9.1

CVSS4.0

CVE-2026-26069 - Scraparr Readarr Integration exposes sensitive values as metric labels.

Scraparr is a Prometheus Exporter for various components of the *arr Suite. From 3.0.0-beta to before 3.0.2, when the Readarr integration was enabled, the exporter exposed the configured Readarr API key as the alias metric label value. Users were affected only if all of the following conditions are…

πŸ“… Published: Feb. 12, 2026, 9:33 p.m. πŸ”„ Last Modified: April 17, 2026, 8 p.m.

9.3

CVSS4.0

CVE-2026-1358 - Airleader Master Unrestricted Upload of File with Dangerous Type

Airleader Master versions 6.381 and prior allow for file uploads without restriction to multiple webpages running maximum privileges. This could allow an unauthenticated user to potentially obtain remote code execution on the server.

πŸ“… Published: Feb. 12, 2026, 9:24 p.m. πŸ”„ Last Modified: April 16, 2026, 5:15 p.m.

8.8

CVSS3.1

CVE-2026-26056 - Arbitrary WASM Code Execution via AnnotationOverrideFlight Injection in Yoke ATC

Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. It allows users with CR create/update permissions to execute arbitrary WASM code in the ATC controller context by injecting a m…

πŸ“… Published: Feb. 12, 2026, 9:11 p.m. πŸ”„ Last Modified: April 17, 2026, 8 p.m.

7.5

CVSS3.1

CVE-2026-26055 - Unauthenticated Admission Webhook Endpoints in Yoke ATC

Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. The ATC webhook endpoints lack proper authentication mechanisms, allowing any pod within the cluster network to directly send A…

πŸ“… Published: Feb. 12, 2026, 9:07 p.m. πŸ”„ Last Modified: April 17, 2026, 8 p.m.

9.4

CVSS4.0

CVE-2026-26020 - AutoGPT Affected by Remote Code Execution via Dynamic Module Import in Block Loading (__import__)

AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to 0.6.48, an authenticated user could achieve Remote Code Execution (RCE) on the backend server by embedding a disabled block inside a graph. The B…

πŸ“… Published: Feb. 12, 2026, 8:52 p.m. πŸ”„ Last Modified: April 18, 2026, 12:45 p.m.

9.3

CVSS4.0

CVE-2026-26011 - Critical Heap Out-of-bounds Access in `pf_cluster_stats()` via Malicious /initialpose Covariance --…

navigation2 is a ROS 2 Navigation Framework and System. In 1.3.11 and earlier, a critical heap out-of-bounds write vulnerability exists in Nav2 AMCL's particle filter clustering logic. By publishing a single crafted geometry_msgs/PoseWithCovarianceStamped message with extreme covariance values to t…

πŸ“… Published: Feb. 12, 2026, 8:42 p.m. πŸ”„ Last Modified: April 17, 2026, 8 p.m.

5

CVSS3.1

CVE-2026-26005 - ClipBucket v5 enables internal network scans via an SSRF vulnerability

ClipBucket v5 is an open source video sharing platform. Prior to 5.5.3 - #45, in Clip Bucket V5, The Remote Play allows creating video entries that reference external video URLs without uploading the video files to the server. However, by specifying an internal network host in the video URL, an SSR…

πŸ“… Published: Feb. 12, 2026, 8:34 p.m. πŸ”„ Last Modified: April 17, 2026, 8 p.m.

5.3

CVSS4.0

CVE-2026-26000 - XWiki Platform affected by click-jacking through CSS injection in comments

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Prior to 17.9.0, 17.4.6, and 16.10.13, it's possible using comments to inject CSS that would transform the full wiki in a link area leading to a malicious page. This vulnerability is fixed in 17…

πŸ“… Published: Feb. 12, 2026, 8:30 p.m. πŸ”„ Last Modified: April 17, 2026, 8 p.m.

6

CVSS4.0

CVE-2026-0619 - Integer Wraparound DoS in Silicon Labs Matter Implementation

A reachable infinite loop via an integer wraparound is present in Silicon Labs' Matter SDK which allows an attacker to trigger a denial of service. A hard reset is required to recover the device.

πŸ“… Published: Feb. 12, 2026, 8:09 p.m. πŸ”„ Last Modified: April 17, 2026, 8 p.m.

6.9

CVSS4.0

CVE-2026-25996 - Inspektor Gadget uses unsanitized ANSI Escape Sequences In `columns` Output Mode

Inspektor Gadget is a set of tools and framework for data collection and system inspection on Kubernetes clusters and Linux hosts using eBPF. String fields from eBPF events in columns output mode are rendered to the terminal without any sanitization of control characters or ANSI escape sequences. T…

πŸ“… Published: Feb. 12, 2026, 8:06 p.m. πŸ”„ Last Modified: April 18, 2026, 12:45 p.m.
Total resulsts: 349182
Page 1655 of 34,919
Β« previous page Β» next page
Filters