No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 17 May 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in adenhq hive up to 0.11.0. This affects the function _read_events_tail of the file core/framework/server/routes_sessions.py of the component Delete Request Handler. Performing a manipulation results in path traversal. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | adenhq hive Delete Request routes_sessions.py _read_events_tail path traversal | |
| First Time appeared |
Adenhq
Adenhq hive |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:adenhq:hive:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Adenhq
Adenhq hive |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-17T13:15:09.780Z
Reserved: 2026-05-16T17:39:06.425Z
Link: CVE-2026-8757
No data.
Status : Received
Published: 2026-05-17T14:16:21.380
Modified: 2026-05-17T14:16:21.380
Link: CVE-2026-8757
No data.
OpenCVE Enrichment
Updated: 2026-05-17T16:30:05Z