CVE-2012-1854
Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Friday's vulnerability landscape is dominated by critical flaws affecting Microsoft Bing, Microsoft Entra ID, and HP enterprise products, with two CVSS 10.0 issues requiring immediate attention. The day brought 37 critical CVEs (up 147% from yesterday) and 91 high-priority CVEs (down 9% from yesterday). Notable disclosures include CVE-2026-33819 affecting Microsoft Bing, CVE-2026-35431 in Microsoft Entra ID, and CVE-2026-41228 enabling code execution in HP products. Remote code execution and authentication bypass patterns dominate today's disclosures, with WordPress, Google Chrome, and Microsoft Dynamics also affected. No patches are currently available for these disclosures, requiring defensive monitoring and compensating controls until vendor fixes ship.
Immediate action: Security teams should prioritize Microsoft Bing, Entra ID, and HP enterprise systems for immediate review, alongside WordPress and Google Chrome deployments exposed to the internet. With 0% patch availability for today's critical disclosures, implement network segmentation, enhanced monitoring, and access restrictions on affected systems while tracking vendor advisories for forthcoming fixes.
Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Link Following Vulnerability - Active in CISA KEV catalog.
Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Out-of-Bounds Read Vulnerability - Active in CISA KEV catalog.
Adobe Acrobat Use-After-Free Vulnerability - Active in CISA KEV catalog.
Adobe Acrobat Reader is vulnerable to prototype pollution, which can result in arbitrary code execution when a victim opens a malicious file.
Microsoft Office Remote Code Execution - Active in CISA KEV catalog.
Microsoft SharePoint Server Improper Input Validation Vulnerability - Active in CISA KEV catalog.
Apache ActiveMQ Improper Input Validation Vulnerability - Active in CISA KEV catalog.
Kentico Xperience Path Traversal Vulnerability - Active in CISA KEV catalog.
PaperCut NG/MF Improper Authentication Vulnerability - Active in CISA KEV catalog.
Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability - Active in CISA KEV catalog.
JetBrains TeamCity Relative Path Traversal Vulnerability - Active in CISA KEV catalog.
Microsoft Defender Insufficient Granularity of Access Control Vulnerability - Active in CISA KEV catalog.
Marimo Remote Code Execution Vulnerability - Active in CISA KEV catalog.
A path traversal flaw in the Froxlor API allows authenticated customers to execute arbitrary PHP code via the `def_language` parameter.
An injection vulnerability in Froxlor's `PhpHelper` allows administrators to inject and execute arbitrary PHP code via unescaped string literals.
An out-of-bounds read vulnerability in the Google Chrome GPU process on Android allows a remote attacker to achieve sandbox escape via a crafted HTML page.
A deserialization vulnerability in Microsoft Bing allows an unauthorized remote attacker to execute arbitrary code via the network.
The Breeze Cache plugin for WordPress is vulnerable to unauthenticated arbitrary file uploads via the Gravatar fetching function.
Borg SPM 2007 (Sales Ended in 2008)Β developed by BorG Technology Corporation has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
SocialEngine versions 7.8.0 and prior contain a SQL injection vulnerability in the /activity/index/get-memberall endpoint where user-supplied input passed via the text parameter is not sanitized before being incorporated into a SQL query. An unauthenticated remote attacker can exploit this vulnerability to read arbitrary data from the database, reset administrator account passwords, and gain unauthorized access to the Packages Manager in the Admin Panel, potentially enabling remote code execution.
A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Entra ID Entitlement Management allows unauthorized attackers to perform spoofing over a network.
Improper access control in Microsoft Partner Center allows an authorized attacker to elevate privileges over a network.
A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Dynamics 365 (Online) allows an unauthorized attacker to perform spoofing over a network.
A Cross-Site Scripting (XSS) vulnerability in the Hackage server allows an attacker to hijack user sessions by serving malicious JavaScript via uploaded documentation or source packages.
A deserialization vulnerability in the `LivekitFrameSerializer` class of the Pipecat framework allows remote attackers to execute arbitrary code via malicious pickle payloads.
KTransformers through 0.5.3 contains an unsafe deserialization vulnerability in the balance_serve backend mode where the scheduler RPC server binds a ZMQ ROUTER socket to all interfaces with no authentication and deserializes incoming messages using pickle.loads() without validation. Attackers can send a crafted pickle payload to the exposed ZMQ socket to execute arbitrary code on the server with the privileges of the ktransformers process.
Delta Electronics AS320T has incorrect calculation of the buffer size on the stack in the GET/PUT request handler of the web service.
An unauthenticated remote code execution vulnerability exists in Paperclip due to improper handling of API calls in default configurations.
Borg SPM 2007 (Sales Ended in 2008)Β developed by BorG Technology Corporation has a Authentication Bypass vulnerability, allowing unauthenticated remote attackers to log into the system as any user.
Kofax Capture, now referred to as Tungsten Capture, version 6.0.0.0 (other versions may be affected) exposes a deprecated .NET Remoting HTTP channel on port 2424 via the Ascent Capture Service that is accessible without authentication and uses a default, publicly known endpoint identifier. An unauthenticated remote attacker can exploit .NET Remoting object unmarshalling techniques to instantiate a remote System.Net.WebClient object and read arbitrary files from the server filesystem, write attacker-controlled files to the server, or coerce NTLMv2 authentication to an attacker-controlled host, enabling sensitive credential disclosure, denial of service, remote code execution, or lateral movement depending on service account privileges and network environment.
An OS command injection vulnerability in radare2-mcp allows unauthenticated remote attackers to execute arbitrary commands via the JSON-RPC interface.
Delta Electronics AS320T has No checking of the length of the buffer with the file name vulnerability.
Delta Electronics AS320T has no checking of the length of the buffer with the directory name vulnerability.
Delta Electronics AS320T has denial of service via the undocumented subfunctionΒ vulnerability.
Improper Control of Generation of Code ('Code Injection') vulnerability in Funnelforms LLC FunnelFormsPro allows Remote Code Inclusion.This issue affects FunnelFormsPro: from n/a through 3.8.1.
Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
A vulnerability in the `parseActions` function of ntfy.sh allows remote attackers to execute arbitrary code.
A vulnerability inΒ SenseLiveΒ X3050βs remote management service allows firmware retrieval and update operations to be performed without authentication or authorization. The service accepts firmware-related requests from any reachable host and does not verify user privileges, integrity of uploaded images, or the authenticity of provided firmware.
A vulnerability in the SenseLive X3050 web management interface allows unauthorized modification of configuration parameters, leading to a persistent Denial-of-Service (DoS).
A NoSQL injection vulnerability in Rocket.Chat allows unauthenticated attackers to perform account takeovers of the first user when a specific OAuth configuration is present.
The hackage-server application fails to sanitize user-controlled metadata from .cabal files, leading to a stored Cross-Site Scripting (XSS) vulnerability.
The ToToLink A3300R firmware contains a command injection vulnerability in the stunEnable parameter, allowing unauthenticated remote code execution.
The ToToLink A3300R firmware contains a command injection vulnerability in the stunMinAlive parameter, allowing unauthenticated remote code execution.
The ToToLink A3300R firmware contains a command injection vulnerability in the stunMaxAlive parameter, allowing unauthenticated remote code execution.
An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stunServerAddr parameter to /cgi-bin/cstecgi.cgi.
A vulnerability inΒ SenseLive X3050βs web management interface allows authentication logic to be performed entirely on the client side, relying on hardcoded values within browser-executed scripts rather than server-side verification. An attacker with access to the login page could retrieve these exposed parameters and gain unauthorized access to administrative functionality.
A vulnerability inΒ SenseLiveΒ X3050βs embedded management service allows full administrative control to be established without any form of authentication or authorization on the SenseLive config application. The service accepts management connections from any reachable host, enabling unrestricted modification of critical configuration parameters, operational modes, and device state through a vendor-supplied or compatible client.
A vulnerability inΒ SenseLive X3050βs web management interface allows unauthorized access to certain configuration endpoints due to improper access control enforcement. An attacker with network access to the device may be able to bypass the intended authentication mechanism and directly interact with sensitive configuration functions.
hackage-server lacked Cross-Site Request Forgery (CSRF) protection across its endpoints. Scripts on foreign sites could trigger requests to hackage server, possibly abusing latent credentials to upload packages or perform other administrative actions. Some unauthenticated actions could also be abused (e.g. creating new user accounts).
Url redirection to untrusted site ('open redirect') in M365 Copilot allows an unauthorized attacker to elevate privileges over a network.
OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology
Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized attacker to elevate privileges over a network
Race in GPU in Google Chrome on Windows prior to 147
The HTTP Headers plugin for WordPress is vulnerable to External Control of File Name or Path leading to Remote Code Execution in all versions up to and including 1
The Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to, and including, 1
Uncontrolled search path element in Microsoft Power Apps allows an unauthorized attacker to execute code over a network
Xibo is an open source digital signage platform with a web content management system and Windows display player software
Contour is a Kubernetes ingress controller using Envoy proxy
Open Source Social Network (OSSN) is open-source social networking software developed in PHP
Kyverno is a policy engine designed for cloud native platform engineering teams
A vulnerability exists in the chroot utility of uutils coreutils when using the --userspec option
The installers of LiveOn Meet Client for Windows (Downloader5Installer
Kyverno is a policy engine designed for cloud native platform engineering teams
Kyverno is a policy engine designed for cloud native platform engineering teams
Xerte Online Toolkits versions 3
A path Traversal vulnerability exists in Ziostation2 v2
A vulnerability in the chmod utility of uutils coreutils allows users to bypass the --preserve-root safety mechanism
The ExactMetrics β Google Analytics Dashboard for WordPress (Website Stats Plugin) plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation in all versions up to, and including, 9
Dell PowerProtect Data Domain with Domain Operating System (DD OS) of Feature Release versions 7
A vulnerability in uutils coreutils mkfifo allows for the unauthorized modification of permissions on existing files
A Time-of-Check to Time-of-Use (TOCTOU) race condition exists in the mkfifo utility of uutils coreutils
Xerte Online Toolkits versions 3
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes
ERB is a templating system for Ruby
pretalx is a conference planning tool
An issue was discovered in guardsix (formerly Logpoint) ODBC Enrichment Plugins before 5
A client can trigger a divide by zero error leading to crash by sending a crafted DNSCrypt query
An attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiring manual operation to fix it
PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18
IBM WebSphere Application Server - Liberty 17
DWM-222W USB Wi-Fi Adapter developed by D-Link has a Brute-Force Protection Bypass vulnerability, allowing unauthenticated adjacent network attackers to bypass login attempt limits to perform brute-force attacks to gain control over the device
IBM Total Storage Service Console (TSSC) / TS4500 IMC 9
IP Setting Software contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries
OpenRemote is an open-source internet-of-things platform
Flowise is a drag & drop user interface to build a customized large language model flow
OpenClaw before 2026
The LabOne Web Server, backing the LabOne User Interface, contains insufficient input validation in its file access functionality
OpenRemote is an open-source internet-of-things platform
A flaw was found in InstructLab
Paperclip is a Node
OpenClaw before 2026
OpenClaw before 2026
Actual is a local-first personal finance tool
Beghelli Sicuro24 SicuroWeb embeds AngularJS 1
WeKan beforeΒ 8
Froxlor is open source server administration software
SocialEngine versions 7
Terminal Services Manager 3
MAGIX Music Editor 3
Iperius Backup 5
LanSpy 2
LanSpy 2
RustFS is a distributed object storage system built in Rust
WeKan beforeΒ 8
Flowise is a drag & drop user interface to build a customized large language model flow
Statamic is a Laravel and Git powered content management system (CMS)
Flowise is a drag & drop user interface to build a customized large language model flow
OpenClaw before 2026
A vulnerability inΒ SenseLiveΒ X3050's web management interface allows state-changing operations to be triggered without proper Cross-Site Request Forgery (CSRF) protections
A vulnerability exists inΒ SenseLive X3050βs web management interface in which password updates are not reliably applied due to improper handling of credential changes on the backend
A vulnerability inΒ SenseLiveΒ X3050's web management interface allows critical system and network configuration parameters to be modified without sufficient validation and safety controls
A flaw was found in binutils
radare2 prior to 6
A flaw was found in the X
A flaw was found in the X
A flaw was found in the X
OpenClaw before 2026
Flowise is a drag & drop user interface to build a customized large language model flow
A flaw was found in camel-infinispan
Nimiq's network-libp2p is a Nimiq network implementation based on libp2p
nimiq-primitives contains primitives (e
PsiTransfer is an open source, self-hosted file sharing solution
Froxlor is open source server administration software
GROWI provided by GROWI, Inc
CryptX versions before 0
A vulnerability inΒ SenseLiveΒ X3050βs management ecosystem allows unauthenticated discovery of deployed units through the vendorβs management protocol, enabling identification of device presence, identifiers, and management interfaces without requiring credentials
basic-ftp is an FTP client for Node
Yadea T5 Electric Bicycles (models manufactured in/after 2024) have a weak authentication mechanism in their keyless entry system
OpenClaw before 2026
OpenShell before 2026
EspoCRM is an open source customer relationship management application
A flaw was found in InstructLab
Flowise is a drag & drop user interface to build a customized large language model flow
Flowise is a drag & drop user interface to build a customized large language model flow
Flowise is a drag & drop user interface to build a customized large language model flow
radare2 prior to 6
OpenClaw before 2026
OpenClaw before 2026