Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 17 February 2026
RSS172 vulnerabilities published on 17 February 2026
Severity:
Liderahenk Missing Authentication Lets Hackers Run Code Remotely
CVE-2025-7706
A security issue affects the Liderahenk software, allowing hackers to run unauthorized code from a remote location. This could potentially allow an attacker to access sensitive data or take control of...
6.1
IBM Concert: Memory Exposure via Man in the Middle Attack
CVE-2025-33101
IBM Concert versions 1.0.0 to 2.1.0 may leak sensitive information if an attacker intercepts communication between a user and the application. This could potentially allow attackers to access sensitiv...
5.9
IBM DB2 Recovery Expert for LUW 5.5 Interim Fix 002 IBM Db2 Recovery Expert for Linux, UNIX and Windows transmits data in a cleartext communication channel that could allow an attacker to obtain se...
CVE-2025-27903
IBM DB2 Recovery Expert for LUW 5.5 Interim Fix 002 IBM Db2 Recovery Expert for Linux, UNIX and Windows transmits data in a cleartext communication channel that could allow an attacker to obtain sensi...
5.9
WordPress Frontend File Manager Plugin Allows Unauthenticated Email Spam
CVE-2026-0829
An outdated version of the Frontend File Manager Plugin for WordPress lets attackers send spam emails and access sensitive files without permission. This can be exploited by anyone who knows the file ...
5.8
Datart v1.0.0-rc.3 Exposes Sensitive Data via Custom Database Connection
CVE-2025-70829
Authenticated users can potentially access confidential information stored in Datart's database. This is a concern because sensitive data could be viewed by people who shouldn't have access to it. To ...
5.7
Blossom: Unsecured Input in Article Titles Can Be Hijacked
CVE-2026-2622
An attacker can inject malicious code into Blossom's article titles, potentially allowing them to trick users into revealing sensitive information or taking unwanted actions. This issue is serious bec...
5.1
IBM webMethods Integration Server 12.0 allows malicious HTML code injection
CVE-2025-14289
IBM webMethods Integration Server 12.0 has a security flaw that allows an attacker to inject code into web pages viewed by users. This could lead to unauthorized actions being taken within the victim'...
5.4
Dell Unisphere for PowerMax versions 9.2.4.x allow malicious web code to run in your browser
CVE-2026-26357
Dell Unisphere for PowerMax versions 9.2.4.x contain a security flaw that could allow an attacker to inject malicious code into your web browser, potentially stealing sensitive information or taking c...
5.4
Indico: Malicious Files Can Be Uploaded via Material Uploads
CVE-2026-25739
GHSA-jxc4-54g3-j7vp
A security issue allows hackers to upload malicious files to Indico, potentially harming users. Updates are available to fix the problem. To ensure security, update Indico to the latest version and re...
5.4
Rack::Directory Allows Malicious Files to Run Code
CVE-2026-25500
GHSA-whrj-4476-wvmp
Rack::Directory can display files with malicious names that, when clicked, run code in the hosting application. This can happen if an attacker uploads a file with a name starting with 'javascript:'. U...
5.4
BSV Blockchain SDK Authentication Signature Data Error
CVE-2025-69287
GHSA-vjpq-xx5g-qvmm
A mistake in the BSV Blockchain SDK's authentication system can cause incorrect signatures, which may lead to unauthorized access. This issue affects users of the TypeScript SDK and may compromise the...
5.4
Dell Unisphere for PowerMax: Malicious Code Can Run in Browser
CVE-2026-23861
A security weakness in Dell Unisphere for PowerMax could allow an attacker to run malicious code in a user's web browser, potentially stealing information or taking control of user sessions. This vuln...
5.4
IBM DB2 Recovery Expert for LUW 5.5 Interim Fix 002 Leaks Sensitive System Info
CVE-2025-27899
A security issue with IBM DB2 Recovery Expert for LUW 5.5 Interim Fix 002 exposes sensitive system information, which could help attackers target the system. This means that an attacker could use this...
5.3
IBM Cloud Pak System Disclosure of Sensitive Folder Location
CVE-2023-38265
IBM Cloud Pak System versions 2.3.3.6 to 2.3.5.0 may reveal sensitive folder locations to unauthorized individuals, potentially helping them launch further attacks on the system. This could compromise...
5.3
Echo on Windows allows unauthorized access to files outside the public directory
CVE-2026-25766
GHSA-pgvm-wxw2-hrv9
A security issue in Echo's static file serving on Windows allows an attacker to access files outside the intended public directory. This can happen when using the default file system and serving files...
5.3
EventPrime Plugin Allows Hackers to Upload Unauthorized Images
CVE-2026-1657
The EventPrime plugin for WordPress is open to a security risk that allows hackers to upload any image file to your website without needing a password. This can lead to malicious images being displaye...
5.3
IBM WebSphere Application Server: Insecure Security Settings Configuration
CVE-2025-13333
Some IBM WebSphere Application Server versions may not properly secure security settings, potentially allowing unauthorized system administration. This could lead to security weaknesses and unauthoriz...
4.9
IBM Sterling B2B Integrator and File Gateway Expose Sensitive Info
CVE-2025-36348
IBM Sterling B2B Integrator and File Gateway software may expose sensitive information to unauthorized users, potentially allowing attackers to gain insight into system configuration and functionality...
4.9
Pega Platform: Critical Stored XSS in Admin Interface
CVE-2025-62183
Administrators with access to the Pega Platform interface may be able to execute malicious code, potentially stealing sensitive information or disrupting the system. This issue affects Pega Platform v...
4.8
Dell Avamar: Unauthorized Access to Sensitive Data
CVE-2025-36597
Dell Avamar versions before 19.12 with patch 338905 have a security weakness that could allow an attacker with high privileges and remote access to access sensitive information they shouldn't be able ...
4.7
WordPress Forminator Plugin Allows Admins to Inject Harmful Code
CVE-2026-2002
The Forminator plugin for WordPress has a security flaw that lets someone with admin access insert malicious code into website pages. This could cause problems for users when they visit the affected p...
4.4
IBM Cloud Pak Unauthorized Access in Certain Versions
CVE-2023-38005
IBM Cloud Pak versions 2.3.3.6 through 2.3.5.0 have a security issue that allows a logged-in user to perform actions they shouldn't be able to. This could lead to unauthorized changes or access to sen...
4.3
OpenClaw leaks Discord bot tokens to unauthorized clients
CVE-2026-26326
GHSA-8mh7-phf8-xgfm
A software component called OpenClaw has a flaw that allows unauthorized users to access sensitive information, such as Discord bot tokens, by making a specific request. This is a concern because it a...
5.3
IBM Concert 1.0.0 to 2.1.0 allows attackers to trick system into sending unauthorized requests
CVE-2025-36243
IBM Concert versions 1.0.0 through 2.1.0 are vulnerable to a security risk that allows an attacker with permission to send fake requests from your system. This could be used to discover sensitive info...
4.3
Indico Makes Unintended Requests to Sensitive URLs
CVE-2026-25738
GHSA-f47c-3c5w-v7p4
Indico makes requests to URLs provided by users, which could potentially be used to access sensitive data. However, the risk is limited to event organizers and organizations that host Indico on AWS or...
6.9