Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 11 Apr 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yamato-security
Yamato-security hayabusa |
|
| Vendors & Products |
Yamato-security
Yamato-security hayabusa |
Wed, 08 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hayabusa versions prior to 3.8.0 contain a cross-site scripting (XSS) vulnerability in its HTML report output that allows an attacker to execute arbitrary JavaScript when a user scans JSON-exported logs containing malicious content in the Computer field. An attacker can inject JavaScript into the Computer field of JSON logs that executes in the forensic examiner's browser session when viewing the generated HTML report, leading to information disclosure or code execution. | |
| Title | Hayabusa < 3.8.0 XSS via JSON Log Import | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-11T03:04:53.201Z
Reserved: 2026-04-08T13:36:47.863Z
Link: CVE-2026-40028
Updated: 2026-04-11T03:04:48.535Z
Status : Received
Published: 2026-04-08T22:16:23.137
Modified: 2026-04-08T22:16:23.137
Link: CVE-2026-40028
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:25:54Z