Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 17 February 2026
RSS172 vulnerabilities published on 17 February 2026
Severity:
Kadence Blocks plugin allows unauthorized access with Contributor-level access
CVE-2026-2608
The Kadence Blocks plugin for WordPress is missing a security check, allowing users with Contributor-level access and above to perform actions they shouldn't. This could be exploited by attackers to g...
4.3
IBM MQ Operator and container images log data tampering risk
CVE-2025-12755
IBM MQ Operator and certain container images have a flaw that could allow someone with the wrong access to inject malicious data into log records. This could cause misleading or incorrect logs, which ...
4.0
Apache Tomcat: Bypassing Security Constraints with Old HTTP Requests
CVE-2026-24733
GHSA-qq5r-98hh-rxc9
Apache Tomcat versions 11.0.0-M1 to 11.0.14, 10.1.0-M1 to 10.1.49, and 9.0.0.M1 to 9.0.112 allow users to bypass security settings by sending old HTTP requests. This could potentially allow unauthoriz...
2.7
Slack Integration in OpenClaw Can Execute Unwanted Commands
CVE-2026-24764
GHSA-782p-5fr5-7fj8
If you use Slack with OpenClaw, an attacker could inject malicious code that could execute unintended commands or expose sensitive data. To fix this, upgrade to the latest version of OpenClaw (2026.2....
3.7
PhpGurukul Gym Management System Profile Update Security Risk
CVE-2024-55271
Attackers can manipulate user profiles by tricking users into performing unintended actions on the phpgurukul Gym Management System. This can lead to unauthorized changes to user information. Update t...
3.5
OpenClaw Data Logging Error Puts Gateway at Risk
GHSA-g27f-9qjv-22pm
OpenClaw, a gateway software, has a problem with how it logs certain data from WebSocket connections. This could allow an attacker to inject malicious data into the logs, which could then be used to t...
3.1
Autofill Data Exposed on Google Chrome with Malicious Webpage Interaction
CVE-2026-0102
If a user interacts with a malicious website in Google Chrome under specific circumstances, their stored autofill data like addresses, email, or phone numbers may be revealed without their consent. Th...
3.1
IBM Watsonx.data Lakehouse: Malicious File Upload Risk
CVE-2025-36183
A privileged user can upload malicious files to IBM Watsonx.data Lakehouse, which could allow them to modify certain files or data on the server. This could potentially lead to unauthorized changes or...
2.7
Gogs Allows Comment Deletion in Other Repositories
CVE-2026-25120
GHSA-jj5m-h57j-5gv7
A security weakness in Gogs allows a repository administrator to delete comments from other repositories. This is a concern for Gogs users who rely on comment moderation and repository security. To pr...
5.1
Google Chat Spoofing Risk with OpenClaw: Email Spoofing Possible
GHSA-chm2-m3w2-wcxm
OpenClaw, a Google Chat integration, has a flaw that allows attackers with high-level access to Google Workspace to pretend to be a legitimate sender. This means that even if you've set up allowlists ...
2.1
CVE Removed: Incorrect Information Released
CVE-2026-2570
A mistake caused incorrect information to be released about a vulnerability. This means that any references or descriptions related to it are no longer valid. No action is required by users, but it's ...
Error: Vulnerability Reporting System Misuse
CVE-2026-1452
A mistake was made in the vulnerability reporting system, and all information related to this issue has been removed. This means the report is not valid and should not be used. No action is required f...
Juniper ScreenOS: Unauthorized Access to VPN Traffic
MINI-x8hp-wc8h-7vf7
A security issue in Juniper ScreenOS affects VPN connections, allowing unauthorized access to encrypted traffic. This means that hackers could potentially intercept sensitive data being transmitted be...
Adobe Acrobat and Reader PDF Processing Vulnerability
MINI-m5x8-5425-f625
Adobe Acrobat and Reader may crash or unexpectedly behave when processing certain PDF files, potentially allowing attackers to execute code on a victim's system. This can happen if a user opens a mali...
CGA-r9wq-rhrr-2p5g
CGA-r9wq-rhrr-2p5g
CGA-r9wq-rhrr-2p5g
CGA-qhq7-cjqr-cgxq
CGA-qhq7-cjqr-cgxq
CGA-qhq7-cjqr-cgxq
CGA-fmq2-42x2-hvhw
CGA-fmq2-42x2-hvhw
CGA-fmq2-42x2-hvhw
CGA-cgc5-pp5m-vvfr
Apache HTTP Server Can Be Tricked into Running Malicious Code
CGA-cgc5-pp5m-vvfr
Apache HTTP Server contains a vulnerability that could allow an attacker to execute malicious code on a server by manipulating certain HTTP requests. This could allow unauthorized access to sensitive ...