This archive includes all published incident pages. Page 11 of 18.
Each page is intended to help a security team answer three questions quickly: why the issue is AI-relevant, what part of the workflow may be exposed, and what actions should happen first.
Incident date: February 18, 2026 | Published: February 25, 2026
Impact A vulnerable node can be forced to shutdown/crash using a specially crafted message. More details to be released later. ### Patches The problem is resolved in the v1.16.9 and v1.17.0 releases of Geth.
Incident date: February 18, 2026 | Published: February 25, 2026
Summary *SQL Injection in IPv6 Address Search functionality via address parameter** A SQL injection vulnerability exists in the ajax_table.php endpoint.
Incident date: February 18, 2026 | Published: February 25, 2026
Summary **/port-groups name Stored Cross-Site Scripting** - HTTP POST - Request-URI(s): "/port-groups" - Vulnerable parameter(s): "name" - Attacker must be authenticated with "admin" privileges.
Incident date: February 18, 2026 | Published: February 25, 2026
Summary **/device-groups name Stored Cross-Site Scripting** - HTTP POST - Request-URI(s): "/device-groups" - Vulnerable parameter(s): "name" - Attacker must be authenticated with "admin" privileges.
Incident date: February 18, 2026 | Published: February 25, 2026
Summary A command injection vulnerability in the wifiNetworks() function allows an attacker to execute arbitrary OS commands via an unsanitized network interface parameter in the retry code path. ### Details In lib/wifi.
Incident date: February 18, 2026 | Published: February 25, 2026
Summary openclaw could start the sandbox browser bridge server without authentication. When the sandboxed browser is enabled, openclaw runs a local (loopback) HTTP bridge that exposes browser control endpoints (for example /profiles ,...