Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 20 February 2026

RSS

391 vulnerabilities published on 20 February 2026

Severity:
Silicon Labs Crypto API May Crash Devices Due to Math Error
CVE-2025-14547
A math error in Silicon Labs' cryptographic software can cause a device to crash, making it unavailable for a short time. This happens when the software tries to process certain types of data. Silicon...
2.3
Erlang OTP TFTP File Path Error
CVE-2026-21620
An error in the Erlang OTP software allows an attacker to access files they shouldn't be able to. This could allow an attacker to read or write sensitive data. Erlang OTP users should update to the la...
2.3
WooCommerce Google Sheet Sync: Unsecured Access to Data
CVE-2025-68834
A security flaw in WooCommerce's Google Sheet sync feature allows unauthorized access to sensitive data if access controls are not properly set up. This affects versions 1.0 through 1.1.3 of the plugi...
CGA-g5rc-hcfh-hrvx
CGA-g5rc-hcfh-hrvx
Rejected Reasons Not Displayed in WordPress Plugin
CVE-2026-27325
A security issue in a WordPress plugin means that users may not be able to see why their login attempts are being rejected, potentially making it harder to troubleshoot issues. This affects a specific...
Apache Commons Collections: Unauthenticated Remote Code Execution
CVE-2026-27324
Apache Commons Collections, a library used by many applications, contains a vulnerability that could allow an attacker to execute malicious code on a server without needing a password. This could lead...
WordPress Plugin Allows Unauthorized Access to Administrative Areas
CVE-2026-27323
A security issue affects the WordPress plugin "Plugin Name". If exploited, this bug could allow unauthorized users to access sensitive areas of a WordPress site. To protect your site, update the plugi...
Adobe Acrobat Reader: Malicious PDFs Can Execute Arbitrary Code
CVE-2026-27322
Adobe Acrobat Reader has a weakness that could allow hackers to run malicious code on your computer by tricking you into opening a fake PDF file. This can lead to serious security issues, including da...
Rejected Reason Field Allows Unauthorized Access
CVE-2026-27321
A security issue in the system's login process allows attackers to bypass certain security checks. This means an attacker could gain unauthorized access to the system by manipulating the login process...
WordPress Plugin 'Recurring Donations' Allows Unauthenticated Access
CVE-2026-27320
A WordPress plugin allows attackers to access sensitive data without a login. This plugin is used by some websites to manage donations. If not updated, it can cause unauthorized access to donor inform...
WordPress: Unauthenticated users can access sensitive user data
CVE-2026-27319
A security issue in WordPress allows unauthorized users to view sensitive information about other users. This could lead to identity theft or other malicious activities. Update WordPress to the latest...
Adobe Flash Player: Unauthenticated Code Execution via Unchecked Input
CVE-2026-27318
Adobe Flash Player on Windows, macOS, and Linux systems can be tricked into running malicious code without permission, allowing an attacker to take control of the system. This could lead to data theft...
WordPress: Malicious Code Can Be Injected via Rejected Posts
CVE-2026-27317
If an attacker can trick a WordPress administrator into rejecting a post, they may be able to inject malicious code into the site. This could allow the attacker to perform unauthorized actions on the ...
Outdated PHP Version in WordPress Allows Remote Code Execution
A vulnerability in WordPress allows attackers to execute malicious code on a website if the PHP version is outdated. This could lead to unauthorized access and data theft. Update PHP to the latest ver...
Apache HTTP Server: Unauthenticated Remote Code Execution
CGA-4mrr-cgvh-9w95
Apache HTTP Server has a vulnerability that allows an attacker to execute malicious code on a server without needing a password. This could happen if an attacker sends a specially crafted request to t...
Adobe Acrobat Reader Allows Arbitrary Code Execution
CGA-5hwq-cr96-xw9p
Adobe Acrobat Reader has a flaw that allows hackers to run malicious code on your computer. This means they could potentially steal sensitive information or take control of your system. Update to the ...