Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 24 February 2026
RSS259 vulnerabilities published on 24 February 2026
Severity:
Devolutions Server: Authenticated Users Can Bypass Entry Permissions
CVE-2026-1768
Authenticated users can access entries they shouldn't be able to, potentially exposing sensitive data. This issue affects Devolutions Server versions before 2025.3.15. To protect your data, update to ...
4.3
Binardat 10G08-0800GSM Switch Firmware Exposes Admins to Unauthorized Changes
CVE-2026-27518
An attacker can trick authorized administrators into making unintended changes to the switch's configuration. This happens because the switch's administrative interface doesn't properly protect agains...
5.1
SAP S/4HANA Payment Media can expose sensitive data to attackers
CVE-2026-24314
An attacker with valid login credentials may be able to access restricted information in SAP S/4HANA's Payment Media module, potentially revealing sensitive data. This issue affects confidentiality, b...
4.3
Genetec Update Service Web Page Leaks Confidential Data
CVE-2025-1787
An authorized administrator can access sensitive information on the Genetec Update Service configuration web page. This could lead to unauthorized access to sensitive data. To mitigate this, ensure on...
5.8
Firefox and Thunderbird: Malicious Code Can Be Injected
CVE-2026-2802
A flaw in Firefox and Thunderbird versions before 148 allows attackers to inject malicious code. This could lead to unauthorized actions being taken on your computer. Update to the latest version to f...
4.2
Microchip Time Provider 4100 Allows Malicious Software Updates
CVE-2025-47904
A weakness in the Time Provider 4100 allows an attacker to download and install malicious software updates, which can compromise the security and integrity of the system. This is a serious issue becau...
5.7
Dell Wyse Management Suite: Unapproved Remote Access
CVE-2026-23859
Prior versions of Dell Wyse Management Suite (before WMS 5.5) allow a skilled attacker with remote access to bypass security checks, potentially allowing them to take control of the system. This is a ...
2.7
CGA-8x9x-fmcr-p9hg
CGA-8x9x-fmcr-p9hg
CGA-8x9x-fmcr-p9hg