CVE-2021-39935
GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Saturday's vulnerability disclosures include 14 critical and 100 high-priority CVEs, with three perfect CVSS 10.0 scores affecting Acronis Cyber Protect on Linux (CVE-2025-30411, CVE-2025-30412, CVE-2025-30416). Critical CVE volume dropped 42% from Friday's 24 to 14, while high-priority counts held steady at 100. Additional critical flaws affect Docker tool sandbox (CVE-2026-27002, CVSS 9.8), MLflow (CVE-2026-2635, CVSS 9.8), and Ghost CMS (CVE-2026-26980, CVSS 9.4). Twenty-one CVEs have confirmed active exploitation, spanning Microsoft Windows and Office, Apple OS, Google Chromium, GitLab, Roundcube Webmail, and Zimbra. No patches are currently available for the disclosed vulnerabilities, requiring organizations to prioritize compensating controls and monitoring.
Immediate action: Prioritize Acronis Cyber Protect environments for immediate compensating controls given three CVSS 10.0 flaws with no patches available. Review exposure to actively exploited Microsoft Windows, Apple OS, and Chromium vulnerabilities, and apply network segmentation or access restrictions where patches have not yet been released.
GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
Sangoma FreePBX OS Command Injection Vulnerability - Active in CISA KEV catalog.
Sangoma FreePBX Improper Authentication Vulnerability - Active in CISA KEV catalog.
React Native Community CLI OS Command Injection Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability - Active in CISA KEV catalog.
A protection mechanism failure in the MSHTML Framework allows an unauthenticated attacker to bypass security features over a network, potentially leading to unauthorized system access.
Microsoft Windows NULL Pointer Dereference Vulnerability - Active in CISA KEV catalog.
A protection mechanism failure in the Windows Shell allows an unauthenticated attacker to bypass security features over a network connection.
Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate their privileges locally on the affected system.
A type confusion vulnerability in the Desktop Window Manager (DWM) allows an authorized local attacker to elevate their privileges to a higher level.
A security feature bypass vulnerability in Microsoft Office Word exists due to reliance on untrusted inputs, allowing an unauthorized local attacker to circumvent security protections.
A memory corruption vulnerability in Apple software was addressed through improved state management to prevent potential exploitation.
Microsoft Configuration Manager SQL Injection Vulnerability - Active in CISA KEV catalog.
Notepad++ Download of Code Without Integrity Check Vulnerability - Active in CISA KEV catalog.
Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability - Active in CISA KEV catalog.
TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability - Active in CISA KEV catalog.
Google Chrome is vulnerable to a "Use After Free" condition in its CSS engine, which could allow a remote attacker to execute arbitrary code via a crafted webpage.
GitLab Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
RoundCube Webmail Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
RoundCube Webmail Cross-site Scripting Vulnerability - Active in CISA KEV catalog.
LibreNMS contains an SQL injection vulnerability in the ajax_table.php endpoint due to improper sanitization of IPv6 address parameters, allowing unauthorized database access.
OpenClaw's Docker tool sandbox is vulnerable to configuration injection, allowing dangerous Docker options that can lead to container escape and host data access.
Acronis Cyber Protect (Linux and Windows) is vulnerable to sensitive data disclosure and manipulation due to improper authentication in versions 15 and 16.
Acronis Cyber Protect (Linux and Windows) suffers from an improper authentication vulnerability allowing sensitive data disclosure and manipulation in versions 15 and 16.
Acronis Cyber Protect (Linux and Windows) is vulnerable to sensitive data disclosure and manipulation due to missing authorization in versions 15 and 16.
Acronis Cyber Protect products are vulnerable to sensitive data disclosure and manipulation due to missing authentication in the agent components across multiple operating systems.
Ghost CMS is vulnerable to unauthenticated arbitrary database reads, allowing attackers to extract sensitive information directly from the underlying database.
MLflow contains a critical authentication bypass vulnerability due to hard-coded default credentials in the basic_auth.ini file, allowing remote attackers to gain administrative access.
The PROLiNK PRC2402M router is vulnerable to OS command injection via shell metacharacters in the IP parameter of the live_api.cgi endpoint, enabling remote code execution.
Kolay Software's Talentics platform is vulnerable to Blind SQL Injection, allowing unauthenticated attackers to extract sensitive information from the database.
The web management interface of an unidentified network device allows administrators to set blank passwords, enabling unauthenticated administrative access via web and Telnet.
Thesystem 1.0 contains a command injection vulnerability in the run_command endpoint, allowing unauthenticated attackers to execute arbitrary system commands via POST requests.
A regex wildcard handling error in fast-xml-parser's DOCTYPE entity replacement allows attackers to shadow built-in entities, leading to Cross-Site Scripting (XSS).
A critical flaw in Sentry's SAML SSO implementation allows account takeover via malicious Identity Providers in multi-organization or specifically configured self-hosted instances.
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool
openITCOCKPIT is an open source monitoring tool built for different monitoring engines like Nagios, Naemon and Prometheus
openITCOCKPIT is an open source monitoring tool built for different monitoring engines like Nagios, Naemon and Prometheus
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Photolia photolia allows PHP Local File Inclusion
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes SevenTrees seventrees allows PHP Local File Inclusion
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Jude jude allows PHP Local File Inclusion
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Redy redy allows PHP Local File Inclusion
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Marveland marveland allows PHP Local File Inclusion
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Isida isida allows PHP Local File Inclusion
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Zio Alberto zioalberto allows PHP Local File Inclusion
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Parkivia parkivia allows PHP Local File Inclusion
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes UnlimHost unlimhost allows PHP Local File Inclusion
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in VanKarWai Airtifact airtifact allows PHP Local File Inclusion
The Product Table and List Builder for WooCommerce Lite plugin for WordPress is vulnerable to time-based SQL Injection via the 'search' parameter in all versions up to, and including, 4
A security flaw in the jsPDF library could enable attackers to compromise the document generation process, potentially leading to unauthorized data manipulation or client-side execution.
Zumba Json Serializer is a library to serialize PHP variables in JSON format
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Blabber blabber allows PHP Local File Inclusion
Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes PawFriends - Pet Shop and Veterinary WordPress Theme pawfriends allows Exploiting Incorrectly Configured Access Control Security Levels
The wpForo Forum plugin for WordPress is vulnerable to time-based SQL Injection via the 'wpfob' parameter in all versions up to, and including, 2
jsPDF is a library to generate PDFs in JavaScript
jsPDF is a library to generate PDFs in JavaScript
Deno is a JavaScript, TypeScript, and WebAssembly runtime
Chamilo LMS 1
ZoneMinder is a free, open source closed-circuit television software application
ADB Explorer is a fluent UI for ADB on Windows
minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects
LabCollector 5
Dell PowerProtect Data Manager, version(s) prior to 19
Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations
HDF5 is software for managing data
A vulnerability was found in itsourcecode Agri-Trading Online Shopping System 1
A flaw has been found in SourceCodester Simple Responsive Tourism Website 1
MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Execution Vulnerability
OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI
OpenClaw is a personal AI assistant
A vulnerability was detected in D-Link DWR-M960 1
A flaw has been found in D-Link DWR-M960 1
A vulnerability has been found in D-Link DWR-M960 1
A vulnerability was found in D-Link DWR-M960 1
A vulnerability was determined in D-Link DWR-M960 1
Xmind Attachment Insufficient UI Warning Remote Code Execution Vulnerability
GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Sante DICOM Viewer Pro DCM File Parsing Buffer Overflow Remote Code Execution Vulnerability
GIMP PGM File Parsing Uninitialized Memory Remote Code Execution Vulnerability
GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
GIMP ICNS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
PDF-XChange Editor TrackerUpdate Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
The embedded web interface of the device does not support HTTPS/TLS for authentication and uses HTTP Basic Authentication
eBay API MCP Server is an open source local MCP server providing AI assistants with comprehensive access to eBay's Sell APIs
The installer for ã¸ã§ããã°éč¨/åæãŊãããĻã§ãĸ RICOHã¸ã§ããã°éč¨ããŧãĢ versions prior to Ver
The underlying PLC of the device can be remotely influenced, without proper safeguards or authentication
httpsig-hyper is a hyper extension for http message signatures
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JoomSky JS Help Desk js-support-ticket allows Blind SQL Injection
The Wi-Fi router is vulnerable to de-authentication attacks due to the absence of management frame protection, allowing forged deauthentication and disassociation frames to be broadcast without authentication or encryption
Comodo Dome Firewall 2
systeminformation is a System and OS information library for node
Music Assistant is an open-source media library manager that integrates streaming services with connected speakers
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books
GFI Archiver MArc
GFI Archiver MArc
SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles
Formwork is a flat file-based Content Management System (CMS)
SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models
systeminformation is a System and OS information library for node
Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve both arbitrary file read and server-side request forgery through the absolute path traversal
A zip-slip path traversal vulnerability in Spring Data Geode's import snapshot functionality allows attackers to write files outside the intended extraction directory
Fiverr Clone Script 1
delpino73 Blue-Smiley-Organizer 1
Wings is the server control plane for Pterodactyl, a free, open-source game server management panel
SPIP before 4
A vulnerability exists in EnOcean SmartServer IoT version 4
Statmatic is a Laravel and Git powered content management system (CMS)
OpenClaw is a personal AI assistant
Sricam DeviceViewer 3
Metabase is an open-source data analytics platform
Wallos is an open-source, self-hostable personal subscription tracker
Fabric
OpenClaw is a personal AI assistant
Hyland Alfresco allows unauthenticated attackers to read arbitrary files from protected directories (like WEB-INF) via the "/share/page/resource/" endpoint, thus leading to the disclosure of sensitive configuration files
Penpot is an open-source design tool for design and code collaboration
soroban-sdk is a Rust SDK for Soroban contracts
fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback
NanaZip is an open source file archive Starting in version 5
OpenClaw is a personal AI assistant
OpenClaw is a personal AI assistant
OpenClaw is a personal AI assistant
OpenClaw is a personal AI assistant
Missing Authorization vulnerability in wpjobportal WP Job Portal wp-job-portal allows Exploiting Incorrectly Configured Access Control Security Levels
Authorization Bypass Through User-Controlled Key vulnerability in themeplugs Authorsy authorsy allows Exploiting Incorrectly Configured Access Control Security Levels
Part-DB 0
SpotAuditor 5
Authorization Bypass Through User-Controlled Key vulnerability in MeCODE Informatics and Engineering Services Ltd
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline
A security flaw has been discovered in Fujian Smart Integrated Management Platform System up to 7
A weakness has been identified in Fujian Smart Integrated Management Platform System up to 7
GFI Archiver MArc
GFI Archiver MArc