Common Vulnerabilities and Exposures (CVE)

CVE-2026-40199

Apr 10, 2026 21:49:48 UTC

Net::CIDR::Lite versions before 0.23 for Perl mishandles IPv4 mapped IPv6 addresses, which may allow IP ACL bypass. _pack_ipv6() includes the sentinel byte from _pack_ipv4() when building the packed representation of IPv4 mapped addresses ...

CVE-2026-40198

Apr 10, 2026 21:42:06 UTC

Net::CIDR::Lite versions before 0.23 for Perl does not validate IPv6 group count, which may allow IP ACL bypass. _pack_ipv6() does not check that uncompressed IPv6 addresses (without ::) have exactly 8 hex groups. Inputs like "abcd", "1:2:...

CVE-2026-5724

Apr 10, 2026 21:22:30 UTC

The frontend gRPC server's streaming interceptor chain did not include the authorization interceptor. When a ClaimMapper and Authorizer are configured, unary RPCs enforce authentication and authorization, but the streaming AdminService/Stre...

CVE-2026-32211

Apr 10, 2026 21:20:55 UTC

Missing authentication for critical function in Azure MCP Server allows an unauthorized attacker to disclose information over a network.

CVE-2026-32173

Apr 10, 2026 21:20:54 UTC

Improper authentication in Azure SRE Agent allows an unauthorized attacker to disclose information over a network.

CVE-2026-33105

Apr 10, 2026 21:20:53 UTC

Improper authorization in Microsoft Azure Kubernetes Service allows an unauthorized attacker to elevate privileges over a network.

CVE-2026-26135

Apr 10, 2026 21:20:49 UTC

Server-side request forgery (ssrf) in Azure Custom Locations Resource Provider (RP) allows an authorized attacker to elevate privileges over a network.

CVE-2026-33107

Apr 10, 2026 21:20:48 UTC

Server-side request forgery (ssrf) in Azure Databricks allows an unauthorized attacker to elevate privileges over a network.

CVE-2026-32186

Apr 10, 2026 21:20:48 UTC

Server-side request forgery (ssrf) in Microsoft Bing allows an unauthorized attacker to elevate privileges over a network.

CVE-2026-33118

Apr 10, 2026 21:20:44 UTC

Microsoft Edge (Chromium-based) Spoofing Vulnerability

CVE-2026-33119

Apr 10, 2026 21:20:37 UTC

User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.

CVE-2026-32213

Apr 10, 2026 21:20:30 UTC

Improper authorization in Azure AI Foundry allows an unauthorized attacker to elevate privileges over a network.

CVE-2026-32590

Apr 10, 2026 21:16:18 UTC

A flaw was found in Red Hat Quay's handling of resumable container image layer uploads. The upload process stores intermediate data in the database using a format that, if tampered with, could allow an attacker to execute arbitrary code on ...

CVE-2026-5483

Apr 10, 2026 21:07:45 UTC

A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in the `odh-dashboard` component of Red Hat OpenShift AI (RHOAI) allows for the disclosure of Kubernetes Service Account tokens through a NodeJS endpoint. This co...

CVE-2026-4631

Apr 10, 2026 21:05:16 UTC

Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP requ...