CVE-2021-22175
GitLab Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Tuesday's vulnerability disclosures reveal critical flaws in Delta Electronics COMMGR2 (CVE-2026-3630, CVSS 9.8) and Progress Budibase (CVE-2026-30240, CVSS 9.6), alongside web-enabled controller vulnerabilities affecting building automation systems. The day's 80 CVEs include 5 critical-severity issues, up 150% from Monday's 2, and 75 high-priority vulnerabilities, a 23% increase. Industrial control systems and low-code development platforms are the primary attack surfaces, with remote code execution and authentication bypass patterns dominating the critical findings. Fourteen vulnerabilities have confirmed active exploitation, including long-standing flaws in GitLab, Ivanti Endpoint Manager, Broadcom VMware Aria Operations, and multiple Apple products. No patches are currently available for Tuesday's newly disclosed CVEs, making network segmentation and compensating controls essential for affected systems.
Immediate action: Prioritize network isolation for Delta Electronics COMMGR2 systems and building automation controllers running vulnerable wwwupdate.cgi and wwwupload.cgi services, as no patches are currently available. Review exposure to actively exploited flaws in Ivanti Endpoint Manager, Broadcom VMware Aria Operations, SolarWinds Web Help Desk, and Roundcube Webmail, and apply any existing vendor mitigations or access restrictions immediately.
GitLab Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
RoundCube Webmail Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
RoundCube Webmail Cross-site Scripting Vulnerability - Active in CISA KEV catalog.
FileZen is affected by a high-severity OS command injection vulnerability that allows a threat actor to execute arbitrary commands on the underlying operating system.
Omnissa Workspace ONE Server-Side Request Forgery - Active in CISA KEV catalog.
Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability - Active in CISA KEV catalog.
VMware Aria Operations contains a command injection vulnerability that could allow an attacker to execute arbitrary commands on the affected system.
A memory corruption vulnerability exists in memory allocation processes when handling specific alignments, potentially leading to arbitrary code execution or system instability.
Hikvision Multiple Products Improper Authentication Vulnerability - Active in CISA KEV catalog.
Rockwell Multiple Products Insufficient Protected Credentials Vulnerability - Active in CISA KEV catalog.
Apple Multiple products Use-After-Free Vulnerability - Active in CISA KEV catalog.
Apple Multiple Products Integer Overflow or Wraparound Vulnerability - Active in CISA KEV catalog.
Apple iOS and iPadOS Use-After-Free Vulnerability - Active in CISA KEV catalog.
A path traversal vulnerability in Budibase's PWA ZIP processing allows authenticated builders to exfiltrate sensitive server files, including environment variables and encryption keys.
Delta Electronics COMMGR2 is affected by a stack-based buffer overflow vulnerability that could lead to arbitrary code execution or system crashes.
An authorization bypass in the wwwupdate.cgi endpoint allows unauthenticated remote attackers to upload and execute arbitrary updates, potentially leading to full system takeover.
Insufficient authorization in the wwwupload.cgi endpoint allows unauthenticated attackers to upload arbitrary data, including system backups, HTTPS certificates, and BACnet/SC keys.
A regex bypass in Budibase's middleware allows unauthenticated attackers to skip all authentication and authorization checks by appending a webhook path pattern to any API request URL.
A flaw has been found in SourceCodester Client Database Management System 1
A vulnerability has been found in SourceCodester Client Database Management System 1
A vulnerability in SourceCodester Client Database Management System version 1 could allow for unauthorized database access or manipulation.
A vulnerability in Apache Airflow allows a user with database access to execute arbitrary code on the Triggerer component by crafting a malicious database entry.
A security issue was discovered in ingress-nginx where the `nginx
A flaw has been found in Tiandy Easy7 CMS Windows 7
Another security flaw has been discovered in version 1 of the code-projects Simple Flight Ticket Booking System, affecting its overall security.
A security flaw has been discovered in itsourcecode Free Hotel Reservation System 1 that could allow an attacker to compromise the application's integrity and confidentiality.
A high-severity vulnerability in code-projects Student Web Portal 1 could allow an attacker to gain unauthorized access to sensitive academic and personal data.
A security vulnerability in SourceCodester Simple Responsive Tourism Website 1 could enable attackers to compromise the website and access backend data.
itsourcecode University Management System 1 is vulnerable to a high-severity flaw that could lead to unauthorized administrative access and data manipulation.
A weakness has been identified in projectworlds Online Art Gallery Shop 1 that could allow attackers to compromise the online storefront and its data.
A security vulnerability has been detected in projectworlds Online Art Gallery Shop 1
A vulnerability was detected in itsourcecode University Management System 1
A vulnerability was identified in itsourcecode University Management System 1
The Atop Technologies EHG2408 series switch contains a stack-based buffer overflow allowing unauthenticated remote attackers to execute arbitrary code.
A stack-based buffer overflow in the ubr-network method of the wwwubr service allows low-privileged remote attackers to achieve full device compromise via a crafted POST request.
The rtsol(8) and rtsold(8) programs do not validate the domain search list options provided in router advertisement messages; the option body is passed to resolvconf(8) unmodified
Stack buffer overflow vulnerability in D-Link DIR-513 v1
A vulnerability has been found in Tenda F453 1
A vulnerability was found in Tenda F453 1
A vulnerability was determined in Tenda F453 1
A vulnerability was identified in Tenda F453 1
A security vulnerability has been detected in Tenda F453 1
A security vulnerability has been detected in Tenda F453 1
A vulnerability was detected in Tenda F453 1
A flaw has been found in Tenda i3 1
A vulnerability was found in Tenda i3 1
A vulnerability was determined in Tenda i3 1
A vulnerability was identified in Tenda i3 1
A security flaw has been discovered in Tenda i3 1
A security vulnerability has been detected in Tenda FH1202 1
A vulnerability was detected in Tenda FH1202 1
A flaw has been found in Tenda FH1202 1
A vulnerability has been found in Tenda FH1202 1
A vulnerability was found in Tenda FH1202 1
A low-privileged remote attacker can abuse the backup restore functionality of UBR (ubr-restore) which runs with elevated privileges and does not validate the contents of the backup archive to create or overwrite arbitrary files anywhere on the system
A low-privileged remote attacker can exploit an arbitrary file write vulnerability in the wwupload
MobaXterm versions prior to 26
A vulnerability in the ubr-editfile method of the wwwubr service allows low-privileged remote attackers to perform unauthorized file manipulations.
Delta Electronics COMMGR2 has Buffer Over-read DoS vulnerability
The wwwupdate service exposes valid session tokens in plaintext within URL parameters, allowing unauthenticated remote attackers to hijack active user sessions.
A weakness has been identified in UltraVNC 1
Keygraph Shannon contains a hard-coded API key in its router configuration that, when the router component is enabled and exposed, allows network attackers to authenticate using the publicly known static key
A high-privileged remote attacker can fully compromise the device by abusing an update signature bypass vulnerability in the wwwupdate
A high-severity vulnerability exists in the Budibase low-code platform, potentially allowing unauthorized access or manipulation of internal tools and workflows.
A security flaw has been discovered in UTT HiPER 810G up to 1
A weakness has been identified in UTT HiPER 810G up to 1
A vulnerability in the `filestring()` function of the `nltk
A high-severity vulnerability in ImageMagick's image processing logic could allow attackers to compromise systems that utilize the software for digital image manipulation.
The installer for Qsee Client versions 1
A local attacker with low privileges can exploit the UBR service account to potentially escalate privileges or access sensitive system data within the Windows environment.
ImageMagick is susceptible to a vulnerability during image manipulation that could allow for unauthorized code execution or system instability when processing crafted files.
An improper input validation flaw in modem firmware allows for potential exploitation through malformed data inputs, leading to system instability or unauthorized access.
The NR (5G) modem firmware contains an improper input validation flaw that can be triggered to cause a system crash and denial of service via malformed inputs.
An improper input validation vulnerability in the NR modem firmware can be exploited to induce a system crash and disrupt 5G services through crafted data.
In nr modem, there is a possible system crash due to improper input validation
In nr modem, there is a possible system crash due to improper input validation
In nr modem, there is a possible system crash due to improper input validation
In nr modem, there is a possible system crash due to improper input validation
In nr modem, there is a possible system crash due to improper input validation
In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine
The rtsock_msg_buffer() function serializes routing information into a buffer
An issue pertaining to CWE-400: Uncontrolled Resource Consumption was discovered in Nexusoft NexusInterface v3
A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2
FreshRSS is a free, self-hostable RSS aggregator
ImageMagick is free and open-source software used for editing and manipulating digital images
A vulnerability has been found in code-projects Simple Flight Ticket Booking System 1
A vulnerability was found in code-projects Simple Flight Ticket Booking System 1
A weakness has been identified in itsourcecode University Management System 1
A security flaw has been discovered in projectworlds Online Art Gallery Shop 1
A vulnerability was identified in doramart DoraCMS 3
vLLM is an inference and serving engine for large language models (LLMs)
ImageMagick is free and open-source software used for editing and manipulating digital images
SiYuan is a personal knowledge management system