Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 18 February 2026

RSS

331 vulnerabilities published on 18 February 2026

Severity:
NLTK allows malicious zip files to execute code
GHSA-7p94-766c-hgjp CVE-2025-14009
The NLTK software can extract malicious zip files, which can then run code on your system. This can lead to access to your files and network, and potentially allow an attacker to keep access even afte...
10.0
Dell RecoverPoint for Virtual Machines Hard-Coded Credentials Exposure
CVE-2026-22769
Dell RecoverPoint for Virtual Machines stores sensitive credentials in a way that allows unauthorized access to the underlying operating system. This means an attacker could gain access to sensitive a...
10.0 KEV
Tsinghua Unigroup Electronic Archives System Can Be Attacked Remotely
CVE-2026-2682
A weakness in the Tsinghua Unigroup Electronic Archives System could allow an attacker to execute malicious code remotely. This means that a hacker could potentially access sensitive information or di...
5.3
Docker Container Escape Risk in OpenClaw
CVE-2026-27002 GHSA-w235-x559-36mg
A security issue in OpenClaw allows attackers to escape from Docker containers and access sensitive host data if they can influence the Docker configuration. This could lead to unauthorized access to ...
7.7
MajorDoMo: Unauthenticated Remote Code Execution via Update URL Poisoning
CVE-2026-27180
A critical vulnerability allows an attacker to execute malicious code on your website without a password. This can happen if the attacker tricks the system into downloading and installing a fake updat...
9.3
MajorDoMo allows attackers to steal admin passwords
CVE-2026-27179
An attacker can exploit this vulnerability to extract MajorDoMo admin passwords and gain unauthorized access to the admin panel. The vulnerability is caused by poor coding practices in the commands_se...
8.8
MajorDoMo: Unauthenticated Remote Code Execution via User Input
CVE-2026-27175
MajorDoMo's web interface allows hackers to execute arbitrary system commands without needing a password. This could allow an attacker to access sensitive data or take control of the system. Update Ma...
9.2
MajorDoMo Admin Panel Allows Unauthenticated Code Execution
CVE-2026-27174
The MajorDoMo admin panel has a security flaw that allows anyone to execute arbitrary code without needing a password. This could allow an attacker to take control of the system. To fix this, update t...
9.3
ChaosPro 2.0: Malicious Configuration Files Can Execute Arbitrary Code
CVE-2019-25365
If you use ChaosPro 2.0, an attacker can create a special configuration file that could let them take control of your Windows XP computer. This could happen if you open the file or if someone tricks y...
8.4
MailCarrier 2.51 allows remote code execution via oversized POP3 command
CVE-2019-25364
A security flaw in MailCarrier 2.51 makes it possible for an attacker to send a malicious command that can take control of your server. This can happen if an attacker sends a specially crafted message...
9.3
WMV to AVI Converter Vulnerable to Code Execution
CVE-2019-25362
A bug in the WMV to AVI Converter software allows hackers to potentially take control of your computer. This happens when the program receives too much data at once, which can lead to unauthorized act...
9.3
Ayukov NFTP client 1.71: Malicious File Transfer Can Run Malware
CVE-2019-25361
The Ayukov NFTP client 1.71 has a security issue that allows hackers to send a fake file command to the client, potentially allowing the hacker to access your system and run unauthorized software. Thi...
8.6
Aida64: Malicious CSV Logging Can Execute Malicious Code
CVE-2019-25360
The Aida64 software has a bug in its CSV logging feature that could allow an attacker to run unauthorized code on your system. This could happen if an attacker can trick you into opening a specially c...
8.4
Slyde Node.js Packages Allow Malicious Code to Run
CVE-2026-26974 GHSA-w7h5-55jg-cq2f
Slyde packages can execute arbitrary code when installed or required, allowing an attacker to take control of a project. This is a serious issue for projects that install untrusted packages. To fix th...
7.6
Scholars Tracking System Exposes Admin User Data to Unauthorized Access
CVE-2025-70152
The Scholars Tracking System's admin user management pages are not secure. Hackers could use this weakness to access or change sensitive user information, including passwords. To protect your system, ...
9.8
CodeAstro Membership Management System SQL Injection Risk
CVE-2025-70149
An attacker can inject malicious SQL code into the print_membership_card.php feature, potentially exposing sensitive data or allowing unauthorized access to the system. This is a serious security risk...
9.8
UTT HiPER 810 Router Has Insecure Default Telnet Password
CVE-2025-70998
A security issue has been found in the default settings of some UTT HiPER 810 routers. If not changed, a hacker could potentially access the router's root account remotely. It's essential to change th...
9.8
ZoneMinder: Unsecured User Input Can Execute Malicious Commands
CVE-2025-65791
ZoneMinder, a security camera software, allows hackers to execute unauthorized system commands if they can manipulate user input. This means an attacker could potentially delete files, install malware...
9.8
ZoneMinder allows unauthorized system access
DEBIAN-CVE-2025-65791
A weakness in ZoneMinder's image view feature could let attackers run unauthorized commands on the system. This could lead to sensitive information being stolen or the system being taken over. Update ...
9.8
Users Can Run Malicious Code on Certain IP Phones
CVE-2026-2329
An attacker can exploit a weakness in certain IP phone models to execute malicious code with super user privileges. This affects multiple models, including the GXP1610, GXP1615, GXP1620, GXP1625, GXP1...
9.3
Huggingface SmolAgents 1.24.0 Allows Remote Server-Side Request Forgery
CVE-2026-2654
The Huggingface SmolAgents version 1.24.0 has a security flaw that allows attackers to trick the system into making unauthorized network requests. This could potentially lead to malicious attacks. We ...
5.3
Stolen Graylog Session Token Can Be Used for Unauthorized Access
CVE-2026-1435
A security issue in Graylog Web Interface version 2.2.3 allows an attacker to use a stolen session token to access the application and compromise an account. This could happen if an attacker gains acc...
9.3
YayMail – WooCommerce Email Customizer plugin allows unauthorized access to site settings
CVE-2026-1937
The YayMail plugin for WooCommerce on WordPress can let attackers with Shop Manager access make changes to site settings, potentially making them administrators. This could be used to let attackers cr...
9.8
GitLab Allows Attackers to Access Internal Network Through Webhooks
CVE-2021-22175
GitLab's internal network may be exposed to unauthorized access if webhooks are enabled, allowing hackers to make requests to internal systems. This could lead to sensitive data being stolen or compro...
9.8 KEV
OpenText Directory Services: Untrusted Data Can Execute Malicious Code Remotely
CVE-2025-15579
A security flaw in OpenText Directory Services allows hackers to execute unauthorized code on your system, potentially causing harm. If left unpatched, this could lead to system crashes or unauthorize...
9.5