Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 20 February 2026
RSS391 vulnerabilities published on 20 February 2026
Severity:
Fiverr Clone Script 1.2.2 Exposes Sensitive Database Info
CVE-2019-25444
Fiverr Clone Script 1.2.2 is not secure, allowing unauthorized access to its database. This means an attacker could potentially steal sensitive information or alter the database. Update to a secure ve...
8.8
Monica 4.1.2 Password Reset Links Can Be Hijacked
CVE-2026-26747
An attacker can intercept and manipulate password reset links sent to users, potentially allowing them to access the account. This is due to the application's use of the HTTP Host header to generate U...
9.1
Nika: Malicious Files Can Be Loaded from Local System
CVE-2025-68545
A security risk exists in versions of Nika up to 1.2.14. Attackers can exploit this by tricking Nika into loading malicious files from the local system, potentially leading to unauthorized actions. Up...
9.1
Nagios Host Configuration Wizard Allows Remote Code Execution
CVE-2026-2043
A security issue in Nagios Host's configuration wizard allows attackers who are already authenticated to execute malicious code on the server. This could lead to unauthorized access, data theft, or ot...
8.8
Nagios Host monitoringwizard Command Injection lets hackers run code on your servers
CVE-2026-2042
Some Nagios Host installations allow hackers to run their own code on your servers if they have an account. This is bad news because it means your server's security could be compromised. To fix this, ...
8.8
Nagios Host allows attackers to execute code on your network
CVE-2026-2041
A security issue exists in Nagios Host that could allow attackers with a login to execute code on your system. To stay secure, update Nagios Host to the latest version as soon as possible.
8.8
GFI Archiver allows attackers to run unauthorized code on your server
CVE-2026-2037
If an attacker has access to your GFI Archiver system, they can potentially execute their own code, which could lead to unauthorized changes or data theft. This is a serious issue that requires immedi...
8.8
GFI Archiver: Untrusted Data Can Run Malicious Code Remotely
CVE-2026-2036
A vulnerability in GFI Archiver allows attackers to execute malicious code on affected systems, even if they're already authenticated. This is a serious issue because it could allow an attacker to gai...
8.8
phpMoAdmin: Attackers Can Trick Users to Make Unauthorized Database Changes
CVE-2019-25451
A security issue in phpMoAdmin allows attackers to trick authenticated users into making changes to databases and collections without permission. This can lead to data loss or unauthorized access. To ...
5.3
Chamilo LMS: Authenticated attackers can upload and run malicious files
CVE-2018-25158
Authenticated users can upload and run PHP files through the file manager in Chamilo Learning Management System. This means attackers can potentially take control of the system and access sensitive da...
8.7
D-Link DWR-M960 exposes data to malicious websites
CVE-2026-2857
The Port Forwarding Configuration Endpoint in D-Link DWR-M960 has a security flaw that could allow hackers to access your router's settings if you visit a malicious website. This is a serious issue be...
7.4
D-Link DWR-M960: Unsecured User Input Leads to Remote Attack
CVE-2026-2856
A flaw in the D-Link DWR-M960's configuration settings can be exploited remotely, allowing attackers to potentially take control of the device. This can happen when the device incorrectly handles user...
7.4
openITCOCKPIT Monitoring Tool Has Remote Code Execution Risk
CVE-2026-24892
The openITCOCKPIT monitoring tool has a security weakness that could allow an attacker to run malicious code on your server. This weakness is present in older versions of the Community Edition. To pro...
8.8
D-Link DWR-M960 DDNS Settings Handler Allows Remote Code Execution
CVE-2026-2855
A security flaw in the D-Link DWR-M960's DDNS Settings Handler can allow an attacker to execute unauthorized code on the device, potentially allowing them to take control of the device. This can happe...
7.4
D-Link DWR-M960: Remote Code Execution Risk Through NTP Configuration
CVE-2026-2854
A vulnerability in the D-Link DWR-M960 router's NTP configuration feature allows an attacker to potentially execute malicious code remotely. This could happen if the attacker can trick the router into...
7.4
D-Link DWR-M960: Remote Code Execution via Log Configuration
CVE-2026-2853
A flaw in the D-Link DWR-M960's log configuration system can be exploited by an attacker to inject malicious code. This could allow an attacker to take control of the device. We recommend that users u...
7.4
OpenSourcePOS 3.4.1: Malicious Access to Server Files
CVE-2026-26746
OpenSourcePOS, a point of sale software, contains a security flaw that allows an attacker to read sensitive files on the server. This could lead to further exploitation, potentially allowing an attack...
8.8
Untrusted Data Can Execute Malicious Code in Applay - Shortcodes
CVE-2026-22384
An attacker can inject malicious code into Applay - Shortcodes, which is a plugin used in the Applay platform. This could allow an attacker to take control of the system or steal sensitive information...
8.8
WooCommerce Category Banner Management allows Malicious Data Injection
CVE-2026-22354
An attacker can inject malicious data into WooCommerce category banners, potentially causing untrusted data to be executed. This issue affects WooCommerce Category Banner Management, which is used to ...
8.8
WP Life Slider Image Slider Can Be Tricked into Loading Malicious Data
CVE-2026-22346
An issue in WP Life Slider Image Slider can allow an attacker to inject malicious code into your website. This could lead to unauthorized access or other security problems if you're using a vulnerable...
8.8
WP Life Image Gallery: Malicious Code Can Be Injected
CVE-2026-22345
WP Life Image Gallery has a security issue that allows attackers to inject malicious code. This could lead to unauthorized actions on your website. We recommend updating to the latest version (version...
8.8
Booking and Rental Manager: Untrusted Data Injection Risk
CVE-2025-69328
An attacker can inject malicious code into Booking and Rental Manager, potentially stealing sensitive data or taking control of the system. This issue affects all versions of the plugin up to 2.5.9. T...
8.8
PeakShops Untrusted Data Can Cause Unintended Code Execution
CVE-2025-69294
The PeakShops plugin for WordPress may allow an attacker to execute malicious code by manipulating how data is processed. This affects all versions up to 1.5.9. To protect your site, update to a fixed...
8.8
Kleor Contact Manager allows malicious data to execute code
CVE-2025-68853
A security flaw in the Kleor Contact Manager software allows an attacker to inject malicious code, potentially leading to unauthorized actions or data breaches. This issue affects versions 9.1.1 and e...
8.8
ModelTheme Addons for WPBakery and Elementor: Untrusted Data Injection Risk
CVE-2025-68531
A security flaw in ModelTheme Addons for WPBakery and Elementor can allow an attacker to manipulate the way the software works. This affects users of the ModelTheme Addons for WPBakery and Elementor, ...
8.8