Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-39410 (GCVE-0-2026-39410)
Vulnerability from cvelistv5 – Published: 2026-04-08 14:44 – Updated: 2026-04-08 15:17- CWE-20 - Improper Input Validation
| URL | Tags |
|---|---|
| https://github.com/honojs/hono/security/advisorie… | x_refsource_CONFIRM |
| https://github.com/honojs/hono/commit/cc067c85592… | x_refsource_MISC |
| https://github.com/honojs/hono/releases/tag/v4.12.12 | x_refsource_MISC |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-39410",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-08T15:17:07.686689Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-08T15:17:14.892Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "hono",
"vendor": "honojs",
"versions": [
{
"status": "affected",
"version": "\u003c 4.12.12"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, a discrepancy between browser cookie parsing and parse() handling allows cookie prefix protections to be bypassed. Cookie names that are treated as distinct by the browser may be normalized to the same key by parse(), allowing attacker-controlled cookies to override legitimate ones. This vulnerability is fixed in 4.12.12."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-08T14:44:40.797Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/honojs/hono/security/advisories/GHSA-r5rp-j6wh-rvv4",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/honojs/hono/security/advisories/GHSA-r5rp-j6wh-rvv4"
},
{
"name": "https://github.com/honojs/hono/commit/cc067c85592415cb1880ad3c61ed923472452ec0",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/honojs/hono/commit/cc067c85592415cb1880ad3c61ed923472452ec0"
},
{
"name": "https://github.com/honojs/hono/releases/tag/v4.12.12",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/honojs/hono/releases/tag/v4.12.12"
}
],
"source": {
"advisory": "GHSA-r5rp-j6wh-rvv4",
"discovery": "UNKNOWN"
},
"title": "Hono has a non-breaking space prefix bypass in cookie name handling in getCookie()"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-39410",
"datePublished": "2026-04-08T14:44:40.797Z",
"dateReserved": "2026-04-07T00:23:30.595Z",
"dateUpdated": "2026-04-08T15:17:14.892Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-39410",
"date": "2026-05-21",
"epss": "0.0003",
"percentile": "0.08695"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-39410\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2026-04-08T15:16:15.143\",\"lastModified\":\"2026-04-21T18:26:00.277\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, a discrepancy between browser cookie parsing and parse() handling allows cookie prefix protections to be bypassed. Cookie names that are treated as distinct by the browser may be normalized to the same key by parse(), allowing attacker-controlled cookies to override legitimate ones. This vulnerability is fixed in 4.12.12.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hono:hono:*:*:*:*:*:node.js:*:*\",\"versionEndIncluding\":\"4.12.11\",\"matchCriteriaId\":\"295EEF12-243F-4561-B181-C19451B5285C\"}]}]}],\"references\":[{\"url\":\"https://github.com/honojs/hono/commit/cc067c85592415cb1880ad3c61ed923472452ec0\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/honojs/hono/releases/tag/v4.12.12\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/honojs/hono/security/advisories/GHSA-r5rp-j6wh-rvv4\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-39410\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-08T15:17:07.686689Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-08T15:17:10.331Z\"}}], \"cna\": {\"title\": \"Hono has a non-breaking space prefix bypass in cookie name handling in getCookie()\", \"source\": {\"advisory\": \"GHSA-r5rp-j6wh-rvv4\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"honojs\", \"product\": \"hono\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 4.12.12\"}]}], \"references\": [{\"url\": \"https://github.com/honojs/hono/security/advisories/GHSA-r5rp-j6wh-rvv4\", \"name\": \"https://github.com/honojs/hono/security/advisories/GHSA-r5rp-j6wh-rvv4\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/honojs/hono/commit/cc067c85592415cb1880ad3c61ed923472452ec0\", \"name\": \"https://github.com/honojs/hono/commit/cc067c85592415cb1880ad3c61ed923472452ec0\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/honojs/hono/releases/tag/v4.12.12\", \"name\": \"https://github.com/honojs/hono/releases/tag/v4.12.12\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, a discrepancy between browser cookie parsing and parse() handling allows cookie prefix protections to be bypassed. Cookie names that are treated as distinct by the browser may be normalized to the same key by parse(), allowing attacker-controlled cookies to override legitimate ones. This vulnerability is fixed in 4.12.12.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20: Improper Input Validation\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2026-04-08T14:44:40.797Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-39410\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-08T15:17:14.892Z\", \"dateReserved\": \"2026-04-07T00:23:30.595Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2026-04-08T14:44:40.797Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
cleanstart-2026-be61221
Vulnerability from cleanstart
Multiple security vulnerabilities affect the opensearch-dashboards-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "opensearch-dashboards-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.19.5-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the opensearch-dashboards-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-BE61221",
"modified": "2026-05-10T11:41:43Z",
"published": "2026-05-18T13:36:50.922233Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-BE61221.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-62718"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-69873"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-29045"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-29085"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-29086"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-29087"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-2950"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-30827"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33750"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33891"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33894"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33895"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33896"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33916"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33937"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-34043"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-35213"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39406"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39407"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39408"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39409"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-39410"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-40175"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-41238"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-41239"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-41240"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-42033"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-42034"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-42035"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-42036"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-42037"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-42038"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-42039"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-42040"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-42041"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-42042"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-42043"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-42044"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-42264"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-42338"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-44455"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-44456"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-44457"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-44458"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-44459"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4800"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4923"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4926"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-6321"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-6322"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2328-f5f3-gj25"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-26pp-8wgv-hjvm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-27v5-c462-wpq7"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2g4f-4pwh-qvx6"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2qvq-rjwj-gvw9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2w6w-674q-4c4q"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-39q2-94rc-95cp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-3mfm-83xf-c92r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-3p68-rc4w-qgx5"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-3v7f-55p6-f55p"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-3w6x-2g7m-8v23"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-442j-39wm-28r2"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-445q-vr5w-6q77"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-458j-xx4x-4375"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-46wh-pxpv-q5gq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-5c6j-r48x-rmvq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-5c9x-8gcm-mpgx"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-5m6q-g25r-mvwx"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-5pq2-9x2x-5p6w"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-62hf-57xw-28j9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-69xw-7hcm-h432"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6chq-wfr3-2hj9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-7rx3-28cr-v5wh"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-92pp-h63x-v22m"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9cx6-37pm-9jff"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9vqf-7f2p-gf9v"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c2c7-rcm5-vvqj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-crv5-9vww-q3g8"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f23m-r3pf-42rh"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f886-m6hf-6m8v"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fvcv-3m26-pcqx"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-h7mw-gpvr-xq4m"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j3q9-mxjg-w52f"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-jg4p-7fhp-p32p"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-m7pr-hjqh-92cm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p6xx-57qc-3wxr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77w-8qqv-26rm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-pf86-5x62-jrwf"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-pmwg-cvhr-8vh7"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-ppp5-5v6c-4jwp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q3j6-qgpj-74h6"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q5qw-h33p-qvwr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q67f-28xg-22rw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q8qp-cvcw-x6jj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qj8w-gfj5-8c6v"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qp7p-654g-cw7p"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r4q5-vmmm-2653"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r5fr-rjxr-66jc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r5rp-j6wh-rvv4"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-v2v4-37r5-5v8g"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-v39h-62p7-jpjc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-v8w9-8mx6-g223"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-v9jr-rg53-9pgp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vf2m-468p-8v99"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-w9j2-pvgh-6h63"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-wc8c-qw6v-h7f6"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-wmmm-f939-6g9c"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xf4j-xp2r-rqqx"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xhjh-pmcv-23jw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xhpv-hc6g-r9c6"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xjpj-3mr7-gcpf"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xpcf-pg52-r92g"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xx6v-rp6x-q39c"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62718"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69873"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29045"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29085"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29086"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29087"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2950"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-30827"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33750"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33891"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33894"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33895"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33896"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33916"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33937"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34043"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35213"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39406"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39407"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39408"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39409"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39410"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-40175"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41238"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41239"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41240"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-42033"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-42034"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-42035"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-42036"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-42037"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-42038"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-42039"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-42040"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-42041"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-42042"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-42043"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-42044"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-42264"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-42338"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-44455"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-44456"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-44457"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-44458"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-44459"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4800"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4923"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4926"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6321"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6322"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-62718, CVE-2025-69873, CVE-2026-29045, CVE-2026-29085, CVE-2026-29086, CVE-2026-29087, CVE-2026-2950, CVE-2026-30827, CVE-2026-33750, CVE-2026-33891, CVE-2026-33894, CVE-2026-33895, CVE-2026-33896, CVE-2026-33916, CVE-2026-33937, CVE-2026-34043, CVE-2026-35213, CVE-2026-39406, CVE-2026-39407, CVE-2026-39408, CVE-2026-39409, CVE-2026-39410, CVE-2026-40175, CVE-2026-41238, CVE-2026-41239, CVE-2026-41240, CVE-2026-42033, CVE-2026-42034, CVE-2026-42035, CVE-2026-42036, CVE-2026-42037, CVE-2026-42038, CVE-2026-42039, CVE-2026-42040, CVE-2026-42041, CVE-2026-42042, CVE-2026-42043, CVE-2026-42044, CVE-2026-42264, CVE-2026-42338, CVE-2026-44455, CVE-2026-44456, CVE-2026-44457, CVE-2026-44458, CVE-2026-44459, CVE-2026-4800, CVE-2026-4923, CVE-2026-4926, CVE-2026-6321, CVE-2026-6322, ghsa-2328-f5f3-gj25, ghsa-26pp-8wgv-hjvm, ghsa-27v5-c462-wpq7, ghsa-2g4f-4pwh-qvx6, ghsa-2qvq-rjwj-gvw9, ghsa-2w6w-674q-4c4q, ghsa-39q2-94rc-95cp, ghsa-3mfm-83xf-c92r, ghsa-3p68-rc4w-qgx5, ghsa-3v7f-55p6-f55p, ghsa-3w6x-2g7m-8v23, ghsa-442j-39wm-28r2, ghsa-445q-vr5w-6q77, ghsa-458j-xx4x-4375, ghsa-46wh-pxpv-q5gq, ghsa-5c6j-r48x-rmvq, ghsa-5c9x-8gcm-mpgx, ghsa-5m6q-g25r-mvwx, ghsa-5pq2-9x2x-5p6w, ghsa-62hf-57xw-28j9, ghsa-69xw-7hcm-h432, ghsa-6chq-wfr3-2hj9, ghsa-7rx3-28cr-v5wh, ghsa-92pp-h63x-v22m, ghsa-9cx6-37pm-9jff, ghsa-9vqf-7f2p-gf9v, ghsa-c2c7-rcm5-vvqj, ghsa-crv5-9vww-q3g8, ghsa-f23m-r3pf-42rh, ghsa-f886-m6hf-6m8v, ghsa-fvcv-3m26-pcqx, ghsa-h7mw-gpvr-xq4m, ghsa-j3q9-mxjg-w52f, ghsa-jg4p-7fhp-p32p, ghsa-m7pr-hjqh-92cm, ghsa-p6xx-57qc-3wxr, ghsa-p77w-8qqv-26rm, ghsa-pf86-5x62-jrwf, ghsa-pmwg-cvhr-8vh7, ghsa-ppp5-5v6c-4jwp, ghsa-q3j6-qgpj-74h6, ghsa-q5qw-h33p-qvwr, ghsa-q67f-28xg-22rw, ghsa-q8qp-cvcw-x6jj, ghsa-qj8w-gfj5-8c6v, ghsa-qp7p-654g-cw7p, ghsa-r4q5-vmmm-2653, ghsa-r5fr-rjxr-66jc, ghsa-r5rp-j6wh-rvv4, ghsa-v2v4-37r5-5v8g, ghsa-v39h-62p7-jpjc, ghsa-v8w9-8mx6-g223, ghsa-v9jr-rg53-9pgp, ghsa-vf2m-468p-8v99, ghsa-w9j2-pvgh-6h63, ghsa-wc8c-qw6v-h7f6, ghsa-wmmm-f939-6g9c, ghsa-xf4j-xp2r-rqqx, ghsa-xhjh-pmcv-23jw, ghsa-xhpv-hc6g-r9c6, ghsa-xjpj-3mr7-gcpf, ghsa-xpcf-pg52-r92g, ghsa-xx6v-rp6x-q39c applied in versions: 2.19.5-r0",
"upstream": [
"CVE-2025-62718",
"CVE-2025-69873",
"CVE-2026-29045",
"CVE-2026-29085",
"CVE-2026-29086",
"CVE-2026-29087",
"CVE-2026-2950",
"CVE-2026-30827",
"CVE-2026-33750",
"CVE-2026-33891",
"CVE-2026-33894",
"CVE-2026-33895",
"CVE-2026-33896",
"CVE-2026-33916",
"CVE-2026-33937",
"CVE-2026-34043",
"CVE-2026-35213",
"CVE-2026-39406",
"CVE-2026-39407",
"CVE-2026-39408",
"CVE-2026-39409",
"CVE-2026-39410",
"CVE-2026-40175",
"CVE-2026-41238",
"CVE-2026-41239",
"CVE-2026-41240",
"CVE-2026-42033",
"CVE-2026-42034",
"CVE-2026-42035",
"CVE-2026-42036",
"CVE-2026-42037",
"CVE-2026-42038",
"CVE-2026-42039",
"CVE-2026-42040",
"CVE-2026-42041",
"CVE-2026-42042",
"CVE-2026-42043",
"CVE-2026-42044",
"CVE-2026-42264",
"CVE-2026-42338",
"CVE-2026-44455",
"CVE-2026-44456",
"CVE-2026-44457",
"CVE-2026-44458",
"CVE-2026-44459",
"CVE-2026-4800",
"CVE-2026-4923",
"CVE-2026-4926",
"CVE-2026-6321",
"CVE-2026-6322",
"ghsa-2328-f5f3-gj25",
"ghsa-26pp-8wgv-hjvm",
"ghsa-27v5-c462-wpq7",
"ghsa-2g4f-4pwh-qvx6",
"ghsa-2qvq-rjwj-gvw9",
"ghsa-2w6w-674q-4c4q",
"ghsa-39q2-94rc-95cp",
"ghsa-3mfm-83xf-c92r",
"ghsa-3p68-rc4w-qgx5",
"ghsa-3v7f-55p6-f55p",
"ghsa-3w6x-2g7m-8v23",
"ghsa-442j-39wm-28r2",
"ghsa-445q-vr5w-6q77",
"ghsa-458j-xx4x-4375",
"ghsa-46wh-pxpv-q5gq",
"ghsa-5c6j-r48x-rmvq",
"ghsa-5c9x-8gcm-mpgx",
"ghsa-5m6q-g25r-mvwx",
"ghsa-5pq2-9x2x-5p6w",
"ghsa-62hf-57xw-28j9",
"ghsa-69xw-7hcm-h432",
"ghsa-6chq-wfr3-2hj9",
"ghsa-7rx3-28cr-v5wh",
"ghsa-92pp-h63x-v22m",
"ghsa-9cx6-37pm-9jff",
"ghsa-9vqf-7f2p-gf9v",
"ghsa-c2c7-rcm5-vvqj",
"ghsa-crv5-9vww-q3g8",
"ghsa-f23m-r3pf-42rh",
"ghsa-f886-m6hf-6m8v",
"ghsa-fvcv-3m26-pcqx",
"ghsa-h7mw-gpvr-xq4m",
"ghsa-j3q9-mxjg-w52f",
"ghsa-jg4p-7fhp-p32p",
"ghsa-m7pr-hjqh-92cm",
"ghsa-p6xx-57qc-3wxr",
"ghsa-p77w-8qqv-26rm",
"ghsa-pf86-5x62-jrwf",
"ghsa-pmwg-cvhr-8vh7",
"ghsa-ppp5-5v6c-4jwp",
"ghsa-q3j6-qgpj-74h6",
"ghsa-q5qw-h33p-qvwr",
"ghsa-q67f-28xg-22rw",
"ghsa-q8qp-cvcw-x6jj",
"ghsa-qj8w-gfj5-8c6v",
"ghsa-qp7p-654g-cw7p",
"ghsa-r4q5-vmmm-2653",
"ghsa-r5fr-rjxr-66jc",
"ghsa-r5rp-j6wh-rvv4",
"ghsa-v2v4-37r5-5v8g",
"ghsa-v39h-62p7-jpjc",
"ghsa-v8w9-8mx6-g223",
"ghsa-v9jr-rg53-9pgp",
"ghsa-vf2m-468p-8v99",
"ghsa-w9j2-pvgh-6h63",
"ghsa-wc8c-qw6v-h7f6",
"ghsa-wmmm-f939-6g9c",
"ghsa-xf4j-xp2r-rqqx",
"ghsa-xhjh-pmcv-23jw",
"ghsa-xhpv-hc6g-r9c6",
"ghsa-xjpj-3mr7-gcpf",
"ghsa-xpcf-pg52-r92g",
"ghsa-xx6v-rp6x-q39c"
]
}
FKIE_CVE-2026-39410
Vulnerability from fkie_nvd - Published: 2026-04-08 15:16 - Updated: 2026-04-21 18:26| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/honojs/hono/commit/cc067c85592415cb1880ad3c61ed923472452ec0 | Third Party Advisory | |
| security-advisories@github.com | https://github.com/honojs/hono/releases/tag/v4.12.12 | Release Notes | |
| security-advisories@github.com | https://github.com/honojs/hono/security/advisories/GHSA-r5rp-j6wh-rvv4 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hono:hono:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "295EEF12-243F-4561-B181-C19451B5285C",
"versionEndIncluding": "4.12.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, a discrepancy between browser cookie parsing and parse() handling allows cookie prefix protections to be bypassed. Cookie names that are treated as distinct by the browser may be normalized to the same key by parse(), allowing attacker-controlled cookies to override legitimate ones. This vulnerability is fixed in 4.12.12."
}
],
"id": "CVE-2026-39410",
"lastModified": "2026-04-21T18:26:00.277",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 2.5,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-04-08T15:16:15.143",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/honojs/hono/commit/cc067c85592415cb1880ad3c61ed923472452ec0"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
],
"url": "https://github.com/honojs/hono/releases/tag/v4.12.12"
},
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/honojs/hono/security/advisories/GHSA-r5rp-j6wh-rvv4"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-R5RP-J6WH-RVV4
Vulnerability from github – Published: 2026-04-08 00:17 – Updated: 2026-04-08 15:34Summary
A discrepancy between browser cookie parsing and parse() handling allows cookie prefix protections to be bypassed.
Cookie names that are treated as distinct by the browser may be normalized to the same key by parse(), allowing attacker-controlled cookies to override legitimate ones.
Details
Browsers follow RFC 6265bis and only trim SP (0x20) and HTAB (0x09) from cookie names. Other characters, such as the non-breaking space (U+00A0), are preserved as part of the cookie name.
For example, the browser treats the following cookies as distinct:
"dummy-cookie"
"\u00a0dummy-cookie"
However, parse() previously used JavaScript's trim(), which removes a broader set of characters including U+00A0. As a result, both names are normalized to:
"dummy-cookie"
This mismatch allows attacker-controlled cookies with a U+00A0 prefix to shadow or override legitimate cookies when accessed via getCookie().
Impact
An attacker who can set cookies (e.g., via a man-in-the-middle on a non-secure page or other injection vector) can bypass cookie prefix protections and override sensitive cookies.
This may lead to:
- Bypassing
__Secure-and__Host-prefix protections - Overriding cookies that rely on the Secure attribute
- Session fixation or session hijacking depending on application usage
This issue affects applications that rely on getCookie() for security-sensitive cookie handling.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "hono"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.12.12"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-39410"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": true,
"github_reviewed_at": "2026-04-08T00:17:21Z",
"nvd_published_at": "2026-04-08T15:16:15Z",
"severity": "MODERATE"
},
"details": "## Summary\n\nA discrepancy between browser cookie parsing and `parse()` handling allows cookie prefix protections to be bypassed.\n\nCookie names that are treated as distinct by the browser may be normalized to the same key by `parse()`, allowing attacker-controlled cookies to override legitimate ones.\n\n## Details\n\nBrowsers follow RFC 6265bis and only trim SP (`0x20`) and HTAB (`0x09`) from cookie names. Other characters, such as the non-breaking space (`U+00A0`), are preserved as part of the cookie name.\n\nFor example, the browser treats the following cookies as distinct:\n\n```\n\"dummy-cookie\"\n\"\\u00a0dummy-cookie\"\n```\n\nHowever, `parse()` previously used JavaScript\u0027s `trim()`, which removes a broader set of characters including `U+00A0`. As a result, both names are normalized to:\n\n```\n\"dummy-cookie\"\n```\n\nThis mismatch allows attacker-controlled cookies with a `U+00A0` prefix to shadow or override legitimate cookies when accessed via `getCookie()`.\n\n## Impact\n\nAn attacker who can set cookies (e.g., via a man-in-the-middle on a non-secure page or other injection vector) can bypass cookie prefix protections and override sensitive cookies.\n\nThis may lead to:\n\n* Bypassing `__Secure-` and `__Host-` prefix protections\n* Overriding cookies that rely on the Secure attribute\n* Session fixation or session hijacking depending on application usage\n\nThis issue affects applications that rely on `getCookie()` for security-sensitive cookie handling.",
"id": "GHSA-r5rp-j6wh-rvv4",
"modified": "2026-04-08T15:34:46Z",
"published": "2026-04-08T00:17:21Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/honojs/hono/security/advisories/GHSA-r5rp-j6wh-rvv4"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39410"
},
{
"type": "WEB",
"url": "https://github.com/honojs/hono/commit/cc067c85592415cb1880ad3c61ed923472452ec0"
},
{
"type": "PACKAGE",
"url": "https://github.com/honojs/hono"
},
{
"type": "WEB",
"url": "https://github.com/honojs/hono/releases/tag/v4.12.12"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
],
"summary": "Hono: Non-breaking space prefix bypass in cookie name handling in getCookie()"
}
WID-SEC-W-2026-1407
Vulnerability from csaf_certbund - Published: 2026-05-06 22:00 - Updated: 2026-05-20 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise Certified Container Operator <12.0.23
IBM / App Connect Enterprise
|
Certified Container Operator <12.0.23 | ||
|
IBM App Connect Enterprise Certified Container Operator <13.1.0
IBM / App Connect Enterprise
|
Certified Container Operator <13.1.0 | ||
|
Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6
|
9 Multicluster Engine for Kubernetes 2.8.6 | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| URL | Category |
|---|---|
| https://wid.cert-bund.de/.well-known/csaf/white/2… | self |
| https://wid.cert-bund.de/portal/wid/securityadvis… | self |
| https://www.ibm.com/support/pages/node/7271907 | external |
| https://www.ibm.com/support/pages/node/7271908 | external |
| https://www.ibm.com/support/pages/node/7271910 | external |
| https://bodhi.fedoraproject.org/updates/FEDORA-20… | external |
| https://access.redhat.com/errata/RHSA-2026:17123 | external |
| https://access.redhat.com/errata/RHSA-2026:17449 | external |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM App Connect Enterprise kombiniert die branchenbew\u00e4hrten Technologien des IBM Integration Bus mit Cloud-nativen Technologien.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in IBM App Connect Enterprise Certified Container ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen oder einen Denial-of-Service-Zustand zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-1407 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1407.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-1407 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1407"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7271907 vom 2026-05-06",
"url": "https://www.ibm.com/support/pages/node/7271907"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7271908 vom 2026-05-06",
"url": "https://www.ibm.com/support/pages/node/7271908"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7271910 vom 2026-05-06",
"url": "https://www.ibm.com/support/pages/node/7271910"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2026-85B819B928 vom 2026-05-08",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-85b819b928"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:17123 vom 2026-05-13",
"url": "https://access.redhat.com/errata/RHSA-2026:17123"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:17449 vom 2026-05-20",
"url": "https://access.redhat.com/errata/RHSA-2026:17449"
}
],
"source_lang": "en-US",
"title": "IBM App Connect Enterprise Certified Container: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-05-20T22:00:00.000+00:00",
"generator": {
"date": "2026-05-21T07:57:58.711+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.6.0"
}
},
"id": "WID-SEC-W-2026-1407",
"initial_release_date": "2026-05-06T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-05-06T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-05-07T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2026-05-14T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-05-20T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Certified Container Operator \u003c13.1.0",
"product": {
"name": "IBM App Connect Enterprise Certified Container Operator \u003c13.1.0",
"product_id": "T053656"
}
},
{
"category": "product_version",
"name": "Certified Container Operator 13.1.0",
"product": {
"name": "IBM App Connect Enterprise Certified Container Operator 13.1.0",
"product_id": "T053656-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:certified_container_operator__13.1.0"
}
}
},
{
"category": "product_version_range",
"name": "Certified Container Operator \u003c12.0.23",
"product": {
"name": "IBM App Connect Enterprise Certified Container Operator \u003c12.0.23",
"product_id": "T053657"
}
},
{
"category": "product_version",
"name": "Certified Container Operator 12.0.23",
"product": {
"name": "IBM App Connect Enterprise Certified Container Operator 12.0.23",
"product_id": "T053657-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:certified_container_operator__12.0.23"
}
}
}
],
"category": "product_name",
"name": "App Connect Enterprise"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "9 Multicluster Engine for Kubernetes 2.8.6",
"product": {
"name": "Red Hat Enterprise Linux 9 Multicluster Engine for Kubernetes 2.8.6",
"product_id": "T054027",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9_multicluster_engine_for_kubernetes_2.8.6"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-26013",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-26013"
},
{
"cve": "CVE-2026-27142",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-27142"
},
{
"cve": "CVE-2026-28277",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-28277"
},
{
"cve": "CVE-2026-28684",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-28684"
},
{
"cve": "CVE-2026-32288",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-32288"
},
{
"cve": "CVE-2026-33151",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-33151"
},
{
"cve": "CVE-2026-33349",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-33349"
},
{
"cve": "CVE-2026-33532",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-33532"
},
{
"cve": "CVE-2026-33891",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-33891"
},
{
"cve": "CVE-2026-33894",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-33894"
},
{
"cve": "CVE-2026-33895",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-33895"
},
{
"cve": "CVE-2026-33896",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-33896"
},
{
"cve": "CVE-2026-33916",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-33916"
},
{
"cve": "CVE-2026-34601",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-34601"
},
{
"cve": "CVE-2026-35469",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-35469"
},
{
"cve": "CVE-2026-39406",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-39406"
},
{
"cve": "CVE-2026-39407",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-39407"
},
{
"cve": "CVE-2026-39408",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-39408"
},
{
"cve": "CVE-2026-39409",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-39409"
},
{
"cve": "CVE-2026-39410",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-39410"
},
{
"cve": "CVE-2026-39983",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-39983"
},
{
"cve": "CVE-2026-40175",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-40175"
},
{
"cve": "CVE-2026-40347",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-40347"
},
{
"cve": "CVE-2026-40895",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-40895"
},
{
"cve": "CVE-2026-41238",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-41238"
},
{
"cve": "CVE-2026-41239",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-41239"
},
{
"cve": "CVE-2026-41240",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-41240"
},
{
"cve": "CVE-2026-4923",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-4923"
},
{
"cve": "CVE-2026-4926",
"product_status": {
"known_affected": [
"67646",
"T053657",
"T053656",
"T054027",
"74185"
]
},
"release_date": "2026-05-06T22:00:00.000+00:00",
"title": "CVE-2026-4926"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.