Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 24 February 2026

RSS

259 vulnerabilities published on 24 February 2026

Severity:
Zyxel VMG3625-T50B Firmware Command Injection Flaw Allows Admin Access
CVE-2026-1459
The Zyxel VMG3625-T50B's certificate download feature has a security flaw that could let someone with administrator access on the device use it to run unauthorized commands on the device. This could a...
7.2
Finka programs use shared, easily guessable database passwords
CVE-2025-13776
Multiple Finka programs share the same database password, making it easy for an attacker on the same network to access and edit sensitive data. This is a concern because it allows an unauthorized pers...
8.6
Red Hat Linux Kernel Vulnerability: Privilege Escalation Risk
RHSA-2026:3124
A security update is available for the Linux kernel on Red Hat systems. This update fixes a vulnerability that could allow an attacker with elevated privileges to gain even higher-level access to the ...
7.1
WordPress PHP Vulnerability: Remote Code Execution through Malicious File Upload
RHSA-2026:3088
A security update is available for the kernel software that powers many Linux systems, which could allow an attacker to take control of the system if they can upload malicious code to it. This update ...
7.1
Synology Presto Client: Local Files Can Be Read or Written During Installation
CVE-2026-3091
A security issue in Synology Presto Client versions prior to 2.1.3-0672 allows a local user to access and modify files on the system by placing a malicious file in the same directory as the installer....
7.1
CPSD CryptoPro Secure Disk: Attacker can plant backdoor on Linux system
CVE-2025-10010
The CryptoPro Secure Disk application has a security flaw that allows an attacker with access to the hard disk to change the Linux operating system's configuration files. This could give the attacker ...
6.8
Linksys Routers Allow Malicious USB Drive Execution
CVE-2026-25603
If a malicious USB drive is plugged into a Linksys MR9600 or MX4200 router, an attacker could potentially execute malicious scripts with full system privileges, potentially compromising the router's s...
6.6
Dagu: Path Traversal Allows Attacker to Write Files Outside of DAGs Directory
CVE-2026-27598 GHSA-6v48-fcq6-ff23
An attacker can create a DAG with a specially crafted name to write arbitrary YAML files outside of the DAGs directory. This can lead to unauthorized data exposure or modification. To fix this, update...
7.1
Wasmtime's WASI Feature Can Be Exploited for Host Crashes
CVE-2026-27204 GHSA-852m-cvvp-9p4w
Wasmtime, a tool for running WebAssembly code, has a security issue that allows malicious code to exhaust the host's resources, potentially causing the host to crash or slow down. This can happen if t...
5.9
Caddy Admin API Allows Malicious Config Changes
CVE-2026-27589 GHSA-879p-475x-rqh2
A security issue in Caddy allows attackers to change the server's configuration by tricking users into visiting a malicious website. This can happen if the server's admin API is enabled without proper...
6.9
Devolutions Server 2025.3.14.0 and earlier: Sensitive Data Exposure
CVE-2026-3131
Devolusions Server's REST API has a security issue that allows users with limited permissions to access sensitive information about connections. This could potentially let someone see private data the...
6.5
Caddy: Malicious files can be accessed by exploiting glob pattern vulnerability
CVE-2026-27585 GHSA-4xrr-hq4w-6vf4
Caddy's file matcher does not properly sanitize glob characters, allowing attackers to bypass security protections. This could allow malicious files to be accessed. To mitigate this issue, update to t...
6.9
Payload: Internal Network Access via Malicious File Uploads
CVE-2026-27567 GHSA-hhfx-5x8j-f5f6
If you're using a version of Payload earlier than 3.75.0, an attacker with permission to upload files could potentially access your internal network. This is a security risk because it allows an attac...
6.5
Craft CMS Exposes Assets to Unauthorized Access via IPv6
CVE-2026-27129 GHSA-v2gc-rm6g-wrw9
A security fix in Craft CMS has been bypassed, allowing attackers to access assets without permission. This issue affects users with GraphQL schema permissions to edit or create assets in a specific v...
5.5
Apache Superset: Authenticated Users Can See Sensitive User Data
CVE-2026-23983 GHSA-h294-8fxm-m2pj
Authenticated users with low privileges can see sensitive user information, including passwords and email addresses, in Apache Superset. This is a security risk because it allows unauthorized access t...
2.3
Apache Superset: Rogue Users Can Bypass Read-Only Settings
CVE-2026-23984 GHSA-mwf2-qr4v-94h2
A security hole in Apache Superset lets users with SQL editing access bypass read-only settings in PostgreSQL connections. This is a risk for any organization using Apache Superset with a PostgreSQL d...
7.1
Apache Superset: ClickHouse engine SQL function restrictions not fully set
CVE-2026-23969 GHSA-48m2-v2r8-h23m
Apache Superset's ClickHouse engine had a missing restriction on certain SQL functions, which could have allowed unauthorized access to sensitive data. This affected versions of Apache Superset before...
5.3
Apache Superset: Privileged Users Can Execute Unauthorized Queries
CVE-2026-23980 GHSA-gvxg-9hqx-f4rg
A security issue in Apache Superset, a business intelligence platform, allows authorized users to potentially access sensitive data. This issue affects Apache Superset versions before 6.0.0. To fix it...
5.3
Apache Superset allows low-privileged users to access unauthorized data
CVE-2026-23982 GHSA-3m2g-v7jf-7fxc
A security weakness in Apache Superset version 6.0.0 and earlier allows a user with limited permissions to access data they shouldn't have access to. This is a concern because sensitive information mi...
7.1
Airflow versions before 2.11.1 leak sensitive connection data in audit logs
CVE-2025-27555 GHSA-8r55-rv5w-6pfm
If you use Airflow versions before 2.11.1, users with audit log access may see sensitive connection information they shouldn't see. This is a concern because sensitive data could be exposed. To fix th...
6.5
OpenEXR file format allows malicious files to crash the application
CVE-2026-26981
A faulty file parsing error in OpenEXR versions 3.3.0 through 3.3.6 and 3.4.0 through 3.4.4 could crash the application if it tries to open a manipulated image file. This is a security risk, especiall...
6.5
ImageMagick crashes or leaks sensitive data when handling certain DICOM files
DEBIAN-CVE-2026-25982
ImageMagick software, used for image editing, has a bug that can cause it to crash or leak sensitive information when processing specific types of medical image files. This affects earlier versions of...
6.5
ImageMagick Can Leak Sensitive Data or Crash
CVE-2026-25898 GHSA-vpxv-r9pg-7gpr
ImageMagick, a software used for image editing, has a flaw that can cause sensitive data to be leaked or the program to crash if it is given a specially crafted image. This affects older versions of I...
6.5
ImageMagick on 32-bit systems can be exploited by a malicious image
CVE-2026-25897 GHSA-6j5f-24fw-pqp4
If you're using ImageMagick on a 32-bit system, be aware that a hacker could potentially use a specially crafted image to make your system write data to the wrong location in memory. This could lead t...
6.5
ImageMagick: Infinite Loop in JPEG Encoder Can Cause CPU Consumption
CVE-2026-26283 GHSA-gwr3-x37h-h84v
ImageMagick, a popular image editing software, may get stuck and consume 100% CPU with a malicious image file. This can cause the program to freeze, also known as a Denial of Service. Update to versio...
6.2