CVE-2026-42154 - Prometheus: remote read endpoint allows denial of service via crafted snappy payload
CVE ID :CVE-2026-42154 Published : May 4, 2026, 7:16 p.m. | 54 minutes ago Description :Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the remote read endpoint (/api/v1/read) does not validate the declared decoded length in a snappy
ORIGINAL SOURCE →via CVE Feed Latest
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] Podman rootless containers and the Copy Fail exploit
- [CYBER] Weaver E-cology critical bug exploited in attacks since March
- [CYBER] CVE-2026-7776 - Boundary Workers Vulnerable to Denial of Service During TLS Handshake
- [CYBER] MOVEit automation flaws could enable full system compromise
- [CYBER] CVE-2026-7779 - Open5GS authentication-subscription Endpoint nudr-handler.c udm_nudr_dr_handle_subscription_authentication denial of service
- [CYBER] CVE-2026-42238 - Unauthenticated Remote Code Execution via Backup Restore in nginx-ui