CVE-2026-22769
Dell RecoverPoint for Virtual Machines contains hardcoded credentials that allow unauthenticated remote attackers to gain root-level access and establish persistence.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Thursday's vulnerability disclosures are dominated by multiple critical HP product vulnerabilities and a CVSS 10.0 Dell RecoverPoint flaw under active exploitation. The disclosure volume includes 20 critical CVEs (up 186% from the prior day) and 82 high-priority vulnerabilities (up 71%), reflecting a significant escalation in disclosed risk. Notable critical entries include CVE-2026-27175, CVE-2026-27174, and CVE-2026-27180 affecting HP products with CVSS 9.8 scores, alongside CVE-2026-1937 targeting WordPress. Microsoft Windows and Office account for six actively exploited vulnerabilities, with additional confirmed exploitation in GitLab, Apple OS, and Google Chromium. Patch availability currently stands at 0%, requiring organizations to prioritize compensating controls and monitoring for all affected systems.
Immediate action: Prioritize Dell RecoverPoint, HP product lines, Microsoft Windows, and Microsoft Office for immediate review and apply compensating controls such as network segmentation and enhanced monitoring. With no patches currently available for any of the 102 disclosed vulnerabilities, organizations should implement detection rules for known exploitation patterns and restrict access to affected services until vendor remediations are released.
Dell RecoverPoint for Virtual Machines contains hardcoded credentials that allow unauthenticated remote attackers to gain root-level access and establish persistence.
GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
Sangoma FreePBX OS Command Injection Vulnerability - Active in CISA KEV catalog.
Sangoma FreePBX Improper Authentication Vulnerability - Active in CISA KEV catalog.
React Native Community CLI OS Command Injection Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability - Active in CISA KEV catalog.
A protection mechanism failure in the MSHTML Framework allows an unauthenticated attacker to bypass security features over a network, potentially leading to unauthorized system access.
Microsoft Windows NULL Pointer Dereference Vulnerability - Active in CISA KEV catalog.
A protection mechanism failure in the Windows Shell allows an unauthenticated attacker to bypass security features over a network connection.
Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate their privileges locally on the affected system.
A type confusion vulnerability in the Desktop Window Manager (DWM) allows an authorized local attacker to elevate their privileges to a higher level.
A security feature bypass vulnerability in Microsoft Office Word exists due to reliance on untrusted inputs, allowing an unauthorized local attacker to circumvent security protections.
A memory corruption vulnerability in Apple software was addressed through improved state management to prevent potential exploitation.
Microsoft Configuration Manager SQL Injection Vulnerability - Active in CISA KEV catalog.
Notepad++ Download of Code Without Integrity Check Vulnerability - Active in CISA KEV catalog.
Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability - Active in CISA KEV catalog.
TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability - Active in CISA KEV catalog.
Google Chrome is vulnerable to a "Use After Free" condition in its CSS engine, which could allow a remote attacker to execute arbitrary code via a crafted webpage.
GitLab Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
MajorDoMo is vulnerable to unauthenticated remote code execution via a race condition and unsanitized user input in the rc/index.php and cycle_execs.php components.
MajorDoMo allows unauthenticated remote code execution via the admin panel's PHP console due to a logic error that bypasses authentication and passes input to the eval() function.
MajorDoMo is vulnerable to unauthenticated remote code execution via update URL poisoning, allowing an attacker to force the system to download and extract a malicious update package.
SourceCodester Customer Support System 1.0 contains an incorrect access control vulnerability in ajax.php, allowing unauthenticated attackers to invoke administrative methods and delete or modify records.
The YayMail plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on an AJAX action, allowing authenticated attackers to gain administrative access.
CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection in print_membership_card.php via the ID parameter.
code-projects Community Project Scholars Tracking System 1.0 is vulnerable to SQL Injection in the admin user management endpoints /admin/save_user.php and /admin/update_user.php. These endpoints lack authentication checks and directly concatenate user-supplied POST parameters (firstname, lastname, username, password, user_id) into SQL queries without validation or parameterization.
A buffer overflow in ChaosPro 2.0's configuration file handling allows attackers to gain remote code execution on Windows XP systems by overwriting the Structured Exception Handler (SEH).
InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A critical Remote Code Execution (RCE) vulnerability exists in InvoicePlane 1.7.0 through a chained Local File Inclusion (LFI) and Log Poisoning attack. An authenticated administrator can execute arbitrary system commands on the server by manipulating the `public_invoice_template` setting to include poisoned log files containing PHP code. Version 1.7.1 patches the issue.
CodeAstro Membership Management System 1.0 contains a missing authentication vulnerability in delete_members.php that allows unauthenticated attackers to delete arbitrary member records via the id parameter.
ZoneMinder is vulnerable to remote command injection because user-supplied input is passed unsanitized to the exec() function in the image.php view.
The NLTK downloader lacks path validation in its unzip function, allowing attackers to execute arbitrary code via malicious zip packages that overwrite Python files during extraction.
A buffer overflow in the Ayukov NFTP client's SYST command handling allows remote attackers to execute arbitrary code on the client machine via a crafted server response.
A stack-based buffer overflow in the license handling fields of this video converter allows attackers to execute arbitrary code via a 6000-byte malicious payload.
Aida64 Engineer contains a buffer overflow in its CSV logging configuration that allows attackers to execute arbitrary code via a malformed log file using SEH overwrite techniques.
A buffer overflow in the POP3 USER command handling in MailCarrier 2.51 allows remote attackers to execute arbitrary code by sending an oversized buffer to the service.
Graylog Web Interface 2.2.3 fails to invalidate old session identifiers upon new logins, allowing attackers with a leaked sessionId to maintain unauthorized persistent access to the account.
Insecure default credentials in the Telnet service of UTT HiPER routers allow remote attackers to gain root access via automated scripts.
A command injection vulnerability in the SECCN Dingcheng G10 login script allows unauthenticated remote attackers to execute OS commands via the User argument.
Missing authentication in administrative scripts of the Online Time Table Generator allows unauthenticated attackers to perform unauthorized data operations via direct HTTP requests.
The Advanced AJAX Product Filters plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3
Heap buffer overflow in Media in Google Chrome prior to 145
Integer overflow in V8 in Google Chrome prior to 145
The ShopLentor β WooCommerce Builder for Elementor & Gutenberg +21 Modules β All in One Solution plugin for WordPress is vulnerable to Email Relay Abuse in all versions up to, and including, 3
The WPNakama β Team and multi-Client Collaboration, Editorial and Project Management plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the '/wp-json/WPNakama/v1/boards' REST API endpoint in all versions up to, and including, 0
A security flaw has been identified in Softland FBackup up to version 9 that could allow for unauthorized access or data manipulation.
The Cart All In One For WooCommerce plugin for WordPress is vulnerable to Code Injection in all versions up to, and including, 1
The Product Addons for Woocommerce β Product Options with Custom Fields plugin for WordPress is vulnerable to Code Injection in all versions up to, and including, 3
IBM Db2 version 11 for Linux, UNIX, and Windows is affected by a security vulnerability that could lead to unauthorized system access.
NetApp StorageGRID versions prior to 11 contain a security vulnerability that could impact the integrity of object storage environments.
The Business Directory Plugin β Easy Listing Directories for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the 'payment' parameter in all versions up to, and including, 6
phpgurukul Student Management System 1
Improper authentication within Microsoft Windows Admin Center enables an authorized attacker to escalate privileges via network access. This flaw facilitates unauthorized administrative control.
PHPGurukul Hospital Management System v4
code-projects Scholars Tracking System 1
The Video Conferencing with Zoom WordPress plugin before 4
ScadaApp for iOS 1
Use After Free vulnerability in Apache Arrow C++
The RSS Aggregator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'template' parameter in all versions up to, and including, 5
The Rent Fetch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'keyword' parameter in all versions up to, and including, 0
Missing authentication in /admin/student
Missing authentication and authorization in print_membership_card
MajorDoMo (aka Major Domestic Module) contains a stored cross-site scripting (XSS) vulnerability through method parameter injection into the shoutbox
NVIDIA NeMo Framework contains a vulnerability where malicious data could cause remote code execution
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by loading a maliciously crafted file
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution in distributed environments
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution
NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by convincing a user to load a maliciously crafted file
Jenkins 2
Rack is a modular Ruby web server interface
A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking ClearPass OnGuard Software for Linux
MajorDoMo (aka Major Domestic Module) contains a stored cross-site scripting (XSS) vulnerability via the /objects/?op=set endpoint, which is intentionally unauthenticated for IoT device integration
An authentication bypass vulnerability in the application's API allows unauthenticated attackers to create unauthorized administrative accounts, leading to full system compromise.
Unrestricted file uploads in IBM DataStage on Cloud Pak for Data allow authenticated users to execute arbitrary commands and access sensitive information.
A Command Injection vulnerability exists where an authenticated, remote attacker could execute arbitrary code on the underlying server where Tenable Security Center is hosted
A high-severity security vulnerability has been identified in IBM DataStage on Cloud Pak for Data 5, potentially allowing unauthorized access or system compromise.
Saturn Remote Mouse Server contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by sending specially crafted UDP JSON frames to port 27000
NVIDIA NeMo Framework contains a vulnerability where malicious data created by an attacker could cause code injection
NVIDIA Megatron Bridge contains a vulnerability in a data merging tutorial, where malicious input could cause a code injection
NVIDIA Megatron Bridge contains a vulnerability in a data shuffling tutorial, where malicious input could cause a code injection
NVIDIA NeMo Framework for all platforms contains a vulnerability in the ASR Evaluator utility, where a user could cause a command injection by supplying crafted input to a configuration parameter
NVIDIA NeMo Framework for all platforms contains a vulnerability in a voice-preprocessing script, where malicious input created by an attacker could cause a code injection
The Linux Kernel lockdown mode for kernel versions starting on 6
A security vulnerability in IBM Concert 1 could allow for unauthorized actions or data exposure, impacting the overall security posture of the application.
Notepad++ is a free and open-source source code editor
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tumeva Internet Technologies Software Information Advertising and Consulting Services Trade Ltd
A weakness has been identified in jishi node-sonos-http-api up to 3776f0ee2261c924c7b7204de121a38100a08ca7
MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in the commands module
A vulnerability has been found in Beetel 777VR1 up to 01
jizhicms 2
An issue in Datart v1
Centova Cast 3
Malwarebytes AdwCleaner before v
Control Center PRO 6
An issue was discovered in OpenStack Nova before 30
SD
Glory RBG-100 recycler systems using the ISPK-08 software component contain multiple system binaries with overly permissive file permissions
A vulnerabilityΒ has been identified in the OPC
A vulnerability has been identified in the UA
A vulnerabilityΒ has been identified in Rexroth IndraWorks
A vulnerabilityΒ has been identified in Rexroth IndraWorks
An arbitrary code execution vulnerability exists in the Code Stream directive functionality of OpenCFD OpenFOAM 2506
A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability
A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability
When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate
XMedia Recode 3
Crystal Live HTTP Server 6
Foscam Video Management System 1
iSmartViewPro 1
gSOAP 2
FileOptimizer 14
WMV to AVI MPEG DVD WMV Convertor 4
Bematech (formerly Logic Controls, now Elgin) MP-4200 TH printer contains a denial of service vulnerability in the admin configuration page
MajorDoMo (aka Major Domestic Module) allows unauthenticated arbitrary module uninstallation through the market module
A weakness has been identified in Huace Monitoring and Early Warning System 2
A security vulnerability has been detected in Sciyon Koyuan Thermoelectricity Heat Network Management System 3
A vulnerability was found in Rongzhitong Visual Integrated Command and Dispatch Platform up to 20260206
A vulnerability was determined in Tsinghua Unigroup Electronic Archives System up to 3
A flaw has been found in Wavlink WL-NU516U1 up to 20251208
A vulnerability was identified in Advantech WISE-6610 1