Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 17 February 2026

RSS

172 vulnerabilities published on 17 February 2026

Severity:
Rocket TRUfusion Enterprise allows authenticated users to upload files to arbitrary locations
CVE-2025-59793
The Rocket TRUfusion Enterprise software allows authenticated users to upload files to any location on the system, which could allow hackers to install malicious code. This is a serious security risk ...
9.4
Datart v1.0.0-rc.3: Attackers can execute code with authorized access
CVE-2025-70830
Authenticated users can inject malicious code into Datart's template engine, potentially allowing them to access sensitive data or take control of the system. This affects users who have authorized ac...
9.9
Exposed API Endpoint Allows Unauthenticated Password Reset
CVE-2026-1670
Certain versions of [Software Name] have an exposed API endpoint that could let hackers change a user's password reset email address without needing a password or login credentials. This could allow a...
9.3
Nextcloud Talk allowlist bypass via fake user name trick
CVE-2026-28474 GHSA-r5h9-vjqc-hq3r
A hacker can pretend to be a trusted user by changing their display name, potentially bypassing security settings and accessing restricted conversations. Nextcloud Talk users should update to version ...
9.3
IBM Concert uses hard-coded credentials, exposing sensitive info
CVE-2025-33089
IBM Concert, a software component, contains hardcoded user credentials that could be exploited by an attacker to access sensitive information or take unauthorized actions. This means that anyone with ...
9.8
Gogs allows unauthenticated file uploads, enabling public file hosting
CVE-2026-25242 GHSA-fc3h-92p8-h36f
Gogs, a web-based Git platform, allows anyone to upload files anonymously to the server, potentially leading to disk space issues, malware delivery, or unauthorized content hosting. This can happen if...
6.9
Glory RBG-100 Systems Expose Sensitive Login Credentials
CVE-2026-23647
The Glory RBG-100 system, which uses the ISPK-08 software, stores its login information in plain text, allowing anyone with network access to log in as an administrator without a password. This puts t...
9.3
OpenClaw: Windows cmd.exe commands may execute unintended actions
CVE-2026-28391 GHSA-qj77-c3c8-9c3q
If you're using OpenClaw on Windows and have enabled exec allowlist/approval gating, a malicious command can trick Windows into running additional actions beyond what's approved. This can happen if a ...
7.4
OpenClaw Gateway Connect Allows Unauthorized Access
CVE-2026-28472 GHSA-rv39-79c4-7459
A recent security update fixes a flaw that allowed unauthorized access to OpenClaw's gateway by connecting without proper authentication. If your OpenClaw gateway is exposed to the public internet, yo...
9.3
Beetel 777VR1 Web Management Interface Allows Unauthorised Access
CVE-2026-2616
A security flaw in Beetel 777VR1's Web Management Interface allows hackers to access the device without needing a password, which can be done from within the same local network. This means that anyone...
8.7
Opentofu-FIPS Configuration Error Allows Unauthorized Access
CLEANSTART-2026-XV54160
The opentofu-fips package has a configuration error that allows attackers to access sensitive information. This could lead to unauthorized access to your system. We recommend checking the package's do...
9.8
Zimbra Collaboration Suite can be tricked into accessing unauthorized websites
CVE-2020-7796
If you're using Zimbra Collaboration Suite and have the WebEx zimlet installed, a malicious threat actor could potentially trick the system into accessing unauthorized websites. This could lead to sec...
9.8 KEV
OpenS100 S-100 Viewer Allows Untrusted Code to Run with Administrator Privileges
CVE-2026-22208
An attacker can embed malicious code in an S-100 file, which can then execute with administrator-level access when opened in OpenS100. This can lead to data theft, system compromise, or other maliciou...
9.4
LightLLM versions 1.1.0 and prior allow unauthorized code to run on a server
CVE-2026-26220
An attacker can send malicious data to the LightLLM server and run arbitrary code without needing a password or permission. This could allow them to access or modify sensitive information, or even tak...
9.3
Apache Tomcat: Server Certificate Verification Bypass
CVE-2025-66614 GHSA-fpj8-gq4v-p354
A security issue exists in certain versions of Apache Tomcat that allows an attacker to bypass required client certificate checks. This can be exploited by an attacker to gain unauthorized access to t...
6.3
Windows Admin Center: Unauthorized network privilege escalation risk
CVE-2026-26119
An attacker with authorized access to Windows Admin Center can potentially gain elevated network privileges, allowing them to access sensitive areas of the network. This affects Windows Admin Center u...
8.8
IBM DataStage on Cloud Pak for Data: Unauthorized file upload enables command execution
CVE-2025-13689
An authenticated user can upload files without restrictions, potentially allowing them to execute arbitrary system commands and access sensitive data. This could lead to unauthorized access and data b...
8.8
Blossom's File Upload Function Can Be Tricked into Accessing Wrong Files
CVE-2026-2623
The Blossom file upload function has a security issue that allows attackers to access files they shouldn't be able to reach. This could potentially allow them to view or modify sensitive data. We reco...
5.3
Unauthorized Administrative Accounts Can Be Created in Application API
CVE-2026-23595
A weakness in the application's API allows an attacker to create administrative accounts without permission. This could lead to sensitive data being accessed or modified, and system configurations bei...
8.8
IBM Security QRadar EDR Authentication Session Hijacking
CVE-2025-36377
IBM Security QRadar EDR's session management is flawed, allowing an attacker to impersonate a legitimate user after their session expires. This can lead to unauthorized access to sensitive data and ac...
8.8
IBM QRadar EDR: Session Expiration Bypass Allows User Impersonation
CVE-2025-36376
IBM QRadar EDR has a security issue that allows an authenticated user to pretend to be another user on the system after their session has expired. This could give the attacker access to sensitive info...
8.8
Tenable Security Center Command Injection Vulnerability: Unapproved Code Execution
CVE-2026-2630
An attacker can execute unauthorized commands on the server hosting Tenable Security Center if they are authenticated and remote. This allows the attacker to potentially access sensitive data or disru...
7.4
TOTOLINK A3002RU router has a buffer overflow in IPv6 setup
CVE-2026-26736
The TOTOLINK A3002RU_V3 router's IPv6 setup feature has a security flaw that could allow hackers to potentially crash the device or execute malicious code. This affects the device's stability and secu...
8.8
TOTOLINK A3002RU Router Allows Unauthorized Access
CVE-2026-26732
A security issue in the TOTOLINK A3002RU router can be exploited remotely, potentially allowing an attacker to gain unauthorized access to the device. This could lead to malicious activity or the exec...
8.8
TOTOLINK A3002RU Router: Stack-Based Overflow Risk
CVE-2026-26731
The TOTOLINK A3002RU router's DNS function has a bug that could allow an attacker to crash the device. This could cause the router to stop working, making your internet connection unavailable. You sho...
8.8