Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 24 February 2026
RSS259 vulnerabilities published on 24 February 2026
Severity:
ImageMagick can crash when processing certain image metadata
CVE-2026-26066
GHSA-v994-63cg-9wj3
ImageMagick, a popular image editing software, can crash or freeze if it encounters a specific type of corrupted image metadata. This can happen when it tries to read or write image data with incorrec...
6.2
FileMaker WebDirect Custom Homepage Allows Attackers to Access Data Remotely
CVE-2025-46320
A security weakness in FileMaker WebDirect's custom homepage could allow hackers to access your sensitive data and potentially run malicious code on your system. This issue has been fixed in the lates...
6.1
NiceGUI: Malicious Code Can Execute in User Browsers
CVE-2026-27156
GHSA-78qv-3mpx-9cqq
A security issue in NiceGUI allows attackers to inject malicious code into user browsers, potentially stealing cookies, manipulating the page, or performing actions as the user. This occurs when user-...
6.1
Binardat 10G08-0800GSM Network Switch Allows JavaScript Injection
CVE-2026-27517
If an attacker is authenticated on the network switch, they can inject malicious JavaScript code through the web interface, potentially taking control of the switch or stealing sensitive information. ...
5.1
Isso allows hackers to inject malicious code via website field
CVE-2026-27469
GHSA-9fww-8cpr-q66r
A hacker can inject malicious code into Isso's website field, potentially allowing them to take control of your website. This can happen when a user posts a comment with a specially crafted website UR...
6.1
SourceCodester Modern Image Gallery App File Upload Cross-Site Scripting
CVE-2026-3070
The SourceCodester Modern Image Gallery App has a bug in its file upload feature, allowing hackers to inject malicious code into the app. This could potentially allow them to take control of the app o...
5.3
Alinto SOGo 5.12.3/5.12.4 allows hackers to inject malicious code
CVE-2026-3054
A security weakness in Alinto SOGo versions 5.12.3 and 5.12.4 makes it possible for an attacker to inject malicious code into a website, potentially allowing them to steal sensitive information or tak...
5.3
Horilla Open Source Horilla 1.0.2: Remote Open Redirect Risk
CVE-2026-3049
Horilla Open Source Horilla versions up to 1.0.2 can redirect users to a malicious website. This makes it possible for attackers to trick users into visiting unauthorized sites. To protect your users,...
5.3
itsourcecode Event Management System: Unvalidated Input Can Lead to Malicious Code Execution
CVE-2026-3043
A security flaw in itsourcecode's Event Management System 1.0 can allow hackers to inject malicious code into the system through an unsecured input field. This can potentially allow them to take contr...
5.3
Mastodon's FASP Feature Can Be Misused by an Attacker
CVE-2026-27477
Some Mastodon servers using an experimental feature can be tricked into making unwanted requests to internal systems. This can lead to vulnerabilities or other issues on those systems. To fix this, up...
4.6
NATS-server WebSockets Can Crash from Malicious Data
CVE-2026-27571
GHSA-qrvq-68c2-7grw
An attacker can send specially crafted compressed data to a NATS-server using WebSockets, causing the server to run out of memory and crash. This can happen even if the attacker doesn't have valid log...
5.9
ImageMagick allows attackers to access sensitive data through special file path
CVE-2026-25966
GHSA-xwc6-v6g8-pw2h
A security setting in ImageMagick can be bypassed, potentially allowing attackers to read or write sensitive data. This affects ImageMagick users who have not upgraded to a patched version. To protect...
5.9
ImageMagick: Malicious PostScript Code Can Be Injected via Printer Files
CVE-2026-25797
GHSA-rw6c-xp26-225v
ImageMagick's PostScript handling has a security flaw. An attacker can trick ImageMagick into inserting malicious PostScript code into files, which could then be executed by a printer or viewer. This ...
5.7
ImageMagick mishandles large image extracts leading to potential data exposure
DEBIAN-CVE-2026-25576
Using ImageMagick with images larger than the specified extract size can cause data to be exposed. This affects older versions of ImageMagick, but patches are available to fix the issue. If you use Im...
5.5
Dell Wyse Management Suite: Unvalidated Input in Web Pages
CVE-2026-23858
Dell Wyse Management Suite versions before 5.5 have a security issue that could allow an attacker to inject malicious code into web pages. This could potentially allow an attacker to take control of a...
5.4
Firefox and Thunderbird: Malicious WebAssembly Code Can Crash Browser
CVE-2026-2804
Firefox and Thunderbird versions less than 148 contain a bug that can cause the browser to crash or become unresponsive when it encounters malicious WebAssembly code. This can lead to a denial-of-serv...
5.4
Horilla-opensource Horilla: Leads Module Can Be Tricked into Running Malicious Code
CVE-2026-3050
An attacker can exploit a weakness in the Leads Module of Horilla-opensource Horilla, potentially allowing them to inject malicious code into user browsers. This can happen when a user interacts with ...
5.1
Piwigo: Unauthenticated User Enumeration in Password Reset
CVE-2025-62512
An attacker can determine if a username or email address exists in a Piwigo system without needing a password, potentially helping them guess login credentials. This vulnerability affects all Piwigo v...
5.5
RTU500: Unprivileged users can access user management data
CVE-2026-1772
The RTU500 web interface has a security issue that allows unauthorized users to view sensitive user information, such as usernames and settings, if they use special browser tools. This information is ...
5.3
ImageMagick Crashes When Processing Invalid Image Map
DEBIAN-CVE-2026-26983
ImageMagick, a popular image editing tool, may crash if it encounters an incorrectly formatted image map. This could potentially allow an attacker to cause a denial-of-service attack. Update to versio...
5.3
ImageMagick Crashes When Processing Malformed Map Data in Images
CVE-2026-26983
GHSA-w8mw-frc6-r7m8
ImageMagick, a popular image editing software, may crash if it encounters a corrupted image with a malformed map element. This can happen when processing certain types of image files. If you're using ...
5.3
ImageMagick can leak images due to incorrect memory management
CVE-2026-25988
GHSA-782x-jh29-9mf7
If you use ImageMagick, you may need to update to version 7.1.2-15 or 6.9.13-40 to prevent memory leaks. This can happen when ImageMagick encounters an error while processing an image. Updating to the...
5.3
ImageMagick crashes or leaks sensitive data with specific image files
CVE-2026-25987
GHSA-42p5-62qq-mmh7
ImageMagick, a popular image editing software, has a security flaw in its MAP image decoder. This means that if an attacker sends a specially crafted image file, it could cause the software to crash o...
5.3
ImageMagick: Malicious Image Can Crash System or Steal Data
CVE-2026-25983
GHSA-fwqw-2x5x-w566
ImageMagick, a popular image editing tool, has a security flaw that can cause a system crash or allow unauthorized access to sensitive data. This issue occurs when a specially crafted image is process...
5.3
ImageMagick Memory Leak Can Cause Application Crashes
CVE-2026-25969
GHSA-xgm3-v4r9-wfgm
ImageMagick, a popular image editing software, has a memory leak bug that can cause applications to run out of memory and crash. This issue can be resolved by updating to version 7.1.2-15 or later. If...
5.3