Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 19 February 2026

RSS

391 vulnerabilities published on 19 February 2026

Severity:
Zumba Json Serializer allows malicious code to run
CVE-2026-27206 GHSA-v7m3-fpcr-h7m2
The Zumba Json Serializer library can be tricked into running malicious code if it's used to deserialize untrusted JSON data. This can happen if the application or its dependencies have classes that c...
8.1
Feathers OAuth allows attackers to access authorized domains
CVE-2026-27192 GHSA-mp4x-c34x-wv3x
If you use Feathers OAuth, an attacker can create a malicious domain that tricks the system into giving them access to authorized domains. This could allow an attacker to steal sensitive information a...
7.6
Deno's Node Child Process Feature Allows Malicious Commands
CVE-2026-27190 GHSA-hmh4-3xvx-q5hr
Deno's child process feature allows attackers to execute arbitrary commands, which means unauthorized access to your system. This is a serious issue because it can lead to data theft or system comprom...
8.1
Statamic: Malicious Code Can Run When Users View Certain Fields
CVE-2026-27196 GHSA-8r7r-f4gm-wcpq
A security issue in Statamic allows authenticated users with field management permissions to inject malicious code that can harm others. This can happen when certain users view specific fields in the ...
8.1
jsPDF PDF Injection Allows Arbitrary JavaScript Execution
CVE-2026-25940 GHSA-p5xg-68wr-hm3m
The jsPDF library has a security flaw that allows hackers to inject malicious JavaScript code into PDF files created with it. This could happen if a user can input data into a PDF form, and that data ...
8.1
jspdf: Malicious JavaScript Can Alter or Harm PDFs
CVE-2026-25755 GHSA-9vjf-qc39-jprp
The jspdf library allows attackers to inject malicious JavaScript into PDFs if user input is not sanitized. This could let attackers harm or alter documents opened by others. To fix, update to jspdf v...
8.1
SPIP 4.4.8 and earlier allows malicious code to run due to untrusted data
CVE-2026-27475
A security issue in SPIP 4.4.8 and earlier allows an attacker to execute malicious code. This happens when an attacker can place malicious data in a specific area of the site. To protect against this,...
9.2
Grafana: Unauthenticated Data Exposure and Remote Code Execution
RHSA-2026:2920
Grafana, a popular data visualization tool, has a security issue that could allow an attacker to access sensitive data and execute malicious code without needing a login. If left unpatched, this vulne...
8.1
Grafana: Unauthenticated User Can Access Sensitive Data
RHSA-2026:2914
Grafana is updating to fix a security issue that allows unauthorized users to access sensitive information without a password. If you use Grafana, update to the latest version to prevent potential dat...
8.1
Dell Unisphere for PowerMax 10.2: Unauthorized File Modification Risk
CVE-2026-26362
A remote attacker can potentially modify important system files, compromising the integrity of the system. This could lead to unintended consequences, such as data loss or system crashes. Update to th...
8.1
Dell Unisphere for PowerMax versions 10.2: Malicious files can be deleted remotely
CVE-2026-26360
A security issue in Dell Unisphere for PowerMax version 10.2 allows an attacker with limited access to potentially delete any files. This means that if an attacker can access your system remotely, the...
8.1
Open Babel 3.1.1: Out-of-bounds read in MOL2 File Handler
CVE-2026-2705
A security issue was found in Open Babel's MOL2 File Handler. This could allow an attacker to access sensitive data. Open Babel's developers have released a patch to fix this issue, which you should a...
5.3
Open Babel 3.1.1: Out-of-bounds read vulnerability in CIF File Handler
CVE-2026-2704
A security flaw in the Open Babel CIF File Handler can cause a data leak when processing certain file inputs. This could potentially allow an attacker to access sensitive information. Update to the la...
5.3
Swiper on npm can be tricked into adding data to your website
CVE-2026-27212 GHSA-hmx5-qpq5-p643
A recent update to the Swiper library for websites can be manipulated by malicious code to add data to your website's settings. This could allow an attacker to make changes to your website without you...
9.4
HDF5 Software Can Crash or Let Attackers Take Control
CVE-2026-26200
An attacker can exploit a bug in older versions of HDF5 software to crash it or potentially take control of a system. This affects HDF5 versions before 1.14.4-2. To fix the issue, update to version 1....
7.8
WorkTime Monitoring Daemon Can Run Malicious Executables with Admin Privileges
CVE-2025-15561
An attacker can use a malicious executable to gain administrator access on a computer running WorkTime. This happens if the malicious file is placed in a specific directory and has a certain name. To ...
7.8
EPSON Printer Driver Installer Allows Malicious Code Execution
CVE-2025-4960
A security flaw in the EPSON printer driver installer on macOS allows a malicious user to execute commands and install system components without needing administrator permissions. This is a serious is...
7.8
Bit Form Software Allows Hackers to Execute Unwanted Database Commands
CVE-2026-25418
A security issue in Bit Form software allows hackers to potentially inject malicious commands into the database, which can lead to unauthorized access or data theft. This is a serious risk, especially...
7.6
Nelio AB Testing Exposes Sensitive Data due to SQL Injection
CVE-2026-25378
Nelio AB Testing, a plugin for WordPress, is vulnerable to a security flaw that can allow hackers to access sensitive data. This means that an attacker could potentially steal or modify information st...
7.6
Media Search Enhanced SQL Injection Risk: Malicious Data Injection
CVE-2026-23805
Media Search Enhanced versions 0.9.1 and earlier allow attackers to inject malicious SQL commands, potentially allowing them to access or modify sensitive data. This could lead to unauthorized access ...
7.6
Microsoft Teams: Unauthorized Access to Network Information
CVE-2026-21535
A security weakness in Microsoft Teams allows hackers to access sensitive information on your computer network without permission. This could lead to data theft or unauthorized changes to your system....
7.5
OpenText XM Fax allows hackers to access sensitive local files
CVE-2025-8054
A hacker could use OpenText XM Fax, a fax software, to access sensitive files on a local computer. This allows them to potentially see confidential information that shouldn't be shared. To stay safe, ...
7.1
VanKarWai Airtifact allows attackers to view local files
CVE-2026-27343
A security issue in VanKarWai Airtifact allows hackers to access local files on a computer. This is a risk if you have this software installed. Update to the latest version of Airtifact to fix this is...
7.5
NanaZip ROMFS Archive Parser Infinite Loop
CVE-2026-27114
NanaZip versions 5.0.1252.0 to 6.0.1629.0 contain a bug that can cause the software to hang or crash when trying to extract archives. This is a critical issue because it can prevent users from accessi...
5.1
Penpot Design Tool: Authenticated Users Can Read Local Files
CVE-2026-26202
An authenticated user with edit permissions can access sensitive system files and secrets on the server by exploiting a vulnerability in Penpot design tool. This can lead to exposure of sensitive info...
7.5