CVE-2025-40551
SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Today's curated brief highlights 22 critical vulnerabilities and 95 high-priority updates requiring immediate attention.
SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
Cisco Unified Communications Products Code Injection Vulnerability - Active in CISA KEV catalog.
Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability - Active in CISA KEV catalog.
Versa Concerto Improper Authentication Vulnerability - Active in CISA KEV catalog.
Vite Vitejs Improper Access Control Vulnerability - Active in CISA KEV catalog.
Prettier eslint-config-prettier Embedded Malicious Code Vulnerability - Active in CISA KEV catalog.
Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability - Active in CISA KEV catalog.
Linux Kernel Integer Overflow Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability - Active in CISA KEV catalog.
GNU InetUtils Argument Injection Vulnerability - Active in CISA KEV catalog.
Microsoft Office Security Feature Bypass Vulnerability - Active in CISA KEV catalog.
GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
Sangoma FreePBX OS Command Injection Vulnerability - Active in CISA KEV catalog.
Sangoma FreePBX Improper Authentication Vulnerability - Active in CISA KEV catalog.
Dokans SaaS platform allows unauthenticated attackers to download the `.env` file, exposing encryption keys, database credentials, and API keys, leading to total multi-tenant system compromise.
CraftCMS 3 vCard Plugin 1.0.0 contains a deserialization vulnerability that allows unauthenticated attackers to execute arbitrary PHP code through a crafted payload. Attackers can generate a malicious serialized payload that triggers remote code execution by exploiting the plugin's vCard download functionality with a specially crafted request.
School ERP Pro 1.0 contains a file upload vulnerability that allows students to upload arbitrary PHP files to the messaging system. Attackers can upload malicious PHP scripts through the message attachment feature, enabling remote code execution on the server.
An authenticated user with file editor permissions in CI4MS can achieve Remote Code Execution (RCE) by uploading and executing arbitrary PHP code via insecure file endpoints.
webTareas 2.0.p8 contains a file deletion vulnerability in the print_layout.php administration component that allows authenticated attackers to delete arbitrary files. Attackers can exploit the vulnerability by manipulating the 'atttmp1' parameter to specify and delete files on the server through an unauthenticated file deletion mechanism.
An unauthenticated file access vulnerability in webERP 4.15.1 allows remote attackers to download database backup files directly from the web directory.
A prototype pollution vulnerability in the Qwik City middleware's formToObj() function allows unauthenticated attackers to manipulate Object.prototype via crafted HTTP POST requests.
Konica Minolta FTP Utility 1.0 contains a buffer overflow vulnerability in the LIST command that allows attackers to overwrite system registers. Attackers can send an oversized buffer of 1500 'A' characters to crash the FTP server and potentially execute unauthorized code.
Konica Minolta FTP Utility 1.0 contains a buffer overflow vulnerability in the NLST command that allows attackers to overwrite system registers. Attackers can send an oversized buffer of 1500 'A' characters to crash the FTP server and potentially execute unauthorized code.
A buffer overflow vulnerability in CloudMe 1.11.2 allows unauthenticated remote attackers to execute arbitrary code by sending crafted packets to port 8888.
Remote Desktop Audit 2.3.0.157 is vulnerable to a buffer overflow during the file import process, allowing attackers to execute arbitrary code via a malicious payload file.
LanSend 3.2 contains a buffer overflow in its file import functionality, allowing remote attackers to execute arbitrary code through a crafted payload file that triggers an SEH overwrite.
Rapid7 InsightVM versions before 8.34.0 contain a signature verification flaw in the ACS endpoint. This allows unauthenticated attackers to bypass authentication and achieve full account takeover.
MOMA Seismic Station exposes its web management interface without authentication, allowing unauthenticated attackers to modify configurations, steal data, or reset the device remotely.
A critical SQL injection vulnerability in Fikir Odalari AdminPando allows unauthenticated attackers to bypass login and gain full administrative access, including DOM manipulation capabilities.
Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access point devices. A crafted packet may lead to arbitrary code execution.
The DIGITA Efficiency Management System is vulnerable to a critical SQL Injection flaw. An unauthenticated attacker can execute arbitrary SQL commands to manipulate or extract sensitive data.
StreamRipper32 version 2.6 contains a buffer overflow in the Station/Song Section. Attackers can provide a malicious SongPattern input to overwrite memory and execute arbitrary code.
GoldWave 5.70 is vulnerable to a stack-based buffer overflow in the File Open URL dialog. Attackers can use Unicode-encoded shellcode in a text file to execute commands upon opening.
Filetto 1.0 FTP server contains a denial of service (DoS) vulnerability in the FEAT command processing. Sending an oversized command causes a buffer overflow and service crash.
The Synectix LAN 232 TRIO serial to ethernet adapter exposes its web management interface without authentication, allowing unauthenticated users to modify settings or factory reset the device.
EspoCRM 5.8.5 contains an authentication vulnerability that allows attackers to access other user accounts by manipulating authorization headers. Attackers can decode and modify Basic Authorization and Espo-Authorization tokens to gain unauthorized access to administrative user information and privileges.
Heap buffer overflow in libvpx in Google Chrome prior to 144
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Talemy Spirit Framework allows PHP Local File Inclusion
Type Confusion in V8 in Google Chrome prior to 144
PhpIX 2012 Professional contains a SQL injection vulnerability in the 'id' parameter of product_detail
The Infility Global plugin for WordPress is vulnerable to unauthenticated SQL Injection via the 'infility_get_data' API action in all versions up to, and including, 2
PHP AddressBook 9
During the installation of the Native Access application, a privileged helper tool contains a vulnerability that could lead to unauthorized privilege escalation.
The OS DataHub Maps plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'OS_DataHub_Maps_Admin::add_file_and_ext' function in all versions up to, and including, 1
The WP FOFT Loader plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'WP_FOFT_Loader_Mimes::file_and_ext' function in all versions up to, and including, 2
jsPDF is a library to generate PDFs in JavaScript
The Tutor LMS β eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object References (IDOR) in all versions up to, and including, 3
A vulnerability in the OpenClaw (formerly Clawdbot) personal AI assistant could allow an attacker to compromise the host device or access private data.
GUnet OpenEclass 1
GUnet OpenEclass 1
An arbitrary file upload vulnerability in the AddFont() function of FPDF v1
Victor CMS 1
A security issue was discovered in ingress-nginxΒ where the `nginx
A security issue was discovered in ingress-nginx cthe `rules
AnyDesk 5
The SEO Flow by LupsOnline plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the checkBlogAuthentication() and checkCategoryAuthentication() functions in all versions up to, and including, 2
60CycleCMS 2
OXID eShop versions 6
Victor CMS version 1
The LatePoint β Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the customer profile fields in all versions up to, and including, 5
The Form Maker by 10Web plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1
The Form Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via hidden field values in all versions up to, and including, 1
PMB 5
Fishing Reservation System 7
School ERP Pro 1
An unauthenticated remote attacker is able to use an existing session id of a logged in user and gain full access to the device if configuration via ethernet is enabled
The Amazon SageMaker Python SDK before v3
NVIDIA Megatron-LM for all platforms contains a vulnerability in a script, where malicious data created by an attacker may cause a code injection issue
A security vulnerability in IBM WebSphere Application Server Liberty 17 could allow for unauthorized actions. Users should consult vendor advisories for specific technical impact and patch details.
Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection
Memory Corruption when user space address is modified and passed to mem_free API, causing kernel memory to be freed inadvertently
Memory Corruption when multiple threads simultaneously access a memory free API
VPN Unlimited 6
Multiple products by AKCE Software are vulnerable to SQL Injection due to improper neutralization of special elements, which could allow an attacker to execute unauthorized database commands.
IBM Business Automation Workflow containers V25 is subject to a high-severity vulnerability that could allow for unauthorized actions or data access within the containerized environment.
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows Blind SQL Injection
An unauthenticated remote attacker can disrupt system operations by switching between configuration presets via HTTP, leading to unauthorized state changes and operational instability.
An unauthenticated remote attacker can disrupt industrial operations by unauthorized switching of configuration presets via the Modbus (TCP) protocol.
OpenTelemetry-Go, the Go implementation of the OpenTelemetry framework, contains a security vulnerability that may compromise telemetry data integrity or processing within affected applications.
A security vulnerability in the OpenList Frontend UI component could allow for unauthorized actions or data exposure within the OpenList application.
i-doit Open Source CMDB 1
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Karel Electronics Industry and Trade Inc
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system
A flaw was found in the libsoup HTTP library that could lead to a denial of service or potential code execution when processing malicious HTTP requests.
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ankara Hosting Website Design Website Software allows Reflected XSS
A vulnerability in the `lollms_generation_events
School ERP Pro 1
A security vulnerability in the OpenList Frontend UI component could lead to unauthorized access or manipulation of the OpenList application environment.
A flaw was found in Moodle
A weakness has been identified in Ziroom ZHOME A0101 1
A vulnerability in the FacturaScripts ERP and accounting software could allow an attacker to compromise sensitive financial data or take control of the application.
It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature
Unchecked IOMMU mapping errors during GPU memory mapping using scatter-gather lists lead to a memory corruption vulnerability.
Improper handling of memory pointers during the deallocation of GPU memory buffers results in a memory corruption vulnerability.
A memory corruption vulnerability exists in sensor property settings updates due to invalid input parameters in IOCTL calls.
The installer for Roland Cloud Manager contains a vulnerability that could allow for unauthorized system modifications or privilege escalation during installation.
Disk Sorter Enterprise 12
Disk Savvy Enterprise 12
Sync Breeze Enterprise 12
Adaware Web Companion 4
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles
A local attacker can cause a full device reset and password bypass by using an invalid reset file via a USB connection.
A Cross-Site Scripting (XSS) vulnerability exists in AKCE Software Technology R&D Industry and Trade Inc products due to improper neutralization of input during web page generation.
Kod8 Software Technologies products contain a Cross-Site Scripting (XSS) vulnerability caused by the failure to properly neutralize input during web page generation.
Seres Software syWEB is vulnerable to Reflected Cross-Site Scripting (XSS) due to improper input neutralization during web page generation.
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ofisimo Web-Based Software Technologies Association Web Package Flora allows XSS Through HTTP Headers
A vulnerability was identified in lunary-ai/lunary version 1. The flaw could allow for unauthorized actions or data access depending on the specific implementation of the platform.
A vulnerability in Hugging Face Text Generation Inference (TGI) version 3 could allow for unauthorized exploitation of the inference engine.
An exposure of sensitive information to an unauthorized actor exists in AKCE Software. This flaw allows attackers to access data that should be protected.
A flaw was found in Moodle
An issue was discovered in 6
An issue was discovered in 6
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system
Blesta 3
VirtualTablet Server 3
Netis E1+ version 1
Netis E1+ 1
Edimax EW-7438RPn 1
Fastify is a fast and low overhead web framework, for Node
A flaw was found in Moodle
A flaw was found in moodle
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system
A security flaw has been discovered in Ziroom ZHOME A0101 1
An OS command injection vulnerability exists in Elecom WRC-X1500GS-B and WRC-X1500GSA-B routers, allowing for arbitrary command execution.
Blesta 3
Victor CMS 1
A cryptographic issue occurs when a Trusted Zone with outdated code is triggered by a High-Level Operating System (HLOS) providing incorrect input.
GUnet OpenEclass 1
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles
A vulnerability in MLflow version 2 could lead to unauthorized access or data manipulation within the machine learning lifecycle platform.