Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 17 February 2026

RSS

172 vulnerabilities published on 17 February 2026

Severity:
httpsig-hyper Digest Verification May Fail to Detect Message Tampering
CVE-2026-26275 GHSA-7v42-g35v-xrch
Some applications using httpsig-hyper may incorrectly accept tampered messages due to a bug in the library's digest verification process. This can lead to undetected changes to message content. To fix...
7.5
Rust rs-soroban-sdk Macro Can Call Wrong Function
CVE-2026-26267 GHSA-4chv-4c6w-w254
The rs-soroban-sdk macro can mistakenly call the wrong function when two functions with the same name are defined on a contract. This can bypass security checks if the trait version of the function co...
7.5
Go Program Crashes When Shared Maps Are Accessed Concurrently
CVE-2026-26201 GHSA-f5p9-j34q-pwcc
A bug in some Go programs can cause them to crash when many users access shared data at the same time. This can happen when multiple parts of the program try to read and write to the same data simulta...
7.0
IBM Security QRadar EDR: Sensitive data can be decrypted by attackers
CVE-2025-36379
IBM Security QRadar EDR versions 3.12 through 3.12.23 use outdated encryption that could let hackers access confidential information. This makes it a high-risk situation for organizations using these ...
7.5
IBM DB2 Merge Backup Memory Exposure on Linux, UNIX, and Windows
CVE-2025-13108
IBM DB2 Merge Backup on certain systems may store sensitive data in memory, allowing unauthorized access. This could potentially lead to data breaches if an attacker gains access to the system's memor...
7.5
Apache Tomcat and Apache Tomcat Native: Certificate Revocation Bypass Possible
CVE-2026-24734
Apache Tomcat and Apache Tomcat Native have a flaw that could allow a malicious certificate to be used even if it's been revoked. This means a hacker could potentially use a fake certificate to pose a...
7.5
Apache Tomcat Native and Tomcat allow certificate revocation to be bypassed
CVE-2026-24734
Apache Tomcat Native and Tomcat versions that use an OCSP responder can be tricked into accepting expired or invalid certificates. This could allow attackers to pretend to be a trusted website or serv...
7.5
IBM Concert: Sensitive Data May Be Unprotected
CVE-2024-43178
IBM Concert uses weak encryption that could let attackers decrypt sensitive information. This means that if an attacker gets access to encrypted data, they might be able to read it. IBM has already fi...
7.5
OpenClaw Telegram Webhook Forgery: Unsecured Access to Bot Actions
CVE-2026-25474 GHSA-mp5h-m6qj-6292
If you use OpenClaw with Telegram, an attacker could send fake updates to your bot if they can reach the webhook endpoint. This could make your bot take unintended actions. To fix this, set a secret t...
7.5
Pterodactyl Panel: Active SFTP sessions persist after account deletion or password change
GHSA-hr7j-63v7-vj7g
Using Pterodactyl Panel, deleting a user or changing their password doesn't immediately end existing SFTP connections. This means someone could still access your server's files even after you think yo...
7.5
Guardian Gryphon v01.06.0006.22 Failure to Properly Validate TLS Certificates Allows Root Access
CVE-2025-65753
A security issue in Guardian Gryphon v01.06.0006.22 means that attackers can potentially gain access to your system with full privileges. This is a serious problem because it allows unauthorized users...
7.5
Rack: Malicious requests can reveal directories outside the intended root
CVE-2026-22860 GHSA-mxw3-3hh2-x2mh
A security issue in Rack can allow attackers to see directories outside the intended secure area of a website. This is a concern if you're using Rack with a directory that has a name that matches the ...
7.5
Red Hat Ceph Storage 7.1 Security Updates Available
RHSA-2026:2769
Red Hat Ceph Storage 7.1 has received security updates to fix several issues, including potential security risks. These updates are recommended to be applied as soon as possible to ensure the security...
7.5
Red Hat Linux Kernel Software Can Be Compromised by Unauthorized Access
RHSA-2026:2766
An update is available for Red Hat Linux kernel software that fixes a vulnerability allowing unauthorized access. This update is important for maintaining the security and integrity of your system. Ap...
7.5
Red Hat Satellite 6.16.6.1 Async Update Allows Unauthorized Access
RHSA-2026:2765
An update to Red Hat Satellite 6.16.6.1 allows unauthorized access to the system. This affects any organization using Red Hat Satellite 6.16.6.1 for system management. To protect your systems, apply t...
7.5
Red Hat Satellite 6.17.6.3 Async Update Has a Security Flaw
RHSA-2026:2764
Red Hat Satellite, a software used to manage IT assets, contains a security flaw that allows an attacker to access sensitive information. This flaw occurs when handling asynchronous updates, which is ...
7.5
Red Hat Satellite 6.18.3 Async Update Allows Unauthorized Access
RHSA-2026:2760
A vulnerability in Red Hat Satellite 6.18.3 allows an attacker to access unauthorized information. This affects systems using Satellite 6.18.3 for configuration management and software updates. To pro...
7.5
Red Hat Resource Agents Security Flaw Allows Unauthorized Root Access
RHSA-2026:2758
An update is available for Red Hat's resource-agents software, which fixes a security issue that could allow an attacker to gain root access to a system. This flaw is particularly concerning because i...
7.5
Critical Update Needed for Python urllib3 Library
RHSA-2026:2728
The urllib3 library, used by many Python applications, has a security flaw that could allow hackers to access sensitive data. Update your Python packages to fix the issue and prevent unauthorized acce...
7.5
Python urllib3 Library Security Update for Red Hat
RHSA-2026:2723
An update is available for the Python urllib3 library, used by various applications, to address a security issue that could allow an attacker to execute arbitrary code on a vulnerable system. Affected...
7.5
Red Hat Kernel Security Update: Potential Privilege Escalation Exploit
RHSA-2026:2722
A security update is available for the Red Hat kernel, which addresses a potential security issue that could allow an attacker to gain elevated privileges. This update is recommended for all users run...
7.5
Red Hat Linux Kernel Security Update: Potential Data Exposure
RHSA-2026:2721
A security update is available for the Red Hat Linux kernel, which fixes a flaw that could allow unauthorized access to sensitive information. This update is important for all Red Hat Linux users to i...
7.5
Python urllib3 Library May Allow Malicious Data Injection
RHSA-2026:2718
The urllib3 library, used by many Python applications, has a security issue that could allow an attacker to inject malicious data into a Python program. This could potentially lead to data corruption ...
7.5
Python urllib3 Library Update Fixes Security Issue
RHSA-2026:2717
A security issue has been fixed in a popular Python library called urllib3, which is used by many other software packages. This update is important because it prevents attackers from being able to exe...
7.5
Critical Update Needed for Red Hat Resource Agents
RHSA-2026:2712
A security update is available for Red Hat Resource Agents, a tool used to manage system resources. This update fixes a critical issue that can allow an attacker to execute arbitrary code on a system....
7.5