ibm.com/support/pages/node/7263581 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.7EPSS: %CPEs: 1EXPL: 0

17 Mar 2026 — IBM Planning Analytics Local 2.1.0 through 2.1.17 could allow an attacker to trick the caching mechanism into storing and serving sensitive, user-specific responses as publicly cacheable resources. • https://www.ibm.com/support/pages/node/7263581 • CWE-524: Use of Cache Containing Sensitive Information •

CVSS: 4.3EPSS: %CPEs: 1EXPL: 0

17 Mar 2026 — Outline is a service that allows for collaborative documentation. Prior to 1.5.0, the events.list API endpoint, used for retrieving activity logs, contains a logic flaw in its filtering mechanism. It allows any authenticated user to retrieve activity events associated with documents that have no collection (e.g., Private Drafts, Deleted Documents), regardless of the user's actual permissions on those documents. While the document content is not directly exposed, this vulnerability leaks sensitive metadata (... • https://github.com/outline/outline/security/advisories/GHSA-69x7-6fcr-mm6g • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.4EPSS: %CPEs: -EXPL: 0

17 Mar 2026 — A flaw was found in the Katello plugin for Red Hat Satellite. This vulnerability, caused by improper sanitization of user-provided input, allows a remote attacker to inject arbitrary SQL commands into the sort_by parameter of the /api/hosts/bootc_images API endpoint. This can lead to a Denial of Service (DoS) by triggering database errors, and potentially enable Boolean-based Blind SQL injection, which could allow an attacker to extract sensitive information from the database. • https://access.redhat.com/security/cve/CVE-2026-4324 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •