Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 20 February 2026
RSS391 vulnerabilities published on 20 February 2026
Severity:
Traefik: Hackers can bypass HTTPS security on HTTP/3 connections
GHSA-gv8r-9rw9-9697
Traefik, a popular web traffic manager, has a security flaw that could allow hackers to bypass the secure encryption on some internet connections. This means that sensitive information could be interc...
7.8
PROLiNK PRC2402M Satellite List Page Allows Attacker Command Injection
CVE-2021-35402
A security issue in PROLiNK PRC2402M's satellite list page allows an attacker to inject malicious commands. This could potentially allow an attacker to access or modify sensitive system files. Update ...
10.0
Acronis Cyber Protect: Unauthorized Access to Sensitive Data
CVE-2025-30416
Acronis Cyber Protect versions 15 and 16 on Linux and Windows may allow unauthorized access to sensitive data. This means that someone with the wrong permissions could view or modify confidential info...
10.0
Acronis Cyber Protect: Unsecured Access to Sensitive Data
CVE-2025-30412
If not updated, attackers can access and modify sensitive data on systems using Acronis Cyber Protect 16 and 15. This is a serious security risk because it could lead to unauthorized access to confide...
10.0
Acronis Cyber Protect: Unauthorized Access to Sensitive Data
CVE-2025-30411
Acronis Cyber Protect versions before specific builds on Linux and Windows may allow unauthorized access to sensitive data. This is a serious concern as it could lead to the theft or manipulation of c...
10.0
RoundCube Webmail Allows Remote Code Execution via Unvalidated Data
CVE-2025-49113
GHSA-8j8w-wwqc-x596
The RoundCube Webmail application can execute malicious code if an attacker sends a specially crafted email with a URL containing unverified data. This means an attacker could potentially take control...
10.0
KEV
Bravis Addons allows uploading malicious files
CVE-2025-69403
A security issue in Bravis Addons allows attackers to upload files of any type, which could potentially contain malware or other malicious code. If exploited, this could lead to data corruption or sys...
9.9
Wiguard: Unsecured Upload Allows Web Shell on Server
CVE-2025-68549
An attacker can upload a malicious web shell to your Wiguard server, potentially allowing them to control your website and steal sensitive data. This issue affects all versions of Wiguard up to 2.0.1....
9.9
WPForms Google Sheet Connector allows code to be injected into Google Sheets
CVE-2025-67979
A security issue in WPForms Google Sheet Connector allows an attacker to inject malicious code into Google Sheets. This can lead to unauthorized data access or modification. Update to version 4.0.2 or...
9.9
MLflow Uses Default Password, Leaving Admin Access Unprotected
CVE-2026-2635
MLflow installations that use default passwords are at risk of being accessed by unauthorized users. This is because the default passwords are hardcoded, allowing anyone to bypass authentication. To f...
9.8
GFI Archiver Authentication Bypass on Remote Access
CVE-2026-2039
A vulnerability in GFI Archiver allows attackers to bypass authentication and potentially access sensitive areas without a password. This could lead to unauthorized access to sensitive data. To protec...
9.8
GFI Archiver Allows Unauthenticated Access to System
CVE-2026-2038
A security issue affects GFI Archiver installations, allowing unauthorized access to the system without needing a password. This could allow attackers to access sensitive data or take control of the s...
9.8
theSystem 1.0: Unauthenticated Command Execution Risk
CVE-2019-25441
Unauthenticated users can run arbitrary system commands on your server by submitting malicious input. This could allow them to access sensitive data, delete files, or disrupt your service. You should ...
9.3
SourceCodester Simple Responsive Tourism Website SQL Injection
CVE-2026-2848
A security issue has been found in SourceCodester's Simple Responsive Tourism Website, specifically in the registration feature. This means an attacker could potentially inject malicious SQL code to a...
6.9
Owl opds 2.2.0.4: Malicious Network Requests Can Execute Commands
CVE-2026-2333
The Owl opds software does not properly filter network requests, allowing an attacker to inject malicious commands. This could allow an attacker to take control of the system. To protect your system, ...
9.2
Edu Business Solutions Print Shop Pro WebDesk v.18.34 Privilege Escalation
CVE-2026-26725
An attacker can remotely take control of a vulnerable Print Shop Pro WebDesk system by manipulating the AccessID parameter. This could allow them to access sensitive information or make unauthorized c...
9.8
Owl opds 2.2.0.4 allows attackers to execute unauthorized commands
CVE-2026-26093
A security issue in Owl opds 2.2.0.4 allows an attacker to potentially execute unauthorized commands on your system. This means that a malicious user could potentially take control of your system or d...
8.7
Device allows empty admin username and password
CVE-2026-25715
A security issue in the device's web management interface allows an attacker on the same network to access and control the device without a password. This is a significant risk, as it allows unauthori...
9.8
Soleng Theme: Malicious Files Can Be Loaded by Hackers
CVE-2026-22365
The Soleng theme for WordPress allows hackers to load malicious files on your site. This is a security risk because it could let an attacker take control of your website. To fix this, update to a newe...
9.8
Smanga 3.2.7: Unauthenticated Server Takeover via Malicious Media ID
CVE-2025-70831
An attacker can inject commands on your server by manipulating a specific input field in Smanga 3.2.7. This could allow an attacker to access and control your server, which could lead to data theft, d...
9.8
Unauthorized Data Injection in Lorem Ipsum Books & Media Store Theme
CVE-2025-69405
A vulnerability in the Lorem Ipsum Books & Media Store theme allows hackers to inject unauthorized data, potentially compromising the security of your store. This affects versions 1.2.6 and earlier. U...
9.8
Extreme Store: Untrusted Data Can Be Injected into Application
CVE-2025-69404
The Extreme Store software has a vulnerability that allows an attacker to inject malicious code into the system. This means that an attacker could potentially take control of the application or access...
9.8
Themesflat Elementor Theme Allows Malicious Code Injection
CVE-2025-69382
A security issue in Themesflat Elementor theme allows an attacker to inject malicious code. This affects Themesflat Elementor theme versions up to 1.0.1. We recommend updating to the latest version to...
9.8
SevenHills Theme: Untrusted Data Can Inject Malicious Objects
CVE-2025-69372
The SevenHills theme for WordPress has a security issue that allows an attacker to inject malicious code. This could allow an attacker to take control of the website. Update to the latest version of t...
9.8
KindlyCare: Untrusted Data Injected via Deserialization
CVE-2025-69371
An attacker can inject malicious code into KindlyCare, potentially leading to unauthorized access or data manipulation. This vulnerability affects KindlyCare versions up to 1.6.1. Update to a fixed ve...
9.8