14639 results (0.018 seconds)

CVSS: 6.9EPSS: %CPEs: 3EXPL: 0

15 May 2026 — Prior to 2.11.44, 3.6.15, and 3.7.0-rc.3, there is an information disclosure vulnerability in Traefik's errors (custom error pages) middleware. • https://github.com/traefik/traefik/security/advisories/GHSA-p6hg-qh38-555r • CWE-201: Insertion of Sensitive Information Into Sent Data •

CVSS: 10.0EPSS: %CPEs: -EXPL: 0

15 May 2026 — An Improper Access Control vulnerability in several internal API endpoints for Google Cloud Application Integration prior to 2026-01-23 allows a remote, unauthenticated attacker to disclose sensitive internal information and execute arbitrary code using specially crafted HTTP requests to inadvertently exposed internal API endpoints. • https://docs.cloud.google.com/gemini/enterprise/docs/release-notes#May_07_2026 • CWE-862: Missing Authorization •

CVSS: 8.5EPSS: 0%CPEs: -EXPL: 0

15 May 2026 — Cross-site request forgery vulnerability exists in Musetheque V4 Information Disclosure for IPKNOWLEDGE V4L1 rev2203.0 and earlier. • https://jvn.jp/en/jp/JVN69128376 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.4EPSS: 0%CPEs: -EXPL: 0

15 May 2026 — Cross-site scripting vulnerability exists in Musetheque V4 Information Disclosure for IPKNOWLEDGE V4L1 rev2203.0 and earlier. • https://jvn.jp/en/jp/JVN69128376 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.9EPSS: 0%CPEs: -EXPL: 0

15 May 2026 — An improper input validation vulnerability within the AMD Platform Management Framework (PMF) driver can allow a local attacker to read Out-of-Bounds potentially resulting in information disclosure or a crash • https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-4015.html • CWE-125: Out-of-bounds Read •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 0

14 May 2026 — Hedera Guardian through 3.5.1 contains an authentication bypass vulnerability in the GET /api/v1/demo/registered-users endpoint that allows unauthenticated attackers to retrieve sensitive user information. Attackers can access the endpoint without providing authentication credentials to obtain usernames, Hedera DIDs, parent registry DIDs, system roles, and policy role assignments for all registered users in the system. • https://www.vulncheck.com/advisories/hedera-guardian-authentication-bypass-information-disclosure • CWE-306: Missing Authentication for Critical Function •

CVSS: 9.6EPSS: 0%CPEs: 2EXPL: 0

14 May 2026 — Exposure of sensitive information to an unauthorized actor in Microsoft Authenticator allows an unauthorized attacker to disclose information over a network. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41615 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

14 May 2026 — Hatchet is a platform for orchestrating background tasks, AI agents, and durable workflows at scale. Prior to 0.83.39, a missing authorization directive on the GET /api/v1/stable/dags/tasks endpoint caused Hatchet's tenant-membership check to be skipped for this route. A user authenticated to any tenant on the same Hatchet instance could query the endpoint with another tenant's UUID and a DAG UUID belonging to that tenant, and receive task metadata for that DAG. This vulnerability is fixed in 0.83.39. • https://github.com/hatchet-dev/hatchet/security/advisories/GHSA-55gc-6fmc-fpx9 • CWE-639: Authorization Bypass Through User-Controlled Key CWE-863: Incorrect Authorization •

CVSS: 7.6EPSS: 0%CPEs: 4EXPL: 0

14 May 2026 — Valtimo is an open-source business process automation platform. From 12.4.0 to 12.33.0 and 13.26.0, the LoggingRestClientCustomizer in the web module automatically intercepts all outgoing HTTP calls made via Spring's RestClient and logs the full request body, response body, and response headers. When an error response is received, this information is included in the thrown HttpClientErrorException message, which is logged at ERROR level by Spring's default exception handling — regardless of the application'... • https://github.com/valtimo-platform/valtimo/security/advisories/GHSA-3jh5-rr2q-xfv7 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 0

14 May 2026 — Passing sensitive data in URLs may expose it through browser history, logs, or intermediary systems, potentially leading to unintended information disclosure under certain conditions. • https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0130636 • CWE-598: Use of GET Request Method With Sensitive Query Strings •