CWE-522 | Teknoloji dünyasından en güncel haberleri ve güvenlikle ilgili gelişmeleri takip edin.

Kategori: CWE-522 - CVE listesi
CWE 148 kayıt
High CVSS: 7.5

CVE-2026-35467

The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.
Medium CVSS: 4.9

CVE-2026-4819

In Search Guard FLX versions from 1.0.0 up to 4.0.1, the audit logging feature might log user credentials from users logging into Kibana.
High CVSS: 8.6

CVE-2026-33575

OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly in pairing setup codes generated by /pair endpoint and OpenClaw qr command. Attackers with access to leaked setup codes from chat history, logs, or screenshots…
High CVSS: 8.3

CVE-2025-15617

Wazuh version 4.12.0 contains an exposure vulnerability in GitHub Actions workflow artifacts that allows attackers to extract the GITHUB_TOKEN from uploaded artifacts. Attackers can use the exposed token within a limited time window to perf…
High CVSS: 8.4

CVE-2025-13478

Cache misconfiguration vulnerability in OpenText Identity Manager on Windows, Linux allows remote authenticated users to obtain another user's session data via insecure application cache handling. This issue affects Identity Manager: 25.2(v…
Medium CVSS: 6.6

CVE-2026-33182

Saloon is a PHP library that gives users tools to build API integrations and SDKs. Prior to version 4.0.0, when building the request URL, Saloon combined the connector's base URL with the request endpoint. If the endpoint was a valid absolu…
Medium CVSS: 5.1

CVE-2025-36440

IBM Concert 1.0.0 through 2.2.0 could allow a local user to obtain sensitive information due to missing function level access control.
Medium CVSS: 6.5

CVE-2025-14790

IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 could allow an attacker to obtain sensitive information due to insufficiently protected credentials.
High CVSS: 7.3

CVE-2025-64998

Exposure of session signing secret in Checkmk
High CVSS: 8.8

CVE-2026-32913

OpenClaw before 2026.3.7 contains an improper header validation vulnerability in fetchWithSsrFGuard that forwards custom authorization headers across cross-origin redirects. Attackers can trigger redirects to different origins to intercept…
Medium CVSS: 6.9

CVE-2026-31926

Charging station authentication identifiers are publicly accessible via web-based mapping platforms.
Medium CVSS: 6.9

CVE-2026-28204

Charging station authentication identifiers are publicly accessible via web-based mapping platforms.
High CVSS: 8.6

CVE-2026-23658

Insufficiently protected credentials in Azure DevOps allows an unauthorized attacker to elevate privileges over a network.
High CVSS: 7.6

CVE-2026-32606

IncusOS is an immutable OS image dedicated to running Incus. Prior to 202603142010, the default configuration of systemd-cryptenroll as used by IncusOS through mkosi allows for an attacker with physical access to the machine to access the e…
High CVSS: 7.7

CVE-2026-21670

A vulnerability allowing a low-privileged user to extract saved SSH credentials.
Medium CVSS: 5.3

CVE-2026-3783

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a second URL, curl could leak that token to the second hostname under some circumstances. If the hostname that the first request is redir…
Medium CVSS: 6.9

CVE-2026-27777

Charging station authentication identifiers are publicly accessible via web-based mapping platforms.
Medium CVSS: 6.9

CVE-2026-27027

Charging station authentication identifiers are publicly accessible via web-based mapping platforms.
Medium CVSS: 4.8

CVE-2026-28714

Unnecessary transmission of sensitive cryptographic material. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.
Medium CVSS: 6.9

CVE-2026-27770

Charging station authentication identifiers are publicly accessible via web-based mapping platforms.