CVE-2012-1854
Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Friday's vulnerability disclosures reveal 12 critical flaws concentrated across HP enterprise management systems, WordPress plugins, and LG mail security appliances. Critical CVE volume dropped 29% from Thursday's 17 to 12, while the 100 high-priority disclosures held steady. CVE-2026-31843 and CVE-2026-37345 (both CVSS 9.8) target HP payment and vehicle management platforms, while CVE-2026-6350 (CVSS 9.8) exposes LG MailGates and MailAudit to remote exploitation. Remote code execution and SQL injection patterns dominate the critical tier, with WordPress plugin vulnerabilities accounting for three of the top ten. No vendor patches are currently available for any disclosed CVE, and 9 vulnerabilities across Microsoft, Adobe, and Apache products have confirmed active exploitation.
Immediate action: Prioritize compensating controls for HP enterprise management systems, WordPress installations, and LG MailGates/MailAudit deployments where no patches exist. Organizations running Microsoft Exchange Server, SharePoint, and Adobe Acrobat should verify mitigations against the 9 actively exploited vulnerabilities, several of which target legacy flaws dating back to 2009.
Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Link Following Vulnerability - Active in CISA KEV catalog.
Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Out-of-Bounds Read Vulnerability - Active in CISA KEV catalog.
Adobe Acrobat Use-After-Free Vulnerability - Active in CISA KEV catalog.
Adobe Acrobat Reader is vulnerable to prototype pollution, which can result in arbitrary code execution when a victim opens a malicious file.
Microsoft Office Remote Code Execution - Active in CISA KEV catalog.
Microsoft SharePoint Server Improper Input Validation Vulnerability - Active in CISA KEV catalog.
Apache ActiveMQ Improper Input Validation Vulnerability - Active in CISA KEV catalog.
The pay-uz Laravel package contains an unauthenticated remote code execution vulnerability via the /payment/api/editable/update endpoint.
The Barcode Scanner plugin for WordPress is vulnerable to privilege escalation via insecure token handling and lack of meta-key restrictions.
The Riaxe Product Customizer plugin for WordPress allows unauthenticated attackers to update arbitrary site options via an unprotected AJAX action.
SourceCodester Vehicle Parking Area Management System v1.0 is vulnerable to SQL injection via the 'manage_park.php' file.
SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL injection via the 'view_user.php' file.
SourceCodester Payroll Management and Information System v1.0 is vulnerable to SQL injection via the 'view_employee.php' file.
The Accordion and Accordion Slider plugin for WordPress version 1.4.6 contains a malicious backdoor injected by threat actors.
SiYuan versions 3.6.3 and below are vulnerable to stored XSS in Mermaid diagrams, which can be escalated to arbitrary code execution on Electron-based desktop builds.
Openfind MailGates/MailAudit is vulnerable to a stack-based buffer overflow, allowing unauthenticated remote code execution.
Creolabs Gravity before 0.9.6 is vulnerable to a heap buffer overflow in the VM execution engine, allowing arbitrary code execution.
Luanti versions before 5.15.2 are vulnerable to a Lua sandbox escape when using LuaJIT, allowing a crafted mod to execute arbitrary code.
The @fastify/middie package fails to inherit middleware in child plugin scopes, leading to an authentication bypass for unauthenticated requests.
The SkyWalking OAP /debugging/config/dump endpoint may leak sensitive configuration information of MySQL/PostgreSQL
Dell Storage Manager - Replay Manager for Microsoft Servers, version(s) 8
Use after free in Proxy in Google Chrome prior to 147
Use after free in Prerender in Google Chrome prior to 147
Use after free in CSS in Google Chrome prior to 147
Use after free in Video in Google Chrome prior to 147
Use after free in Codecs in Google Chrome prior to 147
Heap buffer overflow in PDFium in Google Chrome prior to 147
Heap buffer overflow in PDFium in Google Chrome prior to 147
Use after free in Permissions in Google Chrome on Android prior to 147
Use after free in Forms in Google Chrome prior to 147
Use after free in Cast in Google Chrome prior to 147
Use after free in Codecs in Google Chrome prior to 147
Use after free in XR in Google Chrome on Android prior to 147
Use after free in Video in Google Chrome on Windows prior to 147
Use after free in FileSystem in Google Chrome prior to 147
The Payment Gateway for Redsys & WooCommerce Lite plugin for WordPress is vulnerable to Improper Verification of Cryptographic Signature in versions up to, and including, 7
Use after free in Graphite in Google Chrome prior to 147
Use after free in Viz in Google Chrome prior to 147
Use after free in Dawn in Google Chrome prior to 147
Use after free in Payments in Google Chrome on Android prior to 147
Type Confusion in Turbofan in Google Chrome prior to 147
Type Confusion in Turbofan in Google Chrome prior to 147
Type Confusion in V8 in Google Chrome prior to 147
The Livemesh Addons for Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 9
The Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter keys within 'product_data' of the /wp-json/InkXEProductDesignerLite/add-item-to-cart REST API endpoint in all versions up to, and including, 2
Uninitialized Use in Accessibility in Google Chrome on Windows prior to 147
Out of bounds write in GPU in Google Chrome prior to 147
Adobe Photoshop Installer was affected by an Uncontrolled Search Path Element vulnerability that could have resulted in arbitrary code execution in the context of the current user
maddy is a composable, all-in-one mail server
Out of bounds read in Media in Google Chrome prior to 147
Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks
The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbitrary File Read via the Repeater JSON/CSV URL parameter in versions up to, and including, 2
The Login as User plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1
The AcyMailing plugin for WordPress is vulnerable to privilege escalation in all versions From 9
The Accessibly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the REST API in all versions up to, and including, 3
The DirectoryPress β Business Directory And Classified Ad Listing plugin for WordPress is vulnerable to SQL Injection via the 'packages' parameter in versions up to, and including, 3
Composer is a dependency manager for PHP
The Career Section plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to Path Traversal and Arbitrary File Deletion in all versions up to, and including, 1
Composer is a dependency manager for PHP
Slah CMS v1
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7
Git for Windows is the Windows port of Git
Daylight Studio FuelCMS v1
Incorrect access control in the config
An issue in the file handling logic of the component download
Nordic Semiconductor IronSide SE for nRF54H20 versions before 23 contain an unspecified vulnerability.
SourceCodester Simple Music Cloud Community System v1
SourceCodester Simple Music Cloud Community System v1
Zohocorp ManageEngine Log360 versions 13000 through 13013 are vulnerable to authentication bypass on certain actions due to improper filter configuration
Zohocorp ManageEngine PAM360 versions before 8531 and ManageEngine Password Manager Pro versions from 8600 to 13230 are vulnerable to Authenticated SQL injection in the query report module
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in bdthemes Element Pack Elementor Addons bdthemes-element-pack-lite allows Blind SQL Injection
radare2 before 9236f44, when configured on UNIX without SSL, allows command injection via a PDB name to rabin2 -PP
OpenHarness prior to commit dd1d235 contains a command injection vulnerability that allows remote gateway users with chat access to invoke sensitive administrative commands by exploiting insufficient distinction between local-only and remote-safe commands in the gateway handler
In products of the MSE6 product-family by Festo a remote authenticated, low privileged attacker could use functions of undocumented test mode which could lead to a complete loss of confidentiality, integrity and availability
During an internal security assessment, a potential vulnerability was discovered in Lenovo Software Fix that could allow a local authenticated user to perform arbitrary code execution with elevated privileges
Uncontrolled Resource Consumption in Bosch VMS Central Server in Bosch VMS 12
Vault is vulnerable to a denial-of-service condition where an unauthenticated attacker can repeatedly initiate or cancel root token generation or rekey operations, occupying the single in-progress operation slot
In rsync 3
During an internal security assessment, a potential vulnerability was discovered in Lenovo Software Fix, that during installation could allow a local authenticated user to execute code with elevated privileges
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Beaver Builder Beaver Builder beaver-builder-lite-version allows Blind SQL Injection
MailGates/MailAudit developed by Openfind has a CRLF Injection vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read system files
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WC Lovers WCFM Marketplace allows SQL Injection
A Stored Cross-Site Scripting vulnerability was discovered in the Assets and Nodes functionality due to improper validation of an input parameter
Weblate is a web based localization tool
OWASP BLT is a QA testing and vulnerability disclosure platform that encompasses websites, apps, git repositories, and more
WinMatrix agent developed by Simopro Technology has a Missing Authentication vulnerability, allowing authenticated local attackers to execute arbitrary code with SYSTEM privileges on the local machine as well as on all hosts within the environment where the agent is installed
ApostropheCMS is an open-source Node
Note Mark is an open-source note-taking application
LangChain-ChatChat 0
Agent Zero 0
Cloud Foundry UUA isΒ vulnerable to a bypass that allows an attacker to obtain a token for any user and gain access to UAA-protected systems
SiYuan is an open-source personal knowledge management system
Command injection in the connect function in NietThijmen ShoppingCart 0
IdentityIQ 8
Improper validation of bash commands in Snowflake Cortex Code CLI versions prior to 1
An access control vulnerability in Intel's Threat Intelligence functionality allows users with view-only privileges to bypass intended restrictions.
Cross-Site Request Forgery (CSRF) vulnerability in Syed Balkhi Contact Form by WPForms wpforms-lite allows Cross Site Request Forgery
Authorization Bypass Through User-Controlled Key vulnerability in Mahmudul Hasan Arif FluentBoards fluent-boards allows Exploiting Incorrectly Configured Access Control Security Levels
Luanti 5 before 5
sagredo qmail before 2026
SiYuan is an open-source personal knowledge management system
An authenticated user with access to a kvv2 path through a policy containing a glob may be able to delete secrets they were not authorized to read or write, resulting in denial-of-service
A prompt injection vulnerability in Windsurf 1
Velociraptor versions prior to 0
Weblate is a web based localization tool
Barracuda RMM versions prior toΒ 2025
Eaton Intelligent Power Protector (IPP) is vulnerable to insecure library loading, which could allow an attacker with local access to achieve arbitrary code execution.
Weblate is a web based localization tool
CentSDR commit e40795 was discovered to contain a stack overflow in the "Thread1" function
Missing Authorization vulnerability in Plisio Accept Cryptocurrencies with Plisio allows Exploiting Incorrectly Configured Access Control Security Levels
The XML parsers within multiple WSO2 products accept user-supplied XML data without properly configuring to prevent the resolution of external entities
A NULL pointer dereference vulnerability exists in fio (Flexible I/O Tester) v3
ngtcp2 is a C implementation of the IETF QUIC protocol
If a Vault auth mount is configured to pass through the "Authorization" header, and the "Authorization" header is used to authenticate to Vault, Vault forwarded the Vault token to the auth plugin backend
OpenProject is an open-source project management application
@fastify/middie versions 9
Jaaz 1
A flaw was found in gimp
In OCaml opam before 2