CVE tracker
279 subscribers
3.77K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2026-25108 - FileZen OS Command Injection Vulnerability

CVE ID : CVE-2026-25108
Published : Feb. 13, 2026, 4:15 a.m. | 3 hours, 16 minutes ago
Description : FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26249 - Apache HTTP Server Unvalidated User Input

CVE ID : CVE-2026-26249
Published : Feb. 13, 2026, 4:15 a.m. | 3 hours, 16 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26250 - Apache HTTP Server Cross-Site Request Forgery

CVE ID : CVE-2026-26250
Published : Feb. 13, 2026, 4:15 a.m. | 3 hours, 16 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26251 - Apache HTTP Server Unauthorized Access Vulnerability

CVE ID : CVE-2026-26251
Published : Feb. 13, 2026, 4:15 a.m. | 3 hours, 16 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26252 - Apache HTTP Server Remote Code Execution

CVE ID : CVE-2026-26252
Published : Feb. 13, 2026, 4:15 a.m. | 3 hours, 16 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26253 - Apache HTTP Server Unvalidated User Input

CVE ID : CVE-2026-26253
Published : Feb. 13, 2026, 4:15 a.m. | 3 hours, 16 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26254 - Apache HTTP Server Denial of Service

CVE ID : CVE-2026-26254
Published : Feb. 13, 2026, 4:15 a.m. | 3 hours, 16 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26255 - Windows DNS Server Authentication Bypass

CVE ID : CVE-2026-26255
Published : Feb. 13, 2026, 4:15 a.m. | 3 hours, 16 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26256 - Cisco WebEx Meeting Center Authentication Bypass

CVE ID : CVE-2026-26256
Published : Feb. 13, 2026, 4:15 a.m. | 3 hours, 16 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26257 - Apache HTTP Server Unvalidated User Input

CVE ID : CVE-2026-26257
Published : Feb. 13, 2026, 4:15 a.m. | 3 hours, 16 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-1924 - Yokogawa Vnet/IP Interface Package Remote DoS and Execution of Arbitrary Code Vulnerability

CVE ID : CVE-2025-1924
Published : Feb. 13, 2026, 5:16 a.m. | 2 hours, 15 minutes ago
Description : A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receive maliciously crafted packets, a DoS attack may cause Vnet/IP communication functions to stop or arbitrary programs to be executed. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
Severity: 6.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-48019 - Yokogawa Electric Corporation Vnet/IP Interface Package Denial of Service Vulnerability

CVE ID : CVE-2025-48019
Published : Feb. 13, 2026, 5:16 a.m. | 2 hours, 15 minutes ago
Description : A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
Severity: 6.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-48020 - Yokogawa Electric Corporation Vnet/IP Interface Package Denial of Service

CVE ID : CVE-2025-48020
Published : Feb. 13, 2026, 5:16 a.m. | 2 hours, 15 minutes ago
Description : A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
Severity: 6.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15520 - RegistrationMagic <= 6.0.7.2 - Subscriber+ Sensitive Data Disclosure

CVE ID : CVE-2025-15520
Published : Feb. 13, 2026, 6:16 a.m. | 1 hour, 15 minutes ago
Description : The RegistrationMagic WordPress plugin before 6.0.7.2 checks nonces but not capabilities, allowing for the disclosure of some sensitive data to subscribers and above.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-48021 - Yokogawa Electric Corporation Vnet/IP Interface Package Denial of Service

CVE ID : CVE-2025-48021
Published : Feb. 13, 2026, 6:16 a.m. | 1 hour, 15 minutes ago
Description : A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
Severity: 6.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-48022 - Yokogawa Electric Corporation Vnet/IP Interface Package Denial of Service (DoS) Vulnerability

CVE ID : CVE-2025-48022
Published : Feb. 13, 2026, 6:16 a.m. | 1 hour, 15 minutes ago
Description : A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
Severity: 6.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-48023 - Yokogawa Electric Corporation Vnet/IP Interface Package Denial of Service (DoS)

CVE ID : CVE-2025-48023
Published : Feb. 13, 2026, 6:16 a.m. | 1 hour, 15 minutes ago
Description : A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
Severity: 6.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0872 - Improper Certificate Validation vulnerability in Thales SafeNet Agent for Windows Logon

CVE ID : CVE-2026-0872
Published : Feb. 13, 2026, 9:16 a.m. | 2 hours, 17 minutes ago
Description : Improper Certificate Validation vulnerability in Thales SafeNet Agent for Windows Logon on Windows allows Signature Spoofing by Improper Validation.This issue affects SafeNet Agent for Windows Logon: 4.0.0, 4.1.1, 4.1.2.
Severity: 2.5 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-20796 - Time-of-check time-of-use vulnerability in common teams API

CVE ID : CVE-2026-20796
Published : Feb. 13, 2026, 11:16 a.m. | 17 minutes ago
Description : Mattermost versions 10.11.x <= 10.11.9 fail to properly validate channel membership at the time of data retrieval which allows a deactivated user to learn team names they should not have access to via a race condition in the /common_teams API endpoint.. Mattermost Advisory ID: MMSA-2025-00549
Severity: 3.1 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22892 - Insufficient Authorization in Mattermost Jira Plugin Allows Unauthorized Access to Post Attachments

CVE ID : CVE-2026-22892
Published : Feb. 13, 2026, 11:16 a.m. | 17 minutes ago
Description : Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 fail to validate user permissions when creating Jira issues from Mattermost posts, which allows an authenticated attacker with access to the Jira plugin to read post content and attachments from channels they do not have access to via the /create-issue API endpoint by providing the post ID of an inaccessible post.. Mattermost Advisory ID: MMSA-2025-00550
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-33042 - Apache Avro Java SDK: Code injection on Java generated code

CVE ID : CVE-2025-33042
Published : Feb. 13, 2026, 12:16 p.m. | 3 hours, 17 minutes ago
Description : Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Avro Java SDK when generating specific records from untrusted Avro schemas. This issue affects Apache Avro Java SDK: all versions through 1.11.4 and version 1.12.0. Users are recommended to upgrade to version 1.12.1 or 1.11.5, which fix the issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...