Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 18 February 2026
RSS331 vulnerabilities published on 18 February 2026
Severity:
Foscam Video Management System crashes if given very long username
CVE-2019-25353
Attackers can crash the Foscam Video Management System by sending a very long username, potentially causing downtime. This can happen when a user attempts to log in with a maliciously crafted username...
4.6
Crystal Live HTTP Server 6.01 allows attackers to access system files
CVE-2019-25352
A flaw in the Crystal Live HTTP Server 6.01 allows an attacker to trick the server into showing sensitive system files by manipulating the URL. This could allow an attacker to access files they should...
8.7
XMedia Recode Can Crash from Malicious Playlist File
CVE-2019-25350
XMedia Recode, a media converter, can crash if you open a specially crafted playlist file. This could be used by an attacker to disrupt your work. To avoid this, update to the latest version of XMedia...
4.6
ScadaApp for iOS crashes with oversized login field input
CVE-2019-25349
An oversized field in the ScadaApp login process can cause the app to crash on iOS devices. This can allow attackers to temporarily disrupt the app's functionality. Update to the latest version of Sca...
4.6
InvoicePlane: Malicious Scripts Can Modify Application Data
CVE-2026-24746
InvoicePlane's self-hosted application for managing invoices has a security flaw that allows an attacker with administrator access to inject malicious scripts. This could lead to unauthorized changes ...
7.5
InvoicePlane Allows Attackers to Read Server Files
CVE-2026-23491
InvoicePlane's file management system has a weakness that lets attackers read sensitive files on the server without permission. This could lead to the exposure of important information like database p...
9.3
BIG-IP Traffic Manager May Crash from Undisclosed Traffic
CVE-2026-2507
BIG-IP Traffic Manager (TMM) may terminate unexpectedly when receiving certain types of traffic. This issue affects BIG-IP AFM and BIG-IP DDoS systems, which could cause downtime. F5 recommends keepin...
8.7
ProjectWorlds Online Time Table Generator: Sensitive Info Exposed to Unauthenticated Users
CVE-2025-70147
If you use ProjectWorlds Online Time Table Generator, an attacker can access sensitive information, such as passwords, by simply visiting certain web pages. This is a serious issue because it allows u...
7.5
WordPress WPNakama Plugin Exposes User Data via SQL Injection
CVE-2026-2495
The WPNakama plugin for WordPress contains a security flaw that could allow an attacker to access sensitive user information. This issue affects all versions of the plugin up to 0.6.5. To protect your...
7.5
Zoom Plugin for WordPress Exposes Meeting IDs and API Keys
CVE-2026-1368
The Zoom plugin for WordPress allows attackers to access sensitive meeting IDs and API keys without a password, putting users' video conferencing sessions at risk. This means that attackers could pote...
7.5
WordPress Business Directory Plugin Exposes Sensitive Data
CVE-2026-2576
The Business Directory Plugin for WordPress has a security flaw that allows hackers to access sensitive information without a password. This is because the plugin doesn't properly protect user input, ...
7.5
OpenClaw: Large Webhook Requests Can Crash the Server
CVE-2026-28478
GHSA-q447-rj3r-2cgh
Some OpenClaw webhooks can be crashed by very large or slow uploads, causing the server to become unresponsive. This can happen when an attacker sends a huge amount of data to the webhook, causing the...
8.7
Rongzhitong Visual Platform Allows Unrestricted Access to User Data
CVE-2026-2668
A security flaw in Rongzhitong's Visual Integrated Command and Dispatch Platform may allow an attacker to access user data without permission. This affects users of the platform, as their sensitive in...
6.9
Payara Server allows attackers to change admin password via malicious links
CVE-2025-14340
Payara Server versions before 4.1.2.191.54, 5.83.0, 6.34.0, and 7.2026.1 have a security flaw that could let hackers trick administrators into changing their password by clicking on a specially crafte...
7.3
Red Hat Kernel RT Security Update Exposes Systems to Root Access
RHSA-2026:2821
An update is available for the Red Hat kernel for real-time systems. This update addresses a security issue that could allow an attacker to gain root access to the system. To protect your system, appl...
7.3
Advantech WISE-6610: Remote Code Execution from Unauthenticated Access
CVE-2026-2670
An unknown function in the Background Management component of the Advantech WISE-6610 can be exploited by an attacker to execute unauthorized commands on the system. This can happen if an attacker sen...
7.3
Product Addons for Woocommerce Plugin Allows Unrestricted Code Execution
CVE-2026-2296
The Product Addons for Woocommerce plugin for WordPress allows attackers with Shop Manager access to inject and run malicious code on the server. This can lead to unauthorized changes to the website o...
7.2
Cart All In One For WooCommerce plugin allows attackers to execute code on server
CVE-2026-2019
The Cart All In One For WooCommerce plugin for WordPress is insecure, allowing attackers with administrator access to execute malicious code on the server. This means an attacker could gain full contr...
7.2
Rent Fetch plugin for WordPress can inject malicious scripts into pages
CVE-2026-1931
The Rent Fetch plugin for WordPress contains a security flaw that allows unauthorized users to inject malicious code into web pages. This could potentially allow an attacker to take control of a websi...
7.2
Keras loads malicious files from your computer
CVE-2026-1669
GHSA-3m4q-jmj6-r34q
Keras, a popular machine learning library, can load model weights from any file on your computer if you use a specially crafted file. This means an attacker can trick you into loading a malicious file...
7.1
PyTorch Bypasses Picklescan's Magic Number Check
GHSA-97f8-7cmv-76j2
A vulnerability in PyTorch allows an attacker to bypass a security check in Picklescan, a tool used to detect malicious pickled files. This could potentially allow an attacker to hide malicious code i...
7.1
opa-envoy-plugin allows attackers to bypass access controls
CVE-2026-26205
GHSA-9f29-v6mm-pw6w
A security issue in how opa-envoy-plugin handles certain URLs allows attackers to bypass access controls. This means that attackers can craft URLs that bypass security checks, potentially allowing the...
7.1
Python 3.12 Packages for Red Hat Enterprise Linux: Security Update for Python Wheels
RHSA-2026:2866
An update is available for Python 3.12 packages in Red Hat Enterprise Linux. This update fixes a security issue that could allow an attacker to run arbitrary code on your system. You should update you...
7.1
Apache HTTP Server Cross-Site Scripting Vulnerability in Python Wheel
RHSA-2026:2865
A security issue has been identified in the Python Wheel package, which is used by Apache HTTP Server. This issue can allow an attacker to execute malicious code on a system, potentially leading to un...
7.1
Discovery CLI RPM for Red Hat Updated to Fix Security Issue
RHSA-2026:2823
The Discovery CLI RPM for Red Hat has been updated to version 2.4.3 to address a security issue that could allow an attacker to execute arbitrary code on a system. This affects Red Hat users who have ...
7.1