CVE-2026-25108
FileZen is affected by a high-severity OS command injection vulnerability that allows a threat actor to execute arbitrary commands on the underlying operating system.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Friday's vulnerability disclosures are dominated by multiple critical flaws in Veeam Backup & Replication, with four CVEs scoring 9.9 and one at 9.1, presenting significant risk to enterprise backup infrastructure. The day's total includes 10 critical and 100 high-priority CVEs, with critical counts down 58% from the prior day while high-priority volume held steady. CVE-2026-3611 in Honeywell IQ4x building controllers received a maximum CVSS 10.0 score, and CVE-2026-3059 and CVE-2026-3060 affect the SGLang AI framework at 9.8 each. Attack patterns span remote code execution and authentication bypass across enterprise backup, industrial control systems, and AI/ML infrastructure. Eleven CVEs have confirmed active exploitation, including vulnerabilities in Ivanti Endpoint Manager, VMware Aria Operations, and several legacy Apple and Hikvision flaws, while patch availability currently sits at 0%.
Immediate action: Prioritize Veeam Backup & Replication environments for immediate risk assessment given five critical-severity flaws, and isolate Honeywell IQ4x building controllers from untrusted networks pending vendor guidance. With 0% patch availability across Friday's disclosures, implement compensating controls including network segmentation, enhanced monitoring, and access restrictions for all affected systems, particularly Ivanti EPM and VMware Aria Operations instances under active exploitation.
FileZen is affected by a high-severity OS command injection vulnerability that allows a threat actor to execute arbitrary commands on the underlying operating system.
Omnissa Workspace ONE Server-Side Request Forgery - Active in CISA KEV catalog.
Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability - Active in CISA KEV catalog.
VMware Aria Operations contains a command injection vulnerability that could allow an attacker to execute arbitrary commands on the affected system.
A memory corruption vulnerability exists in memory allocation processes when handling specific alignments, potentially leading to arbitrary code execution or system instability.
n8n Improper Control of Dynamically-Managed Code Resources Vulnerability - Active in CISA KEV catalog.
Hikvision Multiple Products Improper Authentication Vulnerability - Active in CISA KEV catalog.
Rockwell Multiple Products Insufficient Protected Credentials Vulnerability - Active in CISA KEV catalog.
Apple Multiple products Use-After-Free Vulnerability - Active in CISA KEV catalog.
Apple Multiple Products Integer Overflow or Wraparound Vulnerability - Active in CISA KEV catalog.
Apple iOS and iPadOS Use-After-Free Vulnerability - Active in CISA KEV catalog.
An authenticated user with the Backup Administrator role can perform remote code execution in high availability deployments of Veeam Backup & Replication.
Honeywell IQ4x controllers allow unauthenticated remote attackers to create administrative accounts and take full control of building management systems.
An authenticated domain user can achieve remote code execution on the Backup Server, leading to full system compromise.
A vulnerability in the Backup Server allows an authenticated domain user to perform remote code execution, compromising the backup environment.
An authenticated domain user can execute arbitrary code on the Backup Server, leading to a complete compromise of the backup system.
A vulnerability allows a user with Backup Viewer privileges to perform remote code execution as the postgres user on the backup system.
SGLang's multimodal generation module is vulnerable to unauthenticated remote code execution via untrusted data deserialization in the ZMQ broker.
SGLang's encoder parallel disaggregation system allows unauthenticated remote code execution through insecure deserialization in the disaggregation module.
TinaCMS CLI is vulnerable to a browser-based drive-by attack that allows remote attackers to read, write, or delete files on developer machines.
The GL-iNet GL-AR300M16 router contains a command injection vulnerability in the `set_config` function, allowing for arbitrary command execution.
Jettweb PHP Hazir Rent A Car Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the arac_kategori_id parameter
Jettweb Php Hazir Ilan Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'kat' parameter
Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the videoid parameter
Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'q' parameter
Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the gallery_id parameter
Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cid parameter
Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the poll parameter
Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting malicious SQL code through the option parameter
Netartmedia PHP Dating Site contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the Email parameter
Jettweb Hazir Rent A Car Scripti V4 contains multiple SQL injection vulnerabilities in the admin panel that allow unauthenticated attackers to manipulate database queries through GET parameters
XooDigital Latest contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'p' parameter
XooGallery Latest contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the gal_id parameter
XooGallery Latest contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries by injecting SQL code through the photo_id parameter
XooGallery Latest contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cat_id parameter
XooGallery Latest contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'p' parameter
uHotelBooking System contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the system_page GET parameter
A command injection vulnerability in the Cisco IOS XR CLI allows local, authenticated users to execute arbitrary commands with root privileges on the underlying operating system.
A privilege escalation vulnerability in Cisco IOS XR Software's task group assignment allows local authenticated attackers to gain full administrative control over the device.
202CMS v10 beta contains a blind SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the log_user parameter
A heap buffer overflow vulnerability in the WebML component of Google Chrome allows unauthenticated remote attackers to potentially execute arbitrary code via crafted web content.
Google Chrome contains a heap buffer overflow in the WebML component, enabling unauthenticated remote attackers to achieve memory corruption or code execution via malicious pages.
A use-after-free vulnerability in the Agents component of Google Chrome allows unauthenticated remote attackers to potentially execute arbitrary code via a crafted web page.
Use after free in WebMCP in Google Chrome prior to 146
Use after free in Extensions in Google Chrome prior to 146
Use after free in TextEncoding in Google Chrome prior to 146
Use after free in MediaStream in Google Chrome prior to 146
Use after free in WebMIDI in Google Chrome prior to 146
Heap buffer overflow in Skia in Google Chrome prior to 146
Use after free in WebView in Google Chrome on Android prior to 146
A vulnerability allowing local privilege escalation on Windows-based Veeam Backup & Replication servers
iScripts ReserveLogic contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the jqSearchDestination parameter
Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting improper SQL query validation
Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows attackers to inject malicious SQL commands through the kelime parameter in POST requests
Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows attackers to inject malicious SQL commands through the kelime parameter in POST requests
Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting improper SQL query validation
Netartmedia PHP Car Dealer contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the features[] parameter
In Microsoft DirectX End-User Runtime Web Installer 9
Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune
Integer overflow in WebML in Google Chrome prior to 146
Out of bounds memory access in WebML in Google Chrome prior to 146
Out of bounds read in V8 in Google Chrome prior to 146
Netartmedia PHP Business Directory 4
Netartmedia PHP Real Estate Agency 4
Netartmedia PHP Mall 4
Netartmedia PHP Mall 4
Improper Check of minimum version in update functionality of certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access
Improper Privilege Management in certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access
Inout RealEstate contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the city parameter
202CMS v10 beta contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the log_user parameter
The ExactMetrics â Google Analytics Dashboard for WordPress plugin is vulnerable to Insecure Direct Object Reference in versions 8
The ExactMetrics â Google Analytics Dashboard for WordPress plugin is vulnerable to Improper Privilege Management in versions 7
Netartmedia Deals Portal contains an SQL injection vulnerability in the Email parameter of loginaction
Deno is a JavaScript, TypeScript, and WebAssembly runtime
Netartmedia Jobs Portal 6
Netartmedia Event Portal 2
Netartmedia Real Estate Portal 5
Netartmedia Real Estate Portal 5
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing
WeGIA is a web manager for charitable institutions
Postal is an open source SMTP server
A flaw has been found in Tenda i3 1
A vulnerability has been found in Tenda i3 1
A vulnerability was found in Tenda W3 1
A vulnerability was determined in Tenda W3 1
A vulnerability was identified in Tenda W3 1
A security flaw has been discovered in Tenda W3 1
A weakness has been identified in Tenda W3 1
A vulnerability was detected in D-Link DIR-513 1
A vulnerability was detected in Tenda W3 1
A flaw has been found in Tenda W3 1
A security flaw has been discovered in Tenda i12 1
A weakness has been identified in Tenda i12 1
A security vulnerability has been detected in Tenda i12 1
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10
Easy File Sharing Web Server 7
Shopware is an open commerce platform
OpenClaw version 2026
OpenClaw versions prior to 2026
An issue was discovered in Lantronix EDS5000 2
An issue was discovered in Lantronix EDS5000 2
An issue was discovered in Lantronix EDS5000 2
OpenEMR is a free and open source electronic health records and medical practice management application
The issue was addressed with improved memory handling
A vulnerability allowing an authenticated domain user to bypass restrictions and manipulate arbitrary files on a Backup Repository
Tinyauth is an authentication and authorization server
Verypdf docPrint Pro 8
Comtrend AR-5310 GE31-412SSG-C01_R10
Tina is a headless content management system
SiYuan is a personal knowledge management system
Striae is a firearms examiner's comparison companion
Varient 1
Inout EasyRooms Ultimate Edition v1
Inout EasyRooms Ultimate Edition v1
Inout EasyRooms Ultimate Edition v1
Inout EasyRooms Ultimate Edition v1
NEXULEAN is a cybersecurity portfolio & service platform for an Ethical Hacker, AI Enthusiast, and Penetration Tester
ZeptoClaw is a personal AI assistant
An issue in ClasroomIO before v
Graphiti is a framework for building and querying temporal context graphs for AI agents
llama