Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 18 February 2026
RSS331 vulnerabilities published on 18 February 2026
Severity:
Control Center PRO 6.2.9 Allows Malicious Code Execution via Excessive Username Input
CVE-2019-25357
A critical security issue affects Control Center PRO 6.2.9, allowing an attacker to inject malicious code and potentially take control of a Windows system by entering a very long username. This could ...
8.4
Systeminformation wifi Networks Function Allows Malicious Command Execution
CVE-2026-26280
GHSA-9c88-49p5-5ggf
The Systeminformation wifiNetworks function does not properly check network interface inputs, allowing an attacker to execute any operating system command. This could allow a hacker to take control of...
8.4
SD.NET RIM versions before 4.7.3c allow attackers to manipulate database
CVE-2019-25359
Older versions of SD.NET RIM have a security weakness that lets hackers inject malicious SQL code into the database. This could allow them to access or change sensitive information. You should update ...
8.8
OpenStack Nova allows malicious data destruction on compute nodes
CVE-2026-24708
GHSA-m4f3-qp2w-gwh6
OpenStack Nova's Flat image backend can be tricked into destroying data on a compute node if a malicious QCOW header is written to a disk and then resized. This only affects compute nodes configured t...
8.2
Red Hat PCS Configuration Management Tool Security Flaw Allows Unauthorized Access
RHSA-2026:2818
A security issue was found in Red Hat PCS, a configuration management tool for High Availability and Identity Management. An attacker could use this flaw to access sensitive configuration data, potent...
8.2
Red Hat pcs Software Allows Unauthorized Access to System Configuration
RHSA-2026:2819
A security issue was found in Red Hat pcs. An attacker could potentially access sensitive system configuration information. You should apply the latest patches to ensure your system's security is up t...
8.2
Red Hat PCS: Unauthenticated attackers can take control of your system
RHSA-2026:2816
A security update is available for Red Hat PCS, a tool for managing High Availability and Clustered File Systems. Unauthenticated attackers could exploit this weakness to gain root access to your syst...
8.2
Red Hat pcs Update Exposes Sensitive Data to Unauthorized Access
RHSA-2026:2817
An update is available for Red Hat pcs, which fixes a security flaw that could allow an attacker to view sensitive information. This issue affects systems with pcs installed. To stay secure, apply the...
8.2
Jenkins: Unsecured Description Allows Malicious Code Execution
CVE-2026-27099
GHSA-85h6-5m3v-gx37
Jenkins versions 2.483 to 2.550 are affected by a stored cross-site scripting (XSS) vulnerability. This means that a malicious user with permission to configure or disconnect Jenkins agents can inject...
8.0
NVIDIA NeMo Framework: Malicious Data Can Execute Code Remotely
CVE-2025-33245
GHSA-9379-mwvr-7wxx
The NVIDIA NeMo Framework has a security weakness that could allow an attacker to execute malicious code on a remote system. This could lead to unauthorized access, data tampering, or other security i...
8.0
OpenClaw: Malicious Directory Names Can Hijack Agent Behavior
CVE-2026-27001
GHSA-2qj5-gwg2-xwc4
The OpenClaw software does not properly check the name of the directory where it's running. If an attacker puts malicious characters in the directory name, they can trick OpenClaw into executing unint...
8.6
FascinatedBox lily versions 2.3 and below allow local data exposure
CVE-2026-2662
A flaw in FascinatedBox lily versions 2.3 and below could allow an attacker with local access to access and potentially expose sensitive data. This issue has been made public, so it's essential to upd...
4.8
Squirrel up to 3.2: Heap Buffer Overflow Can Cause Data Corruption
CVE-2026-2661
A flaw in Squirrel, a library used in some software, can cause data corruption if an attacker exploits it. This could lead to crashes or unexpected behavior in applications that use Squirrel. Users sh...
4.8
Autodesk Products: Malicious MODEL Files Can Cause Crashes and Data Corruption
CVE-2026-0875
Malicious MODEL files can crash or corrupt data in Autodesk products. This could allow an attacker to disrupt operations or gain unauthorized access to data. Update Autodesk products to the latest ver...
7.8
Autodesk Products Can Crash or Execute Malicious Code from Corrupted CAD Files
CVE-2026-0874
Autodesk products that open CAD files are at risk of crashing or being compromised if they encounter a specially crafted file. This could result in data loss or unauthorized actions. Update your Autod...
7.8
FascinatedBox lily versions 2.3 and earlier allow unauthorized access
CVE-2026-2660
A security issue in FascinatedBox lily versions 2.3 and earlier could allow an attacker to access sensitive data on a local network. This is because of a mistake in how the software handles certain da...
4.8
Squirrel up to 3.2: Out-of-bounds read in Squirrel function
CVE-2026-2659
A security flaw in Squirrel, a scripting engine, allows an attacker to access sensitive information on a local machine. This can happen when an attacker manipulates certain data. To protect your syste...
4.8
Linux Kernel ksmbd Vulnerability Allows Data Corruption in Multi-Channel Sessions
CVE-2026-23226
A bug in the Linux kernel's ksmbd component can cause data corruption in multi-channel sessions. This happens when the program tries to access data that has already been deleted. To fix this, the deve...
7.8
SMBD in Linux kernel: data corruption when using multiple SMB channels
UBUNTU-CVE-2026-23226
A security update has been made to the Linux kernel's SMBD component to prevent data corruption when using multiple SMB channels. This update protects against a rare issue where corrupted data could b...
7.8
NVIDIA NeMo Framework: Malicious File Can Execute Code Remotely
CVE-2025-33253
GHSA-hvjw-vp7g-39h5
An attacker can trick users into loading a malicious file, potentially allowing the attacker to execute code on the system, disrupt its normal functioning, or access sensitive information. This issue ...
7.8
OpenFOAM 2506 simulation file can run malicious code
CVE-2025-61982
A malicious OpenFOAM simulation file can be used to run unauthorized code on a system. This can allow an attacker to take control of the system. Users should update to the latest version of OpenFOAM t...
7.8
NVIDIA NeMo Framework: Unauthenticated Code Execution Risk
CVE-2025-33252
The NVIDIA NeMo Framework has a security flaw that allows an attacker to run malicious code remotely, potentially leading to data corruption, system crashes, or unauthorized access. This could happen ...
7.8
NVIDIA NeMo Framework allows remote code execution
CVE-2025-33251
The NVIDIA NeMo Framework has a security weakness that lets an attacker take control of a system from a distance. This could allow them to disrupt or damage the system, steal sensitive information, or...
7.8
NVIDIA NeMo Framework: Remote Code Execution Risk
CVE-2025-33250
The NVIDIA NeMo Framework has a security weakness that could allow hackers to run malicious code on your system. This could result in data being modified or deleted, or your system being made unavaila...
7.8
NVIDIA NeMo Framework: Malicious Audio Input Can Execute Harmful Code
CVE-2025-33249
The NVIDIA NeMo Framework's voice-preprocessing script can be tricked into running malicious code if an attacker sends a specially crafted audio file. This can lead to unauthorized access to sensitive...
7.8