Embedded System Vulnerabilities
A focused list of vulnerabilities relevant to embedded and IoT devices.
| CVE ID | Description | Severity | Published | Type |
|---|---|---|---|---|
| CVE-2026-33459 | Uncontrolled Resource Consumption (CWE-400) in Kibana can lead to denial of service via Excessive Allocation (CAPEC-130… | Medium (6.5) | 2026-04-08 | Environment Specific |
| CVE-2026-33458 | Server-Side Request Forgery (CWE-918) in Kibana One Workflow can lead to information disclosure. An authenticated user … | Medium (6.3) | 2026-04-08 | Environment Specific |
| CVE-2026-32591 | A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an … | Medium (5.2) | 2026-04-08 | Environment Specific |
| CVE-2026-32590 | A flaw was found in Red Hat Quay's handling of resumable container image layer uploads. The upload process stores inter… | High (7.1) | 2026-04-08 | Environment Specific |
| CVE-2026-32589 | A flaw was found in Red Hat Quay's container image upload process. An authenticated user with push access to any reposi… | High (7.1) | 2026-04-08 | Environment Specific |