<?xml version="1.0" encoding="utf-8"?>
            <?xml-stylesheet type="text/xsl" href="/preview.xsl"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
<atom:link href="https://rsseverything.com/zh/feed/0d9cc5d3-20c2-4021-bda4-45769f953be5.xml" rel="self" type="application/rss+xml" />
    <title>Vulnerability Reports - Go Packages</title>
    <link>https://pkg.go.dev/vuln/list</link>
    <description><![CDATA[Go is an open source programming language that makes it easy to build simple, reliable, and efficient software.]]></description>
    <lastBuildDate>Tue, 10 Mar 2026 14:28:17 -0400</lastBuildDate>
    <generator>Rss Everything</generator>
    <ttl>360</ttl>



<item>




<guid isPermaLink="false">f0b591687779c30e976ee964f43ab2f7</guid>
<pubDate>Sat, 07 Mar 2026 00:46:54 -0500</pubDate>
<title>GO-2026-4603
        
        
  
  
    standard library
  

      
      
        
  
  
    
    
      
        
          CVE-2026-27142
        
      
      Affects:
       
          html/template
        
      
      Published: Mar 06, 2026
      
      
      
    

    
      Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value &quot;refresh&quot;.

A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow &quot;url=&quot; by setting htmlmetacontenturlescape=0.
    
  

      
    
      </title>
<link>https://pkg.go.dev/vuln/GO-2026-4603</link>
<description><![CDATA[CVE-2026-23999, GHSA-ppwx-5jq7-px2w, github.com/fleetdm/fleet/v4, Published: Feb 27, 2026, Unreviewed, Fleet: Device lock PIN can be predicted if lock time is known in github.com/fleetdm/fleet


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">1e05aac08c7d8b292bf0efb346472080</guid>
<pubDate>Wed, 04 Mar 2026 23:05:06 -0500</pubDate>
<title>GO-2026-4563</title>
<link>https://pkg.go.dev/vuln/GO-2026-4563</link>
<description><![CDATA[CVE-2026-24004, GHSA-9pm7-6g36-6j78, github.com/fleetdm/fleet/v4, Published: Feb 27, 2026, Unreviewed, Fleet: Unauthenticated Android device disenrollment vulnerability via Pub/Sub endpoint in github.com/fleetdm/fleet


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">55bae8e053bdff436657cab0a7a0d737</guid>
<pubDate>Wed, 04 Mar 2026 23:05:00 -0500</pubDate>
<title>GO-2026-4562</title>
<link>https://pkg.go.dev/vuln/GO-2026-4562</link>
<description><![CDATA[CVE-2026-27900, GHSA-5rc7-2jj6-mp64, github.com/linode/terraform-provider-linode, github.com/linode/terraform-provider-linode/v2, and 1 more, Published: Feb 27, 2026, Unreviewed, Terraform Provider for Linode Debug Logs Vulnerable to Sensitive Information Exposure in github.com/linode/terraform-provider-linode


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">1af186c0fcc6d15b46a93a838c7a68fc</guid>
<pubDate>Wed, 04 Mar 2026 23:04:54 -0500</pubDate>
<title>GO-2026-4561</title>
<link>https://pkg.go.dev/vuln/GO-2026-4561</link>
<description><![CDATA[CVE-2026-25963, GHSA-5jvp-m9h4-253h, github.com/fleetdm/fleet/v4, Published: Feb 27, 2026, Unreviewed, Fleet: Authorization Bypass in certificate template batch deletion for team administrators in github.com/fleetdm/fleet


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">c3b0dbb2a7ffe4712855e476d5109e9b</guid>
<pubDate>Wed, 04 Mar 2026 23:04:45 -0500</pubDate>
<title>GO-2026-4560</title>
<link>https://pkg.go.dev/vuln/GO-2026-4560</link>
<description><![CDATA[CVE-2026-27465, GHSA-2v6m-6xw3-6467, github.com/fleetdm/fleet/v4, Published: Feb 27, 2026, Unreviewed, Fleet: Sensitive Google Calendar credentials disclosed to low-privileged users in github.com/fleetdm/fleet


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">0bb7af653c652a78a53505338330c184</guid>
<pubDate>Thu, 26 Feb 2026 16:47:31 -0500</pubDate>
<title>GO-2026-4559</title>
<link>https://pkg.go.dev/vuln/GO-2026-4559</link>
<description><![CDATA[CVE-2026-27141, golang.org/x/net, Published: Feb 26, 2026</li>
      
      
      
    </ul>

    
      <p>Due to missing nil check, sending 0x0a-0x0f HTTP/2 frames will cause a running server to panic</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4558">GO-2026-4558</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2026-27808, GHSA-mpf7-p9x7-96r3
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/axllent/mailpit
        
      </li>
      <li class="go-textSubtle">Published: Feb 27, 2026, Unreviewed, Mailpit is Vulnerable to Server-Side Request Forgery (SSRF) via Link Check API in github.com/axllent/mailpit


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">792dccf348fc28c6ebc4349eb558b53e</guid>
<pubDate>Wed, 04 Mar 2026 23:04:38 -0500</pubDate>
<title>GO-2026-4557</title>
<link>https://pkg.go.dev/vuln/GO-2026-4557</link>
<description><![CDATA[CVE-2026-26186, GHSA-49xw-vfc4-7p43, github.com/fleetdm/fleet/v4, Published: Feb 27, 2026, Unreviewed, Fleet has an SQL Injection vulnerability via backtick escape in ORDER BY parameter in github.com/fleetdm/fleet


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">93ce1d736e0a65b1d175a6231392a2f5</guid>
<pubDate>Wed, 04 Mar 2026 23:04:33 -0500</pubDate>
<title>GO-2026-4556</title>
<link>https://pkg.go.dev/vuln/GO-2026-4556</link>
<description><![CDATA[CVE-2026-27819, GHSA-42wg-38gx-85rh, code.vikunja.io/api, Published: Feb 27, 2026, Unreviewed, Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">4c510e68a6e190adcc2437fb3a8d24f3</guid>
<pubDate>Wed, 04 Mar 2026 23:04:26 -0500</pubDate>
<title>GO-2026-4554</title>
<link>https://pkg.go.dev/vuln/GO-2026-4554</link>
<description><![CDATA[CVE-2026-27730, GHSA-p2v6-84h2-5x4r, github.com/esm-dev/esm.sh, Published: Feb 27, 2026, Unreviewed, esm.sh has SSRF localhost/private-network bypass in `/http(s)` module route in github.com/esm-dev/esm.sh


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">0fe8bcc4701f2bb8e06dd375f6591342</guid>
<pubDate>Wed, 04 Mar 2026 23:04:19 -0500</pubDate>
<title>GO-2026-4553</title>
<link>https://pkg.go.dev/vuln/GO-2026-4553</link>
<description><![CDATA[CVE-2026-27616, GHSA-7jp5-298q-jg98, code.vikunja.io/api, Published: Feb 27, 2026, Unreviewed, Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">a6fec6dc19f272fc2684dc4726c0033b</guid>
<pubDate>Wed, 04 Mar 2026 23:04:14 -0500</pubDate>
<title>GO-2026-4552</title>
<link>https://pkg.go.dev/vuln/GO-2026-4552</link>
<description><![CDATA[CVE-2026-27116, GHSA-4qgr-4h56-8895, code.vikunja.io/api, Published: Feb 27, 2026, Unreviewed, Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">1f53d4e46c320967d4f1f71b6bceb77b</guid>
<pubDate>Wed, 04 Mar 2026 23:04:12 -0500</pubDate>
<title>GO-2026-4551</title>
<link>https://pkg.go.dev/vuln/GO-2026-4551</link>
<description><![CDATA[CVE-2026-27575, GHSA-3ccg-x393-96v8, code.vikunja.io/api, Published: Feb 27, 2026, Unreviewed, Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">980a0b9a584a578232d9de5a4a14aa84</guid>
<pubDate>Wed, 04 Mar 2026 23:04:07 -0500</pubDate>
<title>GO-2026-4550</title>
<link>https://pkg.go.dev/vuln/GO-2026-4550</link>
<description><![CDATA[CVE-2026-1229, GHSA-q9hv-hpm4-hj6x, github.com/cloudflare/circl, Published: Feb 27, 2026, Unreviewed, CIRCL has an incorrect calculation in secp384r1 CombinedMult in github.com/cloudflare/circl


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">e969c3382eeff152dd727713b0620ec5</guid>
<pubDate>Wed, 04 Mar 2026 23:04:01 -0500</pubDate>
<title>GO-2026-4549</title>
<link>https://pkg.go.dev/vuln/GO-2026-4549</link>
<description><![CDATA[CVE-2026-24005, GHSA-9fj4-3849-rv9g, github.com/openkruise/kruise, Published: Feb 27, 2026, Unreviewed, OpenKruise PodProbeMarker is Vulnerable to SSRF via Unrestricted Host Field in github.com/openkruise/kruise


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">c0e0de26850e071880b9c18f5a88b871</guid>
<pubDate>Wed, 04 Mar 2026 23:03:55 -0500</pubDate>
<title>GO-2026-4548</title>
<link>https://pkg.go.dev/vuln/GO-2026-4548</link>
<description><![CDATA[GHSA-2phg-qgmm-r638, github.com/bishopfox/sliver, Published: Feb 25, 2026, Unreviewed, Sliver has Potential Zip Bomb Denial of Service in GzipEncoder in github.com/bishopfox/sliver


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">d3807cbb8ddf2d6dab6dc5ce171a5c3b</guid>
<pubDate>Thu, 26 Feb 2026 02:38:42 -0500</pubDate>
<title>GO-2026-4547</title>
<link>https://pkg.go.dev/vuln/GO-2026-4547</link>
<description><![CDATA[CVE-2026-27626, GHSA-49gm-hh7w-wfvf, github.com/OliveTin/OliveTin, Published: Feb 25, 2026, Unreviewed, OliveTin: OS Command Injection via `password` argument type and webhook JSON extraction bypasses shell safety checks in github.com/OliveTin/OliveTin


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">26a71126f2a8617ccecf712ee8de77d0</guid>
<pubDate>Thu, 26 Feb 2026 02:38:39 -0500</pubDate>
<title>GO-2026-4546</title>
<link>https://pkg.go.dev/vuln/GO-2026-4546</link>
<description><![CDATA[CVE-2026-27611, GHSA-8vrh-3pm2-v4v6, github.com/gtsteffaniak/filebrowser/backend, Published: Feb 25, 2026, Unreviewed, FileBrowser Quantum: Password Protection Not Enforced on Shared File Links in github.com/gtsteffaniak/filebrowser/backend


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">0fec06ab3b4a2e0310b35cce191ed84e</guid>
<pubDate>Thu, 26 Feb 2026 02:38:34 -0500</pubDate>
<title>GO-2026-4545</title>
<link>https://pkg.go.dev/vuln/GO-2026-4545</link>
<description><![CDATA[CVE-2025-50180, GHSA-3c9r-837r-qqm4, github.com/esm-dev/esm.sh, Published: Feb 25, 2026, Unreviewed, esm.sh is vulnerable to full-response SSRF in github.com/esm-dev/esm.sh


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">8617e69c2e374682e887481dfe1d15a2</guid>
<pubDate>Thu, 26 Feb 2026 16:47:28 -0500</pubDate>
<title>GO-2026-4543</title>
<link>https://pkg.go.dev/vuln/GO-2026-4543</link>
<description><![CDATA[CVE-2026-25882, GHSA-mrq8-rjmw-wpq3, github.com/gofiber/fiber/v2, github.com/gofiber/fiber/v3, Published: Feb 26, 2026</li>
      
      
      
    </ul>

    
      <p>Fiber has a Denial of Service Vulnerability via Route Parameter Overflow in github.com/gofiber/fiber</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4542">GO-2026-4542</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2026-27598, GHSA-6v48-fcq6-ff23
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/dagu-org/dagu
        
      </li>
      <li class="go-textSubtle">Published: Feb 25, 2026, Unreviewed, Dagu: Path traversal in DAG creation allows arbitrary YAML file write outside DAGs directory in github.com/dagu-org/dagu


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">afdfd99a36af8abb5d8798f4f78362b3</guid>
<pubDate>Thu, 26 Feb 2026 16:47:18 -0500</pubDate>
<title>GO-2026-4541</title>
<link>https://pkg.go.dev/vuln/GO-2026-4541</link>
<description><![CDATA[CVE-2026-27588, GHSA-x76f-jf84-rqj8, github.com/caddyserver/caddy/v2, Published: Feb 26, 2026</li>
      
      
      
    </ul>

    
      <p>Caddy MatchHost becomes case-sensitive in github.com/caddyserver/caddy/v2</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4540">GO-2026-4540</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2026-25891, GHSA-m3c2-496v-cw3v
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/gofiber/fiber/v3
        
      </li>
      <li class="go-textSubtle">Published: Feb 26, 2026</li>
      
      
      
    </ul>

    
      <p>Fiber has an Arbitrary File Read in Static Middleware on Windows in github.com/gofiber/fiber/v3</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4539">GO-2026-4539</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2026-27586, GHSA-hffm-g8v7-wrv7
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/caddyserver/caddy/v2
        
      </li>
      <li class="go-textSubtle">Published: Feb 26, 2026</li>
      
      
      
    </ul>

    
      <p>Caddy mTLS authentication fails open in github.com/caddyserver/caddy/v2</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4538">GO-2026-4538</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2026-27587, GHSA-g7pc-pc7g-h8jh
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/caddyserver/caddy/v2
        
      </li>
      <li class="go-textSubtle">Published: Feb 26, 2026</li>
      
      
      
    </ul>

    
      <p>Caddy MatchPath %xx branch skips case normalization in github.com/caddyserver/caddy/v2</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4537">GO-2026-4537</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2026-27589, GHSA-879p-475x-rqh2
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/caddyserver/caddy/v2
        
      </li>
      <li class="go-textSubtle">Published: Feb 26, 2026</li>
      
      
      
    </ul>

    
      <p>Caddy is vulnerable to cross-origin config application via local admin API /load in github.com/caddyserver/caddy/v2</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4536">GO-2026-4536</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2026-27590, GHSA-5r3v-vc8m-m96g
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/caddyserver/caddy/v2
        
      </li>
      <li class="go-textSubtle">Published: Feb 26, 2026</li>
      
      
      
    </ul>

    
      <p>Unicode case-folding causes incorrect split_path index in github.com/caddyserver/caddy/v2</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4535">GO-2026-4535</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2026-27585, GHSA-4xrr-hq4w-6vf4
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/caddyserver/caddy/v2
        
      </li>
      <li class="go-textSubtle">Published: Feb 26, 2026</li>
      
      
      
    </ul>

    
      <p>Improper sanitization of glob characters in github.com/caddyserver/caddy/v2</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4534">GO-2026-4534</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2026-25899, GHSA-2mr3-m5q5-wgp6
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/gofiber/fiber/v3
        
      </li>
      <li class="go-textSubtle">Published: Feb 26, 2026</li>
      
      
      
    </ul>

    
      <p>Fiber is Vulnerable to Denial of Service via Flash Cookie Unbounded Allocation in github.com/gofiber/fiber/v3</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4533">GO-2026-4533</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2026-27571, GHSA-qrvq-68c2-7grw
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/nats-io/nats-server, github.com/nats-io/nats-server/v2
        
      </li>
      <li class="go-textSubtle">Published: Feb 25, 2026, Unreviewed, nats-server websockets are vulnerable to pre-auth memory DoS in github.com/nats-io/nats-server


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">d187aafaa70e48f6269aebbaf4737136</guid>
<pubDate>Thu, 26 Feb 2026 02:38:12 -0500</pubDate>
<title>GO-2026-4532</title>
<link>https://pkg.go.dev/vuln/GO-2026-4532</link>
<description><![CDATA[CVE-2026-25802, GHSA-299v-8pq9-5gjq, github.com/QuantumNous/new-api, Published: Feb 25, 2026, Unreviewed, New API has Potential XSS in its MarkdownRenderer component in github.com/QuantumNous/new-api


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">d1d1a7c5c44fce5acd46f885840a3221</guid>
<pubDate>Thu, 26 Feb 2026 02:38:06 -0500</pubDate>
<title>GO-2026-4531</title>
<link>https://pkg.go.dev/vuln/GO-2026-4531</link>
<description><![CDATA[CVE-2026-25591, GHSA-w6x6-9fp7-fqm4, github.com/QuantumNous/new-api, Published: Feb 25, 2026, Unreviewed, New API has an SQL LIKE Wildcard Injection DoS via Token Search in github.com/QuantumNous/new-api


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">70f70e261a503835d0c13f07b9711405</guid>
<pubDate>Mon, 23 Feb 2026 19:37:28 -0500</pubDate>
<title>GO-2026-4530</title>
<link>https://pkg.go.dev/vuln/GO-2026-4530</link>
<description><![CDATA[GHSA-gv8r-9rw9-9697, github.com/traefik/traefik, github.com/traefik/traefik/v2, and 1 more, Published: Feb 23, 2026, Unreviewed, Traefik affected by TLS ClientAuth Bypass on HTTP/3 in github.com/traefik/traefik


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">9105e3fd0233dcc9f064461156d4d4e9</guid>
<pubDate>Mon, 23 Feb 2026 19:37:24 -0500</pubDate>
<title>GO-2026-4529</title>
<link>https://pkg.go.dev/vuln/GO-2026-4529</link>
<description><![CDATA[CVE-2026-24122, GHSA-wfqv-66vq-46rm, github.com/sigstore/cosign, github.com/sigstore/cosign/v2, and 1 more, Published: Feb 23, 2026, Unreviewed, Cosign considered signatures valid with expired intermediate certificates when transparency log verification is skipped in github.com/sigstore/cosign


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">9be38738a0ce99d003be226e10224dcd</guid>
<pubDate>Mon, 23 Feb 2026 19:37:21 -0500</pubDate>
<title>GO-2026-4528</title>
<link>https://pkg.go.dev/vuln/GO-2026-4528</link>
<description><![CDATA[GHSA-j9wf-6r2x-hqmx, github.com/centrifugal/centrifugo, github.com/centrifugal/centrifugo/v3, and 3 more, Published: Feb 23, 2026, Unreviewed, Centrifugo v6.6.0 dependency vulnerabilities in github.com/centrifugal/centrifugo


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">7535f7606066cc8fe52b72af1357d5f6</guid>
<pubDate>Mon, 23 Feb 2026 19:37:12 -0500</pubDate>
<title>GO-2026-4527</title>
<link>https://pkg.go.dev/vuln/GO-2026-4527</link>
<description><![CDATA[GHSA-6qr9-g2xw-cw92, github.com/dagu-org/dagu, Published: Feb 23, 2026, Unreviewed, Dagu affected by unauthenticated RCE via inline DAG spec in default configuration in github.com/dagu-org/dagu


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">24de2d462b02273281f56bbbaf084369</guid>
<pubDate>Mon, 23 Feb 2026 19:37:06 -0500</pubDate>
<title>GO-2026-4525</title>
<link>https://pkg.go.dev/vuln/GO-2026-4525</link>
<description><![CDATA[CVE-2026-0998, GHSA-w65c-fvp5-fvc5, github.com/mattermost/mattermost-plugin-zoom, Published: Feb 23, 2026, Unreviewed, Mattermost Plugin Zoom fail to validate user identity and post ownership in the {{/api/v1/askPMI}} endpoint in github.com/mattermost/mattermost-plugin-zoom


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">9bddd38f256cd191b5d50803a6b8a941</guid>
<pubDate>Mon, 23 Feb 2026 19:37:03 -0500</pubDate>
<title>GO-2026-4524</title>
<link>https://pkg.go.dev/vuln/GO-2026-4524</link>
<description><![CDATA[CVE-2025-13821, GHSA-pp9j-pf5c-659x, github.com/mattermost/mattermost-server, github.com/mattermost/mattermost-server, and 5 more, Published: Feb 23, 2026, Unreviewed, Mattermost fails to sanitize sensitive data in WebSocket messages in github.com/mattermost/mattermost-server.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20251210191531-cd17b61de41b.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">9eb84513d9b59eb4e4d6cbb0bc0d0ad8</guid>
<pubDate>Mon, 23 Feb 2026 19:36:53 -0500</pubDate>
<title>GO-2026-4523</title>
<link>https://pkg.go.dev/vuln/GO-2026-4523</link>
<description><![CDATA[CVE-2025-14573, GHSA-cgjg-p2m2-qm4p, github.com/mattermost/mattermost-server, github.com/mattermost/mattermost-server, and 5 more, Published: Feb 23, 2026, Unreviewed, Mattermost fails to enforce invite permissions when updating team settings in github.com/mattermost/mattermost-server.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20251215190648-6404ab29acc0.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">a41a9f9a1c9e96a1f4e68782d9803845</guid>
<pubDate>Mon, 23 Feb 2026 19:36:49 -0500</pubDate>
<title>GO-2026-4522</title>
<link>https://pkg.go.dev/vuln/GO-2026-4522</link>
<description><![CDATA[CVE-2026-26963, GHSA-5r23-prx4-mqg3, github.com/cilium/cilium, Published: Feb 23, 2026, Unreviewed, Cilium may not enforce host firewall policies when Native Routing, WireGuard and Node Encryption are enabled in github.com/cilium/cilium


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">b0c8d3acd22b7b6cbc229005442b7e5e</guid>
<pubDate>Mon, 23 Feb 2026 19:36:42 -0500</pubDate>
<title>GO-2026-4521</title>
<link>https://pkg.go.dev/vuln/GO-2026-4521</link>
<description><![CDATA[CVE-2025-14350, GHSA-57cc-2pf4-mhmx, github.com/mattermost/mattermost-server, github.com/mattermost/mattermost-server, and 5 more, Published: Feb 23, 2026, Unreviewed, Mattermost fails to properly validate team membership when processing channel mentions in github.com/mattermost/mattermost-server.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20251209134645-761e56bb11cc.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">92cb60fe2e53df2671955a4bc39592f2</guid>
<pubDate>Mon, 23 Feb 2026 19:36:38 -0500</pubDate>
<title>GO-2026-4520</title>
<link>https://pkg.go.dev/vuln/GO-2026-4520</link>
<description><![CDATA[CVE-2026-0999, GHSA-3c9r-7f29-qp32, github.com/mattermost/mattermost-server, github.com/mattermost/mattermost-server, and 5 more, Published: Feb 23, 2026, Unreviewed, Mattermost fails to properly validate login method restrictions in github.com/mattermost/mattermost-server.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/mattermost/mattermost-server/v5 before v5.3.2-0.20251212052346-61651b0df7ea.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">9af041ca8e0f3b96c0869e7ed28f5b30</guid>
<pubDate>Mon, 23 Feb 2026 19:36:27 -0500</pubDate>
<title>GO-2026-4519</title>
<link>https://pkg.go.dev/vuln/GO-2026-4519</link>
<description><![CDATA[CVE-2026-0997, GHSA-2phx-frhf-xr55, github.com/mattermost/mattermost-plugin-zoom, Published: Feb 23, 2026, Unreviewed, Mattermost Plugin Zoom allows any logged-in user to change Zoom meeting restrictions for arbitrary channels in github.com/mattermost/mattermost-plugin-zoom


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">9f5fa39dd8d046c88cd7e50fdcd408a4</guid>
<pubDate>Mon, 23 Feb 2026 19:36:22 -0500</pubDate>
<title>GO-2026-4517</title>
<link>https://pkg.go.dev/vuln/GO-2026-4517</link>
<description><![CDATA[CVE-2026-24834, GHSA-wwj6-vghv-5p64, github.com/kata-containers/kata-containers/src/runtime, Published: Feb 23, 2026, Unreviewed, Kata Container to Guest micro VM privilege escalation in github.com/kata-containers/kata-containers/src/runtime


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">2100e5b8106e0c687cc41dd10fcfcb83</guid>
<pubDate>Mon, 23 Feb 2026 19:36:17 -0500</pubDate>
<title>GO-2026-4516</title>
<link>https://pkg.go.dev/vuln/GO-2026-4516</link>
<description><![CDATA[CVE-2026-27112, GHSA-7g9x-cp9g-92mr, github.com/akuity/kargo, Published: Feb 23, 2026, Unreviewed, Kargo has an Authorization Bypass Vulnerability in Batch Resource Creation API Endpoints in github.com/akuity/kargo


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">dbe3bdca6ab70422535a088c8122bfd6</guid>
<pubDate>Mon, 23 Feb 2026 19:36:11 -0500</pubDate>
<title>GO-2026-4515</title>
<link>https://pkg.go.dev/vuln/GO-2026-4515</link>
<description><![CDATA[CVE-2026-27111, GHSA-5vvm-67pj-72g4, github.com/akuity/kargo, Published: Feb 23, 2026, Unreviewed, Kargo has Missing Authorization Vulnerabilities in Approval & Promotion REST API Endpoints in github.com/akuity/kargo


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">23364583db35d6195b6d2647d7c6d521</guid>
<pubDate>Wed, 25 Feb 2026 00:59:44 -0500</pubDate>
<title>GO-2026-4512</title>
<link>https://pkg.go.dev/vuln/GO-2026-4512</link>
<description><![CDATA[CVE-2026-26995, GHSA-rrxv-pmq9-x67r, github.com/refraction-networking/utls, Published: Feb 24, 2026</li>
      
      
      
    </ul>

    
      <p>Fingerprint vulnerability in uTLS from missing padding extension for Chrome 120 in github.com/refraction-networking/utls</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4511">GO-2026-4511</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2026-26315, GHSA-m6j8-rg6r-7mv8
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/ethereum/go-ethereum
        
      </li>
      <li class="go-textSubtle">Published: Feb 24, 2026</li>
      
      
      
    </ul>

    
      <p>Go Ethereum Improperly Validates the ECIES Public Key in RLPx Handshake in github.com/ethereum/go-ethereum</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4509">GO-2026-4509</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2026-27017, GHSA-7m29-f4hw-g2vx
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/refraction-networking/utls
        
      </li>
      <li class="go-textSubtle">Published: Feb 24, 2026</li>
      
      
      
    </ul>

    
      <p>Fingerprint vulnerability in uTLS from GREASE ECH mismatch for Chrome parrots in github.com/refraction-networking/utls</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4508">GO-2026-4508</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2026-26313, GHSA-689v-6xwf-5jf3
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/ethereum/go-ethereum
        
      </li>
      <li class="go-textSubtle">Published: Feb 24, 2026</li>
      
      
      
    </ul>

    
      <p>Go Ethereum affected by DoS via malicious p2p message in github.com/ethereum/go-ethereum</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4507">GO-2026-4507</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2026-26314, GHSA-2gjw-fg97-vg3r
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/ethereum/go-ethereum
        
      </li>
      <li class="go-textSubtle">Published: Feb 24, 2026</li>
      
      
      
    </ul>

    
      <p>Go Ethereum affected by crash via malicious p2p message in github.com/ethereum/go-ethereum</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4506">GO-2026-4506</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2026-26205, GHSA-9f29-v6mm-pw6w
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/open-policy-agent/opa-envoy-plugin
        
      </li>
      <li class="go-textSubtle">Published: Feb 23, 2026, Unreviewed, opa-envoy-plugin has an Authorization Bypass via Double-Slash Path Misinterpretation in input.parsed_path in github.com/open-policy-agent/opa-envoy-plugin


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">7f9256428d51af4696422cd1870591ce</guid>
<pubDate>Mon, 23 Feb 2026 19:35:59 -0500</pubDate>
<title>GO-2026-4505</title>
<link>https://pkg.go.dev/vuln/GO-2026-4505</link>
<description><![CDATA[CVE-2026-26957, GHSA-wgm6-9rvv-3438, github.com/abhinavxd/libredesk, Published: Feb 23, 2026, Unreviewed, Libredesk has a SSRF Vulnerability in Webhooks in github.com/abhinavxd/libredesk


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">600691fc94efb10c954deac7578675f1</guid>
<pubDate>Mon, 23 Feb 2026 19:35:57 -0500</pubDate>
<title>GO-2026-4504</title>
<link>https://pkg.go.dev/vuln/GO-2026-4504</link>
<description><![CDATA[CVE-2026-26201, GHSA-f5p9-j34q-pwcc, github.com/jm33-m0/emp3r0r/core, Published: Feb 23, 2026, Unreviewed, emp3r0r Affected by Concurrent Map Access DoS (panic/crash) in github.com/jm33-m0/emp3r0r/core


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">e7ffc1607b3132f49cf827109d403fa8</guid>
<pubDate>Thu, 19 Feb 2026 21:28:35 -0500</pubDate>
<title>GO-2026-4503</title>
<link>https://pkg.go.dev/vuln/GO-2026-4503</link>
<description><![CDATA[CVE-2026-26958, filippo.io/edwards25519, Published: Feb 17, 2026</li>
      
      
      
    </ul>

    
      <p>Previously, if MultiScalarMult was invoked on an initialized point who was not the identity point, MultiScalarMult produced an incorrect result. If called on an uninitialized point, MultiScalarMult exhibited undefined behavior.</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4502">GO-2026-4502</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2026-25766, GHSA-pgvm-wxw2-hrv9
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/labstack/echo/v5
        
      </li>
      <li class="go-textSubtle">Published: Feb 26, 2026</li>
      
      
      
    </ul>

    
      <p>Echo has a Windows path traversal via backslash in middleware.Static default filesystem in github.com/labstack/echo/v5</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4501">GO-2026-4501</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2026-25120, GHSA-jj5m-h57j-5gv7
        </li>
      
      <li class="go-textSubtle">Affects:
       
          gogs.io/gogs
        
      </li>
      <li class="go-textSubtle">Published: Feb 23, 2026, Unreviewed, Gogs Allows Cross-Repository Comment Deletion via DeleteComment in gogs.io/gogs.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: gogs.io/gogs before v0.14.0.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">895a97c56150712982c1207cc149bf4d</guid>
<pubDate>Mon, 23 Feb 2026 19:35:50 -0500</pubDate>
<title>GO-2026-4500</title>
<link>https://pkg.go.dev/vuln/GO-2026-4500</link>
<description><![CDATA[CVE-2026-25242, GHSA-fc3h-92p8-h36f, gogs.io/gogs, Published: Feb 23, 2026, Unreviewed, Unauthenticated File Upload in Gogs in gogs.io/gogs.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: gogs.io/gogs before v0.14.1.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">3410ee7180147ca6dab03e4075e42606</guid>
<pubDate>Mon, 23 Feb 2026 19:35:45 -0500</pubDate>
<title>GO-2026-4499</title>
<link>https://pkg.go.dev/vuln/GO-2026-4499</link>
<description><![CDATA[CVE-2026-25229, GHSA-cv22-72px-f4gh, gogs.io/gogs, Published: Feb 23, 2026, Unreviewed, Gogs has an Authorization Bypass Allows Cross-Repository Label Modification in Gogs in gogs.io/gogs.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: gogs.io/gogs before v0.14.0.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">72378baa28349ca4eaede44e062e6e14</guid>
<pubDate>Mon, 23 Feb 2026 19:35:37 -0500</pubDate>
<title>GO-2026-4498</title>
<link>https://pkg.go.dev/vuln/GO-2026-4498</link>
<description><![CDATA[CVE-2026-25232, GHSA-2c6v-8r3v-gh6p, gogs.io/gogs, Published: Feb 23, 2026, Unreviewed, Gogs has a Protected Branch Deletion Bypass in Web Interface in gogs.io/gogs.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: gogs.io/gogs before v0.14.1.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">54dceb33c169610eb6b21c35b341c07b</guid>
<pubDate>Mon, 23 Feb 2026 19:35:30 -0500</pubDate>
<title>GO-2026-4497</title>
<link>https://pkg.go.dev/vuln/GO-2026-4497</link>
<description><![CDATA[GHSA-hr7j-63v7-vj7g, github.com/pterodactyl/wings, Published: Feb 23, 2026, Unreviewed, Pterodactyl Panel's SFTP sessions remain active after user account deletion or password change in github.com/pterodactyl/wings


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">bb7fc5a48996be025406520ea163ce69</guid>
<pubDate>Mon, 23 Feb 2026 19:35:24 -0500</pubDate>
<title>GO-2026-4496</title>
<link>https://pkg.go.dev/vuln/GO-2026-4496</link>
<description><![CDATA[CVE-2026-22892, GHSA-9pj7-jh2r-87g8, github.com/mattermost/mattermost-server, Published: Feb 23, 2026, Unreviewed, Mattermost doesn't validate user permissions when creating Jira issues from Mattermost posts in github.com/mattermost/mattermost-server


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">06884b929081eda139eb9e01c80f9ca6</guid>
<pubDate>Mon, 23 Feb 2026 19:35:17 -0500</pubDate>
<title>GO-2026-4495</title>
<link>https://pkg.go.dev/vuln/GO-2026-4495</link>
<description><![CDATA[CVE-2026-20796, GHSA-2xf7-hmf6-p64j, github.com/mattermost/mattermost-server, Published: Feb 23, 2026, Unreviewed, Mattermost doesn't properly validate channel membership at the time of data retrieval in github.com/mattermost/mattermost-server


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">0e4822041efb276acb96e9bda1adcadb</guid>
<pubDate>Mon, 23 Feb 2026 19:35:13 -0500</pubDate>
<title>GO-2026-4494</title>
<link>https://pkg.go.dev/vuln/GO-2026-4494</link>
<description><![CDATA[CVE-2026-26187, GHSA-699m-4v95-rmpm, github.com/treeverse/lakefs, Published: Feb 17, 2026, Unreviewed, lakeFS vulnerable to path traversal in local block adapter allow cross-namespace and sibling directory access in github.com/treeverse/lakefs


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">039c4d39dcb25e5d5bb55de8ac21404b</guid>
<pubDate>Thu, 19 Feb 2026 21:28:30 -0500</pubDate>
<title>GO-2026-4493</title>
<link>https://pkg.go.dev/vuln/GO-2026-4493</link>
<description><![CDATA[CVE-2026-26056, GHSA-wj8p-jj64-h7ff, github.com/yokecd/yoke, Published: Feb 17, 2026, Unreviewed, Arbitrary WASM Code Execution via AnnotationOverrideFlight Injection in Yoke ATC in github.com/yokecd/yoke


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">c87aeba923af160aacdef98c1fdd4f50</guid>
<pubDate>Thu, 19 Feb 2026 21:28:25 -0500</pubDate>
<title>GO-2026-4491</title>
<link>https://pkg.go.dev/vuln/GO-2026-4491</link>
<description><![CDATA[CVE-2026-26055, GHSA-965m-v4cc-6334, github.com/yokecd/yoke, Published: Feb 17, 2026, Unreviewed, Unauthenticated Admission Webhook Endpoints in Yoke ATC in github.com/yokecd/yoke


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">cb74bec6ce9c09970d48003117aaf92a</guid>
<pubDate>Thu, 19 Feb 2026 21:28:19 -0500</pubDate>
<title>GO-2026-4490</title>
<link>https://pkg.go.dev/vuln/GO-2026-4490</link>
<description><![CDATA[CVE-2025-67860, GHSA-3c9m-gq32-g4jx, github.com/neuvector/scanner, Published: Feb 17, 2026, Unreviewed, NeuVector scanner insecurely handles passwords as command arguments in github.com/neuvector/scanner.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/neuvector/scanner before 4.072.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">b3bc28bb1868f5e655eec92c94b91e3a</guid>
<pubDate>Thu, 19 Feb 2026 21:28:09 -0500</pubDate>
<title>GO-2026-4489</title>
<link>https://pkg.go.dev/vuln/GO-2026-4489</link>
<description><![CDATA[CVE-2026-24894, GHSA-r3xh-3r3w-47gp, github.com/dunglas/frankenphp, Published: Feb 17, 2026, Unreviewed, FrankenPHP leaks session data between requests in worker mode in github.com/dunglas/frankenphp


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">93274b37c5ca897abfc54b1d3d23e616</guid>
<pubDate>Thu, 19 Feb 2026 21:28:03 -0500</pubDate>
<title>GO-2026-4488</title>
<link>https://pkg.go.dev/vuln/GO-2026-4488</link>
<description><![CDATA[CVE-2026-21435, GHSA-px4r-g4p3-hhqv, github.com/quic-go/webtransport-go, Published: Feb 17, 2026, Unreviewed, webtransport-go: CloseWithError can block indefinitely in github.com/quic-go/webtransport-go


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">fd0f0ada120c2ded4f93af1c960bfcb9</guid>
<pubDate>Thu, 19 Feb 2026 21:28:00 -0500</pubDate>
<title>GO-2026-4487</title>
<link>https://pkg.go.dev/vuln/GO-2026-4487</link>
<description><![CDATA[CVE-2017-18912, GHSA-m2ch-x2q7-2284, github.com/mattermost/mattermost-server, Published: Feb 17, 2026, Unreviewed, Mattermost Server allows an attacker to specify a full pathname of a log file in github.com/mattermost/mattermost-server.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/mattermost/mattermost-server before v3.7.4-0.20170404171331-0b5c0794fdcb.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">74f08676fd9daccc97f30c03e8b722af</guid>
<pubDate>Thu, 19 Feb 2026 21:27:56 -0500</pubDate>
<title>GO-2026-4486</title>
<link>https://pkg.go.dev/vuln/GO-2026-4486</link>
<description><![CDATA[CVE-2026-24895, GHSA-g966-83w7-6w38, github.com/dunglas/frankenphp, Published: Feb 17, 2026, Unreviewed, FrankenPHP's unicode case-folding length expansion causes incorrect split_path index (SCRIPT_NAME/PATH_INFO confusion) in FrankenPHP in github.com/dunglas/frankenphp


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">05e182dee246451079843da4b298f3ca</guid>
<pubDate>Thu, 19 Feb 2026 21:27:46 -0500</pubDate>
<title>GO-2026-4485</title>
<link>https://pkg.go.dev/vuln/GO-2026-4485</link>
<description><![CDATA[CVE-2026-21434, GHSA-g6x7-jq8p-6q9q, github.com/quic-go/webtransport-go, github.com/marten-seemann/webtransport-go, Published: Feb 19, 2026, Unreviewed, webtransport-go: Memory Exhaustion Attack due to Missing Length Check in WT_CLOSE_SESSION Capsule in github.com/quic-go/webtransport-go


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">9bfc15135a788b57d862b06566768d02</guid>
<pubDate>Thu, 19 Feb 2026 21:27:38 -0500</pubDate>
<title>GO-2026-4484</title>
<link>https://pkg.go.dev/vuln/GO-2026-4484</link>
<description><![CDATA[CVE-2026-25949, GHSA-89p3-4642-cr2w, github.com/traefik/traefik, github.com/traefik/traefik/v2, and 1 more, Published: Feb 17, 2026, Unreviewed, Traefik: TCP readTimeout bypass via STARTTLS on Postgres in github.com/traefik/traefik


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">f1d40ed04020c0f164f17e914e2b99a4</guid>
<pubDate>Thu, 19 Feb 2026 21:27:35 -0500</pubDate>
<title>GO-2026-4483</title>
<link>https://pkg.go.dev/vuln/GO-2026-4483</link>
<description><![CDATA[CVE-2026-21438, GHSA-2f2x-8mwp-p2gc, github.com/quic-go/webtransport-go, Published: Feb 17, 2026, Unreviewed, webtransport-go: Memory Exhaustion Attack due to Missing Cleanup of Streams Map in github.com/quic-go/webtransport-go


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">03f48e052858530dc23319b541480586</guid>
<pubDate>Thu, 19 Feb 2026 21:27:26 -0500</pubDate>
<title>GO-2026-4481</title>
<link>https://pkg.go.dev/vuln/GO-2026-4481</link>
<description><![CDATA[CVE-2026-26190, GHSA-7ppg-37fh-vcr6, github.com/milvus-io/milvus, Published: Feb 17, 2026, Unreviewed, Milvus: Unauthenticated Access to Restful API on Metrics Port (9091) Leads to Critical System Compromise in github.com/milvus-io/milvus.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/milvus-io/milvus before v2.5.27, from v2.6.0 before v2.6.10.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">04410c634074655441e7cc6af5e7bc26</guid>
<pubDate>Thu, 19 Feb 2026 21:27:25 -0500</pubDate>
<title>GO-2026-4480</title>
<link>https://pkg.go.dev/vuln/GO-2026-4480</link>
<description><![CDATA[CVE-2026-25935, GHSA-m4g2-2q66-vc9v, code.vikunja.io/api, Published: Feb 17, 2026, Unreviewed, Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">01a959d4d416c710595765507bd94269</guid>
<pubDate>Thu, 19 Feb 2026 21:27:17 -0500</pubDate>
<title>GO-2026-4479</title>
<link>https://pkg.go.dev/vuln/GO-2026-4479</link>
<description><![CDATA[CVE-2026-26014, GHSA-9f3f-wv7r-qc8r, github.com/pion/dtls, github.com/pion/dtls/v2, and 1 more, Published: Feb 19, 2026</li>
      
      
      
    </ul>

    
      <p>Usage of random nonce generation with AES GCM ciphers risks leaking the authentication key in github.com/pion/dtls</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4478">GO-2026-4478</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2017-18909, GHSA-r6j5-fqx9-7qv9
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/mattermost/mattermost-server
        
      </li>
      <li class="go-textSubtle">Published: Feb 17, 2026, Unreviewed, Mattermost Server SAML implementation does not require encryption or signature verification as default in github.com/mattermost/mattermost-server.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/mattermost/mattermost-server before v3.8.1-0.20170504181128-4f074fed0d65.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">53aecd3abb9027d05d637fb014e91c0a</guid>
<pubDate>Thu, 19 Feb 2026 21:27:14 -0500</pubDate>
<title>GO-2026-4477</title>
<link>https://pkg.go.dev/vuln/GO-2026-4477</link>
<description><![CDATA[CVE-2017-18906, GHSA-fpcr-4rr5-hpcp, github.com/mattermost/mattermost-server, Published: Feb 17, 2026, Unreviewed, Mattermost Server vulnerable to user account takeover when Single Sign-On OAuth2 is used in github.com/mattermost/mattermost-server.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/mattermost/mattermost-server before v3.9.2-0.20170714134023-b17fca0d5ee7.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">700b0f3e0d248e4cc05167eb024f0e87</guid>
<pubDate>Thu, 19 Feb 2026 21:27:08 -0500</pubDate>
<title>GO-2026-4476</title>
<link>https://pkg.go.dev/vuln/GO-2026-4476</link>
<description><![CDATA[CVE-2017-18908, GHSA-34cx-hvm4-vx7j, github.com/mattermost/mattermost-server, Published: Feb 17, 2026, Unreviewed, Mattermost Server password reset email requests can be sent to attacker-provided email addresses in github.com/mattermost/mattermost-server


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">df2b208a8a731b6f120c8db5a8116021</guid>
<pubDate>Thu, 19 Feb 2026 21:26:59 -0500</pubDate>
<title>GO-2026-4475</title>
<link>https://pkg.go.dev/vuln/GO-2026-4475</link>
<description><![CDATA[CVE-2026-25889, GHSA-hxw8-4h9j-hq2r, github.com/filebrowser/filebrowser, github.com/filebrowser/filebrowser/v2, Published: Feb 17, 2026, Unreviewed, File Browser has an Authentication Bypass in User Password Update in github.com/filebrowser/filebrowser


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">3376067f92d3376c2553edec2ff26098</guid>
<pubDate>Thu, 19 Feb 2026 21:26:54 -0500</pubDate>
<title>GO-2026-4474</title>
<link>https://pkg.go.dev/vuln/GO-2026-4474</link>
<description><![CDATA[CVE-2026-25890, GHSA-4mh3-h929-w968, github.com/filebrowser/filebrowser, github.com/filebrowser/filebrowser/v2, Published: Feb 17, 2026, Unreviewed, File Browser has a Path-Based Access Control Bypass via Multiple Leading Slashes in URL in github.com/filebrowser/filebrowser


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">1fa0cc86526b058347410c5cf71d78bb</guid>
<pubDate>Thu, 19 Feb 2026 21:26:44 -0500</pubDate>
<title>GO-2026-4473</title>
<link>https://pkg.go.dev/vuln/GO-2026-4473</link>
<description><![CDATA[CVE-2026-25934, GHSA-37cx-329c-33x3, github.com/go-git/go-git, github.com/go-git/go-git/v4, and 1 more, Published: Feb 19, 2026</li>
      
      
      
    </ul>

    
      <p>Improper verification of data integrity values for .idx and .pack files in github.com/go-git/go-git</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4471">GO-2026-4471</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2025-66630, GHSA-68rr-p4fp-j59v
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/gofiber/fiber, github.com/gofiber/fiber/v2
        
      </li>
      <li class="go-textSubtle">Published: Feb 19, 2026</li>
      
      
      
    </ul>

    
      <p>Fiber has an insecure fallback in utils.UUIDv4() / utils.UUID() — predictable / zero‑UUID on crypto/rand failure in github.com/gofiber/fiber</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4467">GO-2026-4467</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2017-18916, GHSA-x33g-375j-jhf7
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/mattermost/mattermost-server
        
      </li>
      <li class="go-textSubtle">Published: Feb 17, 2026, Unreviewed, Mattermost Server has Improper Authorization for Integration Requests in github.com/mattermost/mattermost-server.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/mattermost/mattermost-server before v3.6.7-0.20170420152529-0968e4079e0a.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">d821412d38d521008aad080a13ec2293</guid>
<pubDate>Thu, 19 Feb 2026 21:26:44 -0500</pubDate>
<title>GO-2026-4466</title>
<link>https://pkg.go.dev/vuln/GO-2026-4466</link>
<description><![CDATA[CVE-2026-25791, GHSA-wxrw-gvg8-fqjp, github.com/bishopfox/sliver, Published: Feb 17, 2026, Unreviewed, Sliver has DNS C2 OTP Bypass that Allows Unauthenticated Session Flooding and Denial of Service in github.com/bishopfox/sliver.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/bishopfox/sliver before v1.6.12.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">a3a41d6f4316600f5ef3ddcb3021801b</guid>
<pubDate>Thu, 19 Feb 2026 21:26:36 -0500</pubDate>
<title>GO-2026-4465</title>
<link>https://pkg.go.dev/vuln/GO-2026-4465</link>
<description><![CDATA[GHSA-vhvq-fv9f-wh4q, github.com/authzed/spicedb, Published: Feb 17, 2026, Unreviewed, LookupResources Cursor section tampering can crash SpiceDB process via tuple.MustParse panic in github.com/authzed/spicedb.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: .


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">a57d19d1c02cc8228b8f7024fc35415d</guid>
<pubDate>Thu, 19 Feb 2026 21:26:32 -0500</pubDate>
<title>GO-2026-4464</title>
<link>https://pkg.go.dev/vuln/GO-2026-4464</link>
<description><![CDATA[CVE-2017-18911, GHSA-m462-mqw4-2c8m, github.com/mattermost/mattermost-server, Published: Feb 17, 2026, Unreviewed, Mattermost Server has X.509 Improper Certificate Validation in github.com/mattermost/mattermost-server


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">6279a9e8e9b8c1ad67431e5bd4a8c69e</guid>
<pubDate>Thu, 19 Feb 2026 21:26:26 -0500</pubDate>
<title>GO-2026-4463</title>
<link>https://pkg.go.dev/vuln/GO-2026-4463</link>
<description><![CDATA[CVE-2017-18917, GHSA-jxc4-w54c-qv5r, github.com/mattermost/mattermost-server, Published: Feb 17, 2026, Unreviewed, Mattermost Server uses weak hashing for OAuth, email verification tokens and invitations in github.com/mattermost/mattermost-server.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/mattermost/mattermost-server before v3.7.5-0.20170421192444-247cd1e51a8c.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">895a6222bf8360d94aa4b227771c5476</guid>
<pubDate>Thu, 19 Feb 2026 21:26:20 -0500</pubDate>
<title>GO-2026-4462</title>
<link>https://pkg.go.dev/vuln/GO-2026-4462</link>
<description><![CDATA[CVE-2017-18915, GHSA-hxxj-8phw-74vw, github.com/mattermost/mattermost-server, Published: Feb 17, 2026, Unreviewed, Mattermost Server server restarts may provide attackers with API access in github.com/mattermost/mattermost-server.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/mattermost/mattermost-server before v3.6.7-0.20170420152529-0968e4079e0a.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">dcdeef517990a42fea2aa8a416171a70</guid>
<pubDate>Thu, 19 Feb 2026 21:26:11 -0500</pubDate>
<title>GO-2026-4461</title>
<link>https://pkg.go.dev/vuln/GO-2026-4461</link>
<description><![CDATA[CVE-2026-25804, GHSA-86x4-wp9f-wrr9, antrea.io/antrea, Published: Feb 17, 2026, Unreviewed, Antrea has invalid enforcement order for network policy rules caused by integer overflow in antrea.io/antrea.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: antrea.io/antrea before v2.3.2, from v2.4.0 before v2.4.3.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">2ee75c67286f71d8aa73293b26661991</guid>
<pubDate>Thu, 19 Feb 2026 21:26:03 -0500</pubDate>
<title>GO-2026-4460</title>
<link>https://pkg.go.dev/vuln/GO-2026-4460</link>
<description><![CDATA[CVE-2017-18918, GHSA-5ghq-28r7-qwfj, github.com/mattermost/mattermost-server, Published: Feb 17, 2026, Unreviewed, Mattermost Server does not restrict SAML certificate path for System Administrators in github.com/mattermost/mattermost-server


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">f659278414b9df594df8dcac33402f57</guid>
<pubDate>Thu, 19 Feb 2026 21:25:59 -0500</pubDate>
<title>GO-2026-4459</title>
<link>https://pkg.go.dev/vuln/GO-2026-4459</link>
<description><![CDATA[CVE-2017-18907, GHSA-42x9-rr3c-gr59, github.com/mattermost/mattermost-server, Published: Feb 17, 2026, Unreviewed, Mattermost Server vulnerable to XSS through channel headers in github.com/mattermost/mattermost-server.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/mattermost/mattermost-server before v3.9.2-0.20170714014920-312269ad0bd1.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">de1ddb05661f8f563c7b1490355d3f83</guid>
<pubDate>Thu, 19 Feb 2026 21:25:54 -0500</pubDate>
<title>GO-2026-4458</title>
<link>https://pkg.go.dev/vuln/GO-2026-4458</link>
<description><![CDATA[CVE-2026-25793, GHSA-69x3-g4r3-p962, github.com/slackhq/nebula, Published: Feb 17, 2026, Unreviewed, Blocklist Bypass possible via ECDSA Signature Malleability in github.com/slackhq/nebula


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">c85b83a3abf2d00da150b585f223900e</guid>
<pubDate>Thu, 19 Feb 2026 21:25:44 -0500</pubDate>
<title>GO-2026-4457</title>
<link>https://pkg.go.dev/vuln/GO-2026-4457</link>
<description><![CDATA[CVE-2025-65852, GHSA-rjv5-9px2-fqw6, gogs.io/gogs, Published: Feb 17, 2026, Unreviewed, Gogs has authorization bypass in repository deletion API in gogs.io/gogs.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: gogs.io/gogs before v0.13.4.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">7b05e2d5ddc4e364b161082efa5db876</guid>
<pubDate>Thu, 19 Feb 2026 21:25:39 -0500</pubDate>
<title>GO-2026-4456</title>
<link>https://pkg.go.dev/vuln/GO-2026-4456</link>
<description><![CDATA[CVE-2025-13523, GHSA-ffx7-34p2-vm3w, github.com/mattermost/mattermost-plugin-confluence, Published: Feb 17, 2026, Unreviewed, Mattermost Confluence plugin doesn't properly escape user-controlled display names in HTML template rendering in github.com/mattermost/mattermost-plugin-confluence


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">87c10ea8502d808d26732f31734f803e</guid>
<pubDate>Thu, 19 Feb 2026 21:25:33 -0500</pubDate>
<title>GO-2026-4455</title>
<link>https://pkg.go.dev/vuln/GO-2026-4455</link>
<description><![CDATA[CVE-2025-70963, GHSA-9f8m-9547-2gqm, github.com/gophish/gophish, Published: Feb 17, 2026, Unreviewed, Gophish is vulnerable to Incorrect Access Control in github.com/gophish/gophish


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">c7c27dbe4e1ed68da493b319bca0ed37</guid>
<pubDate>Thu, 19 Feb 2026 21:25:30 -0500</pubDate>
<title>GO-2026-4454</title>
<link>https://pkg.go.dev/vuln/GO-2026-4454</link>
<description><![CDATA[GHSA-26gq-grmh-6xm6, gogs.io/gogs, Published: Feb 17, 2026, Unreviewed, Gogs vulnerable to Stored XSS via Mermaid diagrams in gogs.io/gogs.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: gogs.io/gogs before v0.13.4.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">330dcda30f18aa0d2c4df5f7cf318fe9</guid>
<pubDate>Thu, 19 Feb 2026 21:25:26 -0500</pubDate>
<title>GO-2026-4453</title>
<link>https://pkg.go.dev/vuln/GO-2026-4453</link>
<description><![CDATA[CVE-2026-23633, GHSA-mrph-w4hh-gx3g, gogs.io/gogs, Published: Feb 17, 2026, Unreviewed, Gogs has arbitrary file read/write via Path Traversal in Git hook editing in gogs.io/gogs.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: gogs.io/gogs before v0.13.4.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">87579d9aec92ab8d5467a6a4cd3de7d3</guid>
<pubDate>Thu, 19 Feb 2026 21:25:16 -0500</pubDate>
<title>GO-2026-4452</title>
<link>https://pkg.go.dev/vuln/GO-2026-4452</link>
<description><![CDATA[CVE-2026-24135, GHSA-jp7c-wj6q-3qf2, gogs.io/gogs, Published: Feb 17, 2026, Unreviewed, Gogs vulnerable to arbitrary file deletion via Path Traversal in wiki page update in gogs.io/gogs.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: gogs.io/gogs before v0.13.4.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">6e5a0aabc1058baff1cd50d9febc058e</guid>
<pubDate>Thu, 19 Feb 2026 21:25:13 -0500</pubDate>
<title>GO-2026-4451</title>
<link>https://pkg.go.dev/vuln/GO-2026-4451</link>
<description><![CDATA[CVE-2026-22592, GHSA-cr88-6mqm-4g57, gogs.io/gogs, Published: Feb 17, 2026, Unreviewed, Gogs has a Denial of Service issue in gogs.io/gogs.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: gogs.io/gogs before v0.13.4.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">d6a47dfd5246caf36102b4dc36e63945</guid>
<pubDate>Thu, 19 Feb 2026 21:25:08 -0500</pubDate>
<title>GO-2026-4450</title>
<link>https://pkg.go.dev/vuln/GO-2026-4450</link>
<description><![CDATA[CVE-2026-23632, GHSA-5qhx-gwfj-6jqr, gogs.io/gogs, Published: Feb 17, 2026, Unreviewed, Gogs user can update repository content with read-only permission in gogs.io/gogs.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: gogs.io/gogs before v0.13.4.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">5940a521ed9fc89f1896a48511d781af</guid>
<pubDate>Thu, 19 Feb 2026 21:24:58 -0500</pubDate>
<title>GO-2026-4449</title>
<link>https://pkg.go.dev/vuln/GO-2026-4449</link>
<description><![CDATA[CVE-2025-64175, GHSA-p6x6-9mx6-26wj, gogs.io/gogs, Published: Feb 17, 2026, Unreviewed, Gogs Vulnerable to 2FA Bypass via Recovery Code in gogs.io/gogs.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: gogs.io/gogs before v0.13.4.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">ac9e95cb3aa7ad93da5cd1d9f957e62e</guid>
<pubDate>Thu, 19 Feb 2026 21:24:55 -0500</pubDate>
<title>GO-2026-4448</title>
<link>https://pkg.go.dev/vuln/GO-2026-4448</link>
<description><![CDATA[CVE-2025-64111, GHSA-gg64-xxr9-qhjp, gogs.io/gogs, Published: Feb 17, 2026, Unreviewed, Gogs's update .git/config file allows remote command execution in gogs.io/gogs.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: gogs.io/gogs before v0.13.4.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">f574bc24a412aba9d077f87b42b8d2b3</guid>
<pubDate>Thu, 19 Feb 2026 21:24:45 -0500</pubDate>
<title>GO-2026-4447</title>
<link>https://pkg.go.dev/vuln/GO-2026-4447</link>
<description><![CDATA[GHSA-vf5j-r2hw-2hrw, github.com/opencloud-eu/opencloud, Published: Feb 17, 2026, Unreviewed, OpenCloud Affected by Public Link Exploit in github.com/opencloud-eu/opencloud.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/opencloud-eu/opencloud from v4.0.0 before v4.0.3, from v5.0.0 before v5.0.2.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">4a7c757d70b3a90d86b72d00d8dc74b6</guid>
<pubDate>Thu, 19 Feb 2026 21:24:44 -0500</pubDate>
<title>GO-2026-4446</title>
<link>https://pkg.go.dev/vuln/GO-2026-4446</link>
<description><![CDATA[CVE-2026-24851, GHSA-jq9f-gm9w-rwm9, github.com/openfga/openfga, Published: Feb 17, 2026, Unreviewed, OpenFGA Improper Policy Enforcement in github.com/openfga/openfga


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">c16f1e824b6b41d844353381aeedc026</guid>
<pubDate>Thu, 19 Feb 2026 21:24:34 -0500</pubDate>
<title>GO-2026-4445</title>
<link>https://pkg.go.dev/vuln/GO-2026-4445</link>
<description><![CDATA[CVE-2026-25760, GHSA-2286-hxv5-cmp2, github.com/bishopfox/sliver, Published: Feb 17, 2026, Unreviewed, Sliver Vulnerable to Website Path Traversal / Arbitrary File Read (Authenticated) in github.com/bishopfox/sliver


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">1dbe81df685ec7db5087ca9d81c69ca2</guid>
<pubDate>Thu, 19 Feb 2026 21:24:26 -0500</pubDate>
<title>GO-2026-4444</title>
<link>https://pkg.go.dev/vuln/GO-2026-4444</link>
<description><![CDATA[CVE-2026-23989, GHSA-9j2f-3rj3-wgpg, github.com/opencloud-eu/reva, github.com/opencloud-eu/reva/v2, Published: Feb 17, 2026, Unreviewed, OpenCloud Reva has a Public Link Exploit in github.com/opencloud-eu/reva


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">f5cb2da6d6884f108d6d9dd36cc41f77</guid>
<pubDate>Thu, 19 Feb 2026 21:24:23 -0500</pubDate>
<title>GO-2026-4442</title>
<link>https://pkg.go.dev/vuln/GO-2026-4442</link>
<description><![CDATA[GHSA-x9p2-77v6-6vhf, github.com/dunglas/frankenphp, Published: Feb 17, 2026, Unreviewed, FrankenPHP has delayed propagation of security fixes in upstream base images in github.com/dunglas/frankenphp.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/dunglas/frankenphp before v1.1.11.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">017a3c764d09e1da0c20ead090d0529e</guid>
<pubDate>Thu, 05 Feb 2026 14:24:25 -0500</pubDate>
<title>GO-2026-4441</title>
<link>https://pkg.go.dev/vuln/GO-2026-4441</link>
<description><![CDATA[CVE-2025-58190, golang.org/x/net, Published: Feb 05, 2026</li>
      
      
      
    </ul>

    
      <p>The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4440">GO-2026-4440</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2025-47911
        </li>
      
      <li class="go-textSubtle">Affects:
       
          golang.org/x/net
        
      </li>
      <li class="go-textSubtle">Published: Feb 05, 2026</li>
      
      
      
    </ul>

    
      <p>The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.</p>
    
  </div>

      </div>
    
      <div class="VulnList-header">
        <h2 class="VulnList-title" >
          <a href="https://pkg.go.dev/vuln/GO-2026-4436">GO-2026-4436</a>
        </h2>
        
  
  

      </div>
      <div class="VulnList-details">
        
  
  <div class="Vuln-details">
    
    <ul class="Vuln-detailsMetadata">
      
        <li class="go-textSubtle Vuln-alias">
          CVE-2023-43637, GHSA-g7vp-j25f-h34p
        </li>
      
      <li class="go-textSubtle">Affects:
       
          github.com/lf-edge/eve
        
      </li>
      <li class="go-textSubtle">Published: Feb 17, 2026, Unreviewed, EVE Has Partially Predetermined Vault Key in github.com/lf-edge/eve


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">f45db5d0164f93f3240a5a7a420cf6cd</guid>
<pubDate>Thu, 19 Feb 2026 21:24:14 -0500</pubDate>
<title>GO-2026-4435</title>
<link>https://pkg.go.dev/vuln/GO-2026-4435</link>
<description><![CDATA[CVE-2023-43636, GHSA-5h7v-g49c-h887, github.com/lf-edge/eve, Published: Feb 17, 2026, Unreviewed, EVE Doesn't Protect Rootfs in github.com/lf-edge/eve


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">0aec71a736b8f9675dbbba85ebdcb890</guid>
<pubDate>Thu, 19 Feb 2026 21:24:09 -0500</pubDate>
<title>GO-2026-4434</title>
<link>https://pkg.go.dev/vuln/GO-2026-4434</link>
<description><![CDATA[CVE-2023-43635, GHSA-4jvr-vj2c-8q37, github.com/lf-edge/eve, Published: Feb 17, 2026, Unreviewed, EVE Seals Vault Key With SHA1 PCRs in github.com/lf-edge/eve


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">ff0f610e988944ace9314ff4a816a407</guid>
<pubDate>Thu, 19 Feb 2026 21:24:07 -0500</pubDate>
<title>GO-2026-4433
        
        
  
  
    standard library
  

      
      
        
  
  
    
    
      
        
          CVE-2025-61732
        
      
      Affects:
       
          cmd/cgo
        
      
      Published: Feb 05, 2026
      
      
      
    

    
      A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.
    
  

      
    
      
        
          GO-2026-4432</title>
<link>https://pkg.go.dev/vuln/GO-2026-4433</link>
<description><![CDATA[CVE-2023-43634, GHSA-wc42-fcjp-v8vq, github.com/lf-edge/eve, Published: Feb 05, 2026, Unreviewed, EVE Doesn't Protect Config Partition with Measured Boot in github.com/lf-edge/eve


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">55098d553fb85726a9b50964519882e6</guid>
<pubDate>Thu, 05 Feb 2026 02:33:51 -0500</pubDate>
<title>GO-2026-4430</title>
<link>https://pkg.go.dev/vuln/GO-2026-4430</link>
<description><![CDATA[CVE-2023-43630, GHSA-phcg-h58r-gmcq, github.com/lf-edge/eve, Published: Feb 05, 2026, Unreviewed, EVE Doesn't Measure Config Partition From 2 Fronts in github.com/lf-edge/eve


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">bcc48c0016bef560537d9a7ea988f275</guid>
<pubDate>Thu, 05 Feb 2026 02:33:45 -0500</pubDate>
<title>GO-2026-4428</title>
<link>https://pkg.go.dev/vuln/GO-2026-4428</link>
<description><![CDATA[CVE-2023-43633, GHSA-4c4v-42hc-72p6, github.com/lf-edge/eve, Published: Feb 05, 2026, Unreviewed, EVE's Debug Functions Unlockable Without Triggering Measured Boot in github.com/lf-edge/eve


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">4db54a7dd2383e369dd50f786a8cf368</guid>
<pubDate>Thu, 05 Feb 2026 02:33:39 -0500</pubDate>
<title>GO-2026-4426</title>
<link>https://pkg.go.dev/vuln/GO-2026-4426</link>
<description><![CDATA[CVE-2026-24512, GHSA-jx8c-56mg-h6vp, k8s.io/ingress-nginx, Published: Feb 05, 2026, Unreviewed, ingress-nginx's `rules.http.paths.path` Ingress field can be used to inject configuration into nginx in k8s.io/ingress-nginx.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: k8s.io/ingress-nginx before v1.13.7, from v1.14.0 before v1.14.3.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">271aeebd9b75ba8a13bcf907ab2fb1bc</guid>
<pubDate>Thu, 05 Feb 2026 02:33:33 -0500</pubDate>
<title>GO-2026-4425</title>
<link>https://pkg.go.dev/vuln/GO-2026-4425</link>
<description><![CDATA[CVE-2025-62878, GHSA-jr3w-9vfr-c746, github.com/rancher/local-path-provisioner, Published: Feb 05, 2026, Unreviewed, Local Path Provisioner vulnerable to Path Traversal via parameters.pathPattern in github.com/rancher/local-path-provisioner


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">97e358ba66af0b1dc8d003ba9a691e6e</guid>
<pubDate>Thu, 05 Feb 2026 02:33:28 -0500</pubDate>
<title>GO-2026-4423</title>
<link>https://pkg.go.dev/vuln/GO-2026-4423</link>
<description><![CDATA[CVE-2026-1580, GHSA-9h3p-52vh-959w, k8s.io/ingress-nginx, Published: Feb 05, 2026, Unreviewed, ingress-nginx's `nginx.ingress.kubernetes.io/auth-method` Ingress annotation can be used to inject configuration into nginx in k8s.io/ingress-nginx.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: k8s.io/ingress-nginx before v1.13.7, from v1.14.0 before v1.14.3.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">0dbbdee966ca60955bf703ffa4f3e9c4</guid>
<pubDate>Thu, 05 Feb 2026 02:33:22 -0500</pubDate>
<title>GO-2026-4422</title>
<link>https://pkg.go.dev/vuln/GO-2026-4422</link>
<description><![CDATA[CVE-2023-43632, GHSA-6jp5-grgh-jw42, github.com/lf-edge/eve, Published: Feb 05, 2026, Unreviewed, EVE Freely Allocates Buffer on The Stack With Data From Socket in github.com/lf-edge/eve


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>
<item>




<guid isPermaLink="false">340a2c5f89c4accaff8c714ea0e2120e</guid>
<pubDate>Thu, 05 Feb 2026 02:33:11 -0500</pubDate>
<title>GO-2026-4421</title>
<link>https://pkg.go.dev/vuln/GO-2026-4421</link>
<description><![CDATA[CVE-2026-24735, GHSA-5w5r-8xc6-2xhw, github.com/apache/answer, Published: Feb 05, 2026, Unreviewed, Apache Answer Exposure of Private Personal Information to an Unauthorized Actor vulnerability in github.com/apache/answer.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/apache/answer before v2.0.0.


    <br/>



    


    <p><sub><i>-- Delivered by <a href="https://rsseverything.com">RssEverything</a> service</i></sub></p>


]]></description>
</item>

  </channel>
</rss>

