This archive includes all published incident pages. Page 9 of 16.
Each page is intended to help a security team answer three questions quickly: why the issue is AI-relevant, what part of the workflow may be exposed, and what actions should happen first.
Incident date: February 18, 2026 | Published: February 25, 2026
fabric.js applies escapeXml() to text content during SVG export ( src/shapes/Text/TextSVGExportMixin.ts:186 ) but fails to apply it to other user-controlled string values that are interpolated into SVG attribute markup.
Incident date: February 18, 2026 | Published: February 25, 2026
Summary A configuration injection issue in the Docker tool sandbox could allow dangerous Docker options (bind mounts, host networking, unconfined profiles) to be applied, enabling container escape or host data access.
Incident date: February 18, 2026 | Published: February 25, 2026
Summary minimatch is vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string.
Incident date: February 18, 2026 | Published: February 25, 2026
Impact A vulnerable node can be forced to shutdown/crash using a specially crafted message. More details to be released later. ### Patches The problem is resolved in the v1.16.9 and v1.17.0 releases of Geth.
Incident date: February 18, 2026 | Published: February 25, 2026
Summary *SQL Injection in IPv6 Address Search functionality via address parameter** A SQL injection vulnerability exists in the ajax_table.php endpoint.