Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 13 February 2026

RSS

145 vulnerabilities published on 13 February 2026

Severity:
Apache HTTP Server Unaffected by Unused Vulnerability
CVE-2025-20089
This vulnerability was never actually present in Apache HTTP Server, so no action is necessary. It was mistakenly listed as a potential issue. No update or patch is required.
Apache HTTP Server: Empty User-Agent Header Triggers Misconfigured Features
CVE-2025-20078
Apache HTTP Server may allow an attacker to exploit misconfigured features when an empty User-Agent header is received. This could potentially lead to unexpected behavior or security issues. Upgrade t...
Apache HTTP Server: Unauthenticated Remote Code Execution
CVE-2025-20066
Apache HTTP Server is affected. An attacker could potentially execute malicious code on the server without needing a password. This could allow the attacker to access sensitive data or take control of...
Unused Vulnerability Rejected by CVE Numbering Authority
CVE-2025-20038
This vulnerability was not actually a problem, as it was never confirmed to exist. The CVE ID was removed from the list of known vulnerabilities. No action is needed.
Unused Vulnerability Report Removed
CVE-2025-20007
A vulnerability report for a piece of software was removed because it was never actually a problem. This means you don't need to worry about it.
Linux Kernel: Data Corruption and Crashes Possible with NVMe over TCP
CVE-2026-23112
A bug in the Linux kernel's NVMe over TCP driver could cause data corruption or system crashes if a malicious or malformed network packet is received. This issue has been fixed in a recent update, so ...
Linux Kernel: Catchall Elements Not Restored After Abort
CVE-2026-23111
A bug in the Linux kernel's netfilter system could cause catchall elements to fail to be restored after an operation is aborted. This could lead to a chain being freed prematurely, causing issues with...
Apache Commons Collections Deserialization Vulnerability in Apache Struts
CVE-2026-26257
Apache Struts, a web application framework, has a vulnerability that allows an attacker to inject malicious code. This could allow unauthorized access to sensitive data or take control of the system. ...
WordPress Rejects User Input, Leading to Unauthorized Access
CVE-2026-26256
A security weakness in some WordPress plugins allows attackers to bypass the login process and access restricted areas of the site. If not addressed, this could allow malicious users to gain unauthori...
WordPress: Unauthenticated User Can Access Unapproved Posts
CVE-2026-26255
A security issue in WordPress allows unauthorized users to view and manage posts that were not approved by administrators. This can lead to unauthorized content being published or sensitive informatio...
Apache Log4j: Missing Log4j Configuration Allows Sensitive Data Exposure
CVE-2026-26254
Apache Log4j is missing a required configuration setting that can expose sensitive data. If not fixed, attackers might access and use this data. Update your Apache Log4j configuration to include the m...
Apache HTTP Server: Unauthenticated Access to Passwords
CVE-2026-26253
Apache HTTP Server may expose passwords in error messages. This affects Apache HTTP Server versions prior to 2.4.32. If exploited, an attacker could potentially steal sensitive information. Update to ...
WordPress WordPress User Registration Rejects Invalid Input
CVE-2026-26252
WordPress's user registration feature doesn't properly handle invalid input, allowing attackers to manipulate the registration process. This could potentially allow an attacker to create unauthorized ...
WordPress Plugin Allows Unauthenticated Access to User Accounts
CVE-2026-26251
A widely-used WordPress plugin has a bug that lets anyone access user accounts without a password. This means that anyone can view and edit user information and settings. To stay safe, update the plug...
WordPress Plugin Allows Unrestricted File Uploads
CVE-2026-26250
A security issue in a WordPress plugin allows attackers to upload and execute arbitrary files on a website. This could allow them to install malware or take control of the site. To fix this, update th...
Adobe Acrobat Reader fails to validate user input
CVE-2026-26249
Adobe Acrobat Reader does not properly check information it receives, allowing an attacker to potentially manipulate user input and cause unexpected behavior. This could lead to a security risk for us...
CGA-4w29-qr5q-79pj
CGA-4w29-qr5q-79pj
CGA-4w29-qr5q-79pj
GIMP Vulnerable to Malicious File Corruption from PSP Files
UBUNTU-CVE-2026-2271
A critical security issue in GIMP allows attackers to corrupt files when opening malicious PSP files. This could lead to crashes or potentially allow hackers to take control of your computer. Update G...
Adobe Illustrator Integer Overflow Allows Malicious Code Execution
UBUNTU-CVE-2026-2272
Adobe Illustrator has a flaw that can allow hackers to run unauthorized code on a computer. This could happen when importing certain image files. Update your Illustrator software to the latest version...