CVE-2026-33825
Microsoft Defender Insufficient Granularity of Access Control Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Tuesday's disclosures center on enterprise data infrastructure, with critical flaws affecting Apache Polaris, Apache Iceberg, Redis, and Google Cloud Storage alongside multiple WordPress plugin vulnerabilities. The brief includes 35 critical CVEs (up 400% from 7) and 65 high-priority CVEs (up 81% from 36 the prior day). Notable entries include CVE-2026-42811 (CVSS 9.9) in Google Cloud Storage, CVE-2026-42812 (CVSS 9.9) in Apache Iceberg, and CVE-2026-42088 (CVSS 9.6) in Redis, indicating concentrated risk across cloud storage and analytics layers. Remote code execution and authentication bypass patterns dominate, with WordPress ecosystems contributing several CVSS 9.8 issues and OpenC3 COSMOS exposing operational technology environments. Nine CVEs are listed in CISA KEV, including Microsoft Defender, SimpleHelp, and ConnectWise ScreenConnect; with 0% patch availability reported in this dataset, defenders should prioritize compensating controls and vendor advisories.
Immediate action: Prioritize Apache Polaris, Apache Iceberg, Redis, and Google Cloud Storage deployments for immediate review, alongside WordPress sites running vulnerable plugins and any SimpleHelp, ScreenConnect, or Samsung MagicINFO instances flagged in KEV. With 0% patch availability in this dataset, apply vendor mitigations, restrict network exposure, and monitor for exploitation indicators until fixes ship.
Microsoft Defender Insufficient Granularity of Access Control Vulnerability - Active in CISA KEV catalog.
Marimo Remote Code Execution Vulnerability - Active in CISA KEV catalog.
D-Link DIR-823X Command Injection Vulnerability - Active in CISA KEV catalog.
Samsung MagicINFO 9 Server Path Traversal Vulnerability - Active in CISA KEV catalog.
SimpleHelp Path Traversal Vulnerability - Active in CISA KEV catalog.
SimpleHelp Missing Authorization Vulnerability - Active in CISA KEV catalog.
ConnectWise ScreenConnect Path Traversal Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Protection Mechanism Failure Vulnerability - Active in CISA KEV catalog.
Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability - Active in CISA KEV catalog.
A vulnerability in the OpenC3 COSMOS Script Runner widget allows authenticated users to bypass permissions and perform administrative actions on Redis and other services.
A credential injection vulnerability in Apache Polaris allows attackers to bypass storage path restrictions in Google Cloud Storage via crafted namespace or table identifiers.
A security-sensitive metadata write bypass in Apache Iceberg allows authorized users to perform unauthorized operations on storage locations by manipulating table properties.
Apache Polaris is vulnerable to cross-table access due to improper handling of wildcard characters in object names, which results in insecure S3 IAM policy generation.
The Geeky Bot plugin for WordPress contains a missing authorization vulnerability that allows unauthenticated attackers to achieve remote code execution via arbitrary plugin installation.
Notesnook is a note-taking app focused on user privacy & ease of use. Prior to Notesnook Web/Desktop version 3.3.15 and prior to Notesnook iOS/Android version 3.3.20, a stored XSS vulnerability in the note export flow can be escalated to remote code execution in the desktop app. The root cause is that exported note fields such as title, headline, and content are inserted into the generated HTML template without HTML escaping. When the note is later exported to PDF, Notesnook renders that HTML into a same-origin, unsandboxed iframe using iframe.srcdoc = .... Injected script executes in the Notesnook origin. In the desktop app, this becomes RCE because Electron is configured with nodeIntegration: true and contextIsolation: false. This issue has been patched in Notesnook Web/Desktop version 3.3.15 and Notesnook iOS/Android version 3.3.20.
An authentication bypass vulnerability in MoreConvert Pro for WordPress allows unauthenticated attackers to hijack administrator accounts by manipulating email verification tokens.
The Mentoring plugin for WordPress contains a privilege escalation vulnerability that allows unauthenticated attackers to register as administrators.
A SQL injection vulnerability in the OpenC3 COSMOS Time-Series Database component allows unauthenticated attackers to execute arbitrary SQL commands.
Apache Polaris can issue broad temporary ("vended") storage credentials during staged table creation before the effective table location has been validated or durably reserved. Those temporary credentials are meant to limit the scope of accessible table data and metadata, but this scope limitation becomes attacker- directed because the attacker can choose a reachable target location. In the confirmed variant, if the caller supplies a custom `location` during stage create and requests credential vending, Apache Polaris uses that location to construct delegated storage credentials immediately. The stage-create path itself neither runs the normal location validation nor the overlap checks before those credentials are issued. Closely related to that, the staged-create flow also accepts `write.data.path` / `write.metadata.path` in the request properties and feeds those location overrides into the same effective table location set used for credential vending. Those fields are secondary to the main custom-`location` exploit, but they are still attacker-influenced location inputs that should be validated before any credentials are issued.
Arelle before 2.39.10 contains an unauthenticated remote code execution vulnerability in the /rest/configure REST endpoint that accepts a plugins query parameter and forwards it to the plugin manager without authentication or authorization. Attackers can supply a URL to a malicious Python file through the plugins parameter, causing the Arelle webserver to download and execute the attacker-controlled code within the Arelle process with its privileges.
Ollama before 0.17.1 contains a heap out-of-bounds read vulnerability in the GGUF model loader. The /api/create endpoint accepts an attacker-supplied GGUF file in which the declared tensor offset and size exceed the file's actual length; during quantization in fs/ggml/gguf.go and server/quantization.go (WriteTo()), the server reads past the allocated heap buffer. The leaked memory contents may include environment variables, API keys, system prompts, and concurrent users' conversation data, and can be exfiltrated by uploading the resulting model artifact through the /api/push endpoint to an attacker-controlled registry. The /api/create and /api/push endpoints have no authentication in the upstream distribution. Default deployments bind to 127.0.0.1, but the documented OLLAMA_HOST=0.0.0.0 configuration is widely used in practice (large public-internet exposure observed).
An OS command injection vulnerability in the DdnsSetting.cgi functionality of GeoVision LPC2011/LPC2211 allows arbitrary command execution via crafted DDNS configuration.
A buffer overflow vulnerability in the Totolink WA300 loginauth function allows remote attackers to execute arbitrary code via a manipulated http_host argument.
A remote buffer overflow vulnerability in the Totolink N300RH login authentication function allows attackers to crash the system or execute arbitrary code.
Evolver is a GEP-powered self-evolving engine for AI agents. Prior to version 1.69.3, a command injection vulnerability in the _extractLLM() function allows attackers to execute arbitrary shell commands on the server. The function constructs a curl command using string concatenation and passes it to execSync() without proper sanitization, enabling remote code execution when the corpus parameter contains shell metacharacters. This issue has been patched in version 1.69.3.
A stack-based buffer overflow in the GV-VMS WebCam Server gvapi endpoint allows remote attackers to gain SYSTEM-level code execution via a specially crafted HTTP Authorization header.
A remote OS command injection vulnerability in the Totolink A8000RU allows unauthenticated attackers to execute arbitrary commands via the `setAppFilterCfg` function.
A privilege escalation vulnerability in the GeoVision LPC2011/LPC2211 web interface allows an attacker to execute privileged operations via a crafted HTTP request.
Buffer overflow due to incorrect authorization in PLC FW
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saleswonder LLC WebinarIgnition allows Blind SQL Injection. This issue affects WebinarIgnition: from n/a through 4.08.253.
Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Tegsoft Management and Information Services Trade Limited Company Online Support Application allows Reflected XSS. This issue affects Online Support Application: from V3 through 31122025.
A sandbox breakout vulnerability in the Node.js vm2 library allows attackers to escape the sandbox and execute arbitrary commands on the host system.
An insufficient patch for a previous vm2 vulnerability allows attackers to bypass security measures and perform a sandbox breakout for arbitrary code execution.
A sandbox breakout vulnerability in the vm2 library's `inspect` function allows attackers to escape the sandbox and execute arbitrary commands on the host.
A vulnerability involving `SuppressedError` in the vm2 library allows attackers to escape the sandbox and execute arbitrary code on the host system.
A full sandbox escape vulnerability in vm2 version 3.10.4 allows attackers to access the host process object and execute arbitrary host commands.
D-Link DIR-605L Hardware Revision B2 (End-of-Life, EOL) contains a hardcoded telnet backdoor. The device starts a telnet daemon at boot via /bin/telnetd.sh with the username "Alphanetworks" and the static password "wrgn76_dlwbr_dir605L" read from /etc/alpha_config/image_sign. The custom telnetd binary accepts a -u user:password flag, and the custom login binary uses strcmp() to validate credentials. Successful authentication grants an unauthenticated attacker on the local network a root shell with full administrative control. The device has reached End-of-Life (EOL) and will not receive patches.
D-Link DIR-600L Hardware Revision B1 (End-of-Life) contains a hardcoded telnet backdoor. The device starts a telnet daemon at boot via /bin/telnetd.sh with the username "Alphanetworks" and the static password "wrgn61_dlwbr_dir600L" read from /etc/alpha_config/image_sign. The custom telnetd binary accepts a -u user:password flag, and the custom login binary uses strcmp() to validate credentials. Successful authentication grants an unauthenticated attacker on the local network a root shell with full administrative control. The device has reached End-of-Life (EOL) and will not receive patches.
D-Link DIR-600L Hardware Revision A1 (End-of-Life) contains a hardcoded telnet backdoor. The device starts a telnet daemon at boot via /bin/telnetd.sh with the username "Alphanetworks" and the static password "wrgn35_dlwbr_dir600l" read from /etc/alpha_config/image_sign. The custom telnetd binary accepts a -u user:password flag, and the custom login binary uses strcmp() to validate credentials. Successful authentication grants an unauthenticated attacker on the local network a root shell with full administrative control. The device has reached End-of-Life (EOL) and will not receive patches.
D-Link DIR-456U Hardware Revision A1 (End-of-Life, EOL) contains a hardcoded telnet backdoor. The device starts a telnet daemon at boot via /etc/init0.d/S80telnetd.sh with the username "Alphanetworks" and the static password "whdrv01_dlob_dir456U" read from /etc/config/image_sign. The custom telnetd binary accepts a -u user:password flag, and the custom login binary uses strcmp() to validate credentials. Successful authentication grants an unauthenticated attacker on the local network a root shell with full administrative control. The device has reached End-of-Life (EOL) and will not receive patches.
Note Mark is an open-source note-taking application. In version 0.19.2, IsPasswordMatch in backend/db/models.go falls back to a hard-coded bcrypt("null") placeholder whenever a user has no stored password. OIDC-registered users are created with an empty password, so anyone who submits password: "null" to the internal login endpoint receives a valid session for that user. The bypass is unauthenticated and requires no user interaction. This issue has been patched in version 0.19.3.
An insufficient encryption vulnerability in the GeoVision GV-IP Device Utility allows attackers on the same LAN to decrypt administrative credentials from broadcast traffic.
A stack overflow in the WebCam Server Login functionality of GeoVision GV-VMS 20.0.2 allows unauthenticated remote attackers to achieve arbitrary code execution.
A stack overflow in the GeoVision GV-VMS WebCam Server login functionality allows unauthenticated attackers to gain SYSTEM-level code execution via unconstrained sscanf calls.
A privilege escalation vulnerability exists during the installation of Norton Secure VPN via the Microsoft Store
Prometheus is an open-source monitoring system and time series database
Vulnerability in the Oracle MCP Server Helper Tool product of Oracle Open Source Projects (component: helper tool)
Conditional Fields for Contact Form 7 WordPress plugin through version 2
The Royal Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'status' parameter in the wpr_update_form_action_meta AJAX action in all versions up to, and including, 1
Nginx UI is a web user interface for the Nginx web server
Nginx UI is a web user interface for the Nginx web server
The AWP Classifieds plugin for WordPress is vulnerable to SQL Injection via the 'regions' parameter array keys in versions up to, and including, 4
The GeekyBot â Generate AI Content Without Prompt, Chatbot and Lead Generation plugin for WordPress is vulnerable to SQL Injection via the 'attributekey' parameter in versions up to, and including, 1
phpBB before 3
An escalation of privilege bug in various modules in Apache HTTP 2
Double Free and possible RCE vulnerability in Apache HTTP Server with the HTTP/2 protocol
Improper privilege management in the log rotation mechanism of the Skylight Workspace Config Service in Amazon WorkSpaces for Windows before 2
Easy PayPal Events & Tickets plugin for WordPress version 1
Easy PayPal Events & Tickets plugin for WordPress versions 1
Prometheus is an open-source monitoring system and time series database
The Forminator Forms â Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Path Traversal in versions up to, and including, 1
Buffer Over-read vulnerability in Apache HTTP Server
A NULL pointer dereference in mod_dav_lock in Apache HTTP Server 2
A flaw has been found in funadmin up to 7
Description: Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Atlas Apache Atlas exposes a DSL search endpoint that accepts user-supplied query strings
BusyBox before commit 42202bf contains a heap buffer overflow vulnerability in the DHCPv6 client (udhcpc6) DNS_SERVERS option handler in networking/udhcp/d6_dhcpc
A security vulnerability has been identified in the osrg GoBGP software, potentially allowing for unexpected behavior or unauthorized access.
A heap buffer overflow vulnerability exists in the DTLS handshake fragment reassembly logic of GnuTLS
In adbd_tls_verify_cert of auth
D-Link DIR-605L Hardware Revision A1 (End-of-Life, EOL) contains a hardcoded telnet backdoor
Boundary Community Edition and Boundary Enterprise (âBoundaryâ) workers are vulnerable to a denial-of-service condition during node enrollment TLS handshakes
A flaw has been found in UsamaK98 python-notebook-mcp up to a05a232815809a7e425b5fa7be26e0d4369894c2
A flaw was found in the AAP gateway
Memory corruption while creating a process on the digital signal processor due to allocation failure at the kernel level
A vulnerability was determined in Totolink WA300 5
A weakness has been identified in Totolink N300RH 3
A security vulnerability has been detected in Totolink N300RH 3
A vulnerability was detected in Totolink N300RH 3
NetBox versions 4
A guessable session cookie vulnerability in the GeoVision LPC2011/LPC2211 web interface allows unauthorized access to administrative sessions.
PPTAgent is an agentic framework for reflective PowerPoint generation
Evolver is a GEP-powered self-evolving engine for AI agents
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems
Memory corruption when processing camera sensor input/output control codes with invalid output buffers
Memory corruption when another driver calls an IOCTL with invalid input/output buffer
Memory Corruption when copying data from a freed source while executing performance counter deselect operation
An issue in Assimp v
An integer underflow in FRRouting (FRR) stable/10
fast-uri decoded percent-encoded path separators and dot segments before applying dot-segment removal in its normalize() and equal() functions
@fastify/accepts-serializer cached serializer-selection results keyed by the request Accept header without a size limit or eviction policy
An issue was discovered in Nix before 2
Multiple reflected cross-site scripting (xss) vulnerabilities exist in the Web Interface / ssi
Multiple reflected cross-site scripting (xss) vulnerabilities exist in the Web Interface / ssi
A flaw has been found in Acrel Electrical ECEMS Enterprise Microgrid Energy Efficiency Management System 1
A vulnerability has been found in Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform 1
A vulnerability was identified in Tiandy Easy7 Integrated Management Platform 7
A flaw has been found in AV Stumpfl Pixera Two Media Server up to 25
A security flaw has been identified in the YunaiV yudao-cloud platform that may allow for unauthorized access or system compromise.
A security weakness has been identified in the MindsDB platform that could potentially be leveraged by an attacker to compromise system integrity.
A security flaw has been discovered in the PrefectHQ prefect orchestration platform that could lead to unauthorized system access.
A critical security vulnerability has been identified in the Shandong Hoteam Software PDM system, which may permit unauthorized access to sensitive product data.
A security vulnerability has been identified in the osrg GoBGP software that may impact network routing security and stability.
A vulnerability has been found in RTGS2017 NagaAgent up to 5
A security flaw has been discovered in A-G-U-P-T-A wireshark-mcp edaf604416fbc94a201b4043092d4a1b09a12275/400c3da70074f22f3cce7ccb65304cafc7089c89
A security flaw has been discovered in Axle-Bucamp MCP-Docusaurus up to 404bc028e15ec304c9a045528560f4b5f27a17e0
A vulnerability has been found in 54yyyu code-mcp up to 4cfc4643541a110c906d93635b391bf7e357f4a8
A vulnerability was found in 54yyyu code-mcp up to 4cfc4643541a110c906d93635b391bf7e357f4a8
Improper Control of Generation of Code ('Code Injection') vulnerability in Profelis Information and Consulting Trade and Industry Limited Company SambaBox allows OS Command Injection
Detect-It-Easy prior to 3