Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 20 February 2026
RSS391 vulnerabilities published on 20 February 2026
Severity:
GIMP Can Execute Malicious Code if You Open a Bad File
CVE-2026-2045
A security flaw in GIMP's ability to open XWD files allows hackers to run malicious code on your computer if you visit a bad website or open a bad file. This can happen if you interact with a maliciou...
7.8
GIMP Can Run Malicious Code from Some Image Files
CVE-2026-2044
If you use GIMP, be cautious when opening PGM image files from unknown sources. A hacker could trick you into opening a malicious file, allowing them to run unauthorized code on your computer. Update ...
7.8
GIMP PGM File Parsing Can Let Hackers Run Malicious Code
DEBIAN-CVE-2026-2044
A security weakness in GIMP's PGM file handling allows hackers to run malicious code on your computer if you interact with a malicious file or visit a malicious website. This requires user action, but...
7.8
GIMP Can Run Malicious Code if You Open a Bad File
CVE-2026-2044
GIMP's ability to open PGM files can be exploited by hackers if you open a specially crafted file. This could allow them to run their own code on your computer. To stay safe, be cautious when opening ...
7.8
Sante DICOM Viewer Pro Malicious File Can Run Code on Your System
CVE-2026-2034
A security weakness in Sante DICOM Viewer Pro can let an attacker execute code on your system if you open a malicious file. This can happen if you visit a fake website or open a file from an untrusted...
7.8
Sricam DeviceViewer 3.12.0.1 allows hackers to execute code on your device
CVE-2019-25435
A hacker who has access to your Sricam DeviceViewer 3.12.0.1 can execute unauthorized code on your device, potentially causing damage or stealing sensitive information. This is a serious issue that ca...
8.4
GIMP Can Run Malicious Code if You Open a Specially Crafted File
UBUNTU-CVE-2026-2048
If you use GIMP, be cautious when opening files from unknown sources. Hackers could create a malicious file that, when opened, allows them to run code on your computer. To protect yourself, only open ...
7.8
GIMP can run malicious code if you open a bad PGM file
UBUNTU-CVE-2026-2044
If you use GIMP and open a specially crafted PGM file, a hacker could run malicious code on your computer. This requires you to intentionally open the file or visit a malicious website. Update GIMP to...
7.8
GIMP Malicious XWD File Can Run Harmful Code
UBUNTU-CVE-2026-2045
A security issue affects how GIMP handles XWD files. If you open a malicious XWD file or visit a website with one, an attacker can potentially take control of your computer. To stay safe, don't open X...
7.8
GIMP can be tricked into running malicious code from ICNS files
UBUNTU-CVE-2026-2047
If you use GIMP to open a specially crafted ICNS file, a hacker could potentially take control of your computer. To protect yourself, avoid opening files from unknown sources or websites, and make sur...
7.8
GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User in...
DEBIAN-CVE-2026-0797
GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User inter...
7.8
GIMP Can Be Tricked into Running Malicious Code from Images
CVE-2026-0797
If you use GIMP to view or edit images, a hacker could trick you into running malicious code by getting you to open a specially crafted image file. This could let the hacker take control of your compu...
7.8
GIMP May Allow Attackers to Run Harmful Code
CVE-2026-0797
If a user opens a malicious file or visits a malicious webpage, attackers may be able to execute code on their GIMP installation. This could potentially allow the attackers to access or modify sensiti...
7.8
Xmind Can Execute Malicious Code If You Open a Bad File
CVE-2026-0777
If you open a malicious file in Xmind, an attacker can run code on your computer. This can happen if you visit a bad website or open a file from a sketchy source. Make sure to only open attachments fr...
7.8
GIMP: Malicious Images Can Run Harmful Code
UBUNTU-CVE-2026-0797
A security flaw in GIMP can allow hackers to run malicious code on your computer if you open a specially crafted image file or visit a dodgy website. This can happen if you don't have the latest versi...
7.8
Owl opds: File Manipulation via Malicious Network Request
CVE-2026-26102
A security issue in Owl opds 2.2.0.4 allows an attacker to manipulate files on the server by sending a specially crafted network request. This could lead to unauthorized changes or data theft. To prot...
8.5
Owl opds: Malicious files can be written to your server
CVE-2026-26101
A security issue in Owl opds 2.2.0.4 allows an attacker to write files to your server by sending a specially crafted network request. This could be used to disrupt your service or steal sensitive info...
8.5
RICOH Job Log Analysis Tool Installer Loads Malicious Libraries
CVE-2026-26050
The installer for the RICOH Job Log Analysis Tool may load and execute malicious code with administrator rights. This could happen if the installer loads Dynamic Link Libraries from an untrusted locat...
8.4
ADB Explorer on Windows fails to check ADB binary path, allowing malicious code execution
CVE-2026-26959
If you use ADB Explorer on Windows, be aware that versions 0.9.26020 and below do not properly check the safety of the ADB binary path. This can be exploited by a malicious file, allowing an attacker ...
7.8
Google Cloud Vertex AI Predictable Bucket Naming Exposes Data to Unauthenticated Attackers
CVE-2026-2473
GHSA-wh2j-26j7-9728
A bug in Google Cloud Vertex AI allowed an attacker to access and manipulate data from other users' accounts without permission. This was fixed by Google, and no action is needed from users. However, ...
7.7
WordPress vanquish User Extra Fields Path Traversal Can Expose Sensitive Files
CVE-2025-69377
A security issue in WordPress's vanquish User Extra Fields plugin allows attackers to access sensitive files on the website. This affects versions 1 through 17.0. Website administrators should update ...
7.7
Woo File Dropzone Allows Attackers to Access Sensitive Files
CVE-2025-68862
A security flaw in Woo File Dropzone allows attackers to access sensitive files on the server. This means that unauthorized users could potentially view or modify important data. To fix this, update W...
7.7
Key Systems Global Facilities Management Software allows malicious code execution via input fields
CVE-2026-26724
A vulnerability in Key Systems Global Facilities Management Software allows hackers to inject and run their own code on your system. This could lead to unauthorized access or data theft. You should up...
7.6
AIO WP Builder Security Error: Unauthorized Access Risk
CVE-2025-53217
A security flaw in AIO WP Builder allows unauthorized users to access restricted content. If left unpatched, attackers could access sensitive information or perform actions they shouldn't be able to. ...
7.6
Inpersttion For Theme: Malicious Code Can Be Injected into Website
CVE-2025-52744
Inpersttion For Theme has a security issue that allows hackers to inject malicious code into websites that use this theme. This means that a hacker could potentially take control of a website or steal...
7.6