Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 16 February 2026

RSS

90 vulnerabilities published on 16 February 2026

Severity:
Mattermost: Authenticated User Can Bypass Single Sign-On Requirements
CVE-2026-0999 GHSA-3c9r-7f29-qp32
Mattermost versions 11.1 through 11.1.2, 10.11 through 10.11.9, and 11.2 through 11.2.1 have a security issue that could allow an authenticated user to log in without going through Single Sign-On (SSO...
5.4
ZenTao Backup Handler Allows Remote File Deletion
CVE-2026-2551
The Backup Handler in ZenTao versions up to 21.7.8 allows an attacker to delete files on the server by manipulating the file path. This could lead to data loss or disruption of service. Update to the ...
5.3
Kubysoft: Malicious scripts can be injected through user input
CVE-2025-59904
A vulnerability in Kubysoft allows attackers to inject malicious code into the system, which can be executed when other users access the affected resource. This could potentially allow an attacker to ...
5.1
Kubysoft: Malicious SVGs Can Run Harmful Code on Your Site
CVE-2025-59903
Kubysoft is vulnerable to a security threat where attackers can embed malicious code in SVG images. This means that if you upload an infected SVG, it can harm visitors to your website. To stay safe, e...
5.1
Visual Studio Code Extension Live Server Can Leak Files via Malicious Web Pages
CVE-2025-65717
An issue in Visual Studio Code's Live Server extension allows an attacker to steal files from your computer if you open a specially crafted web page. This could happen if you use the extension and ope...
4.3
Mattermost: Insiders can discover team existence and URLs
CVE-2025-14350 GHSA-57cc-2pf4-mhmx
Authenticated users can discover the existence of teams and their URLs by posting a link to a channel and checking the API response. This affects Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11...
4.3
Firefox for iOS: Malicious Scripts Can Spoof Trusted Web Pages
CVE-2026-2032
A security flaw in Firefox for iOS allows attackers to trick users into seeing fake web pages that appear to be from a trusted source. This could lead to users being misled into providing sensitive in...
4.3
Mattermost and Zoom Plugin: Unauthorized Access to Meetings and Posts
CVE-2026-0998 GHSA-w65c-fvp5-fvc5
The Mattermost and Zoom Plugin may allow unauthorized users to start Zoom meetings and modify posts in certain versions. This can be exploited through direct API calls. Mattermost and Zoom Plugin user...
4.3
Mattermost Plugin Zoom: Unauthorized Access to Zoom Meeting Restrictions
CVE-2026-0997 GHSA-2phx-frhf-xr55
Mattermost Plugin Zoom for versions 10.11 and 11.1, and all versions of the Zoom plugin up to 1.11, have a security flaw that allows any logged-in user to change Zoom meeting settings for any channel....
4.3
TR7 Web Application Firewall Redirects to Untrusted Sites, Risking Phishing Attacks
CVE-2025-2418
A security issue in the TR7 Web Application Firewall allows attackers to trick users into visiting fake websites, potentially leading to phishing scams. This issue affects versions of the software fro...
4.3
RegistrationMagic WordPress Plugin Allows Unrestricted Form Creation
CVE-2026-0929
If you use the RegistrationMagic WordPress plugin, a security issue exists that could allow unauthorized users to create forms on your site. This could lead to malicious activity, such as spam or data...
4.3
Mattermost: Team Admins Can Bypass Invite Restrictions
CVE-2025-14573 GHSA-cgjg-p2m2-qm4p
Mattermost versions 10.11 through 10.11.9 have a security issue that allows team administrators to add users to a team without proper permission, even if restrictions are in place. This could lead to ...
3.8
Vichan Password Change Vulnerability Allows Remote Password Changes
CVE-2026-2543
A security issue in Vichan versions up to 5.1.5 allows an attacker to change the password of a user without verifying the old password. This can be done from a remote location. We recommend updating t...
5.1
Error in Vulnerability Report Issuance for [Software Name]
CVE-2026-1783
This vulnerability report was mistakenly issued and is not valid. We've removed all details to prevent accidental use. Consider this vulnerability non-existent and not applicable to your software.
MINI-7g6p-q8hc-m23f
MINI-7g6p-q8hc-m23f