CVE-2021-22054
Omnissa Workspace ONE Server-Side Request Forgery - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Tuesday's vulnerability disclosures reveal 24 critical-severity CVEs predominantly affecting D-Link DIR routers, ZKTeco ZKBioSecurity access control systems, and HP products. Critical CVEs jumped from 0 to 24 compared to the prior day, while high-priority vulnerabilities rose 135% to 94. Notable critical entries include CVE-2026-32621 (CVSS 9.9) in Arch Federation, four D-Link DIR router vulnerabilities (CVE-2026-4181 through 4184, all CVSS 9.8), and CVE-2025-62319 (CVSS 9.8) affecting multiple vendors. Attack patterns center on remote code execution and authentication bypass across network infrastructure and physical security systems, with 13 vulnerabilities confirmed under active exploitation including Ivanti EPM, VMware Aria Operations, and Google Chrome components. No patches are currently available for disclosed vulnerabilities, requiring organizations to prioritize compensating controls and network segmentation.
Immediate action: Prioritize network segmentation for exposed D-Link DIR routers, ZKTeco ZKBioSecurity deployments, and Ivanti Endpoint Manager instances given active exploitation and lack of available patches. Review exposure to Google Chrome (CVE-2026-3910, CVE-2026-3909) and VMware Aria Operations (CVE-2026-22719) as these carry confirmed exploitation activity โ apply compensating controls and monitor vendor advisories for forthcoming patches.
Omnissa Workspace ONE Server-Side Request Forgery - Active in CISA KEV catalog.
Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability - Active in CISA KEV catalog.
VMware Aria Operations contains a command injection vulnerability that could allow an attacker to execute arbitrary commands on the affected system.
A memory corruption vulnerability exists in memory allocation processes when handling specific alignments, potentially leading to arbitrary code execution or system instability.
n8n Improper Control of Dynamically-Managed Code Resources Vulnerability - Active in CISA KEV catalog.
Hikvision Multiple Products Improper Authentication Vulnerability - Active in CISA KEV catalog.
Rockwell Multiple Products Insufficient Protected Credentials Vulnerability - Active in CISA KEV catalog.
Apple Multiple products Use-After-Free Vulnerability - Active in CISA KEV catalog.
Apple Multiple Products Integer Overflow or Wraparound Vulnerability - Active in CISA KEV catalog.
Apple iOS and iPadOS Use-After-Free Vulnerability - Active in CISA KEV catalog.
Google Chrome versions prior to 146 feature an inappropriate implementation in the V8 JavaScript engine that is currently being exploited in the wild to achieve code execution.
Google Chrome versions prior to 146 contain an out-of-bounds write vulnerability in the Skia graphics engine, which is currently being exploited in the wild.
Wing FTP Server Information Disclosure Vulnerability - Active in CISA KEV catalog.
ZKTeco ZKBioSecurity 3.0 uses hardcoded credentials in its bundled Apache Tomcat server, allowing unauthenticated attackers to execute arbitrary code with SYSTEM privileges.
A weakness has been identified in Topsec TopACM 3.0. Affected by this vulnerability is an unknown functionality of the file /view/systemConfig/management/nmc_sync.php of the component HTTP Request Handler. Executing a manipulation of the argument template_path can lead to os command injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
A prototype pollution vulnerability in Apollo Federation's query plan execution allows attackers to pollute Object.prototype, potentially leading to remote code execution or denial of service.
A Boolean-based SQL injection vulnerability allows unauthenticated attackers to manipulate backend configuration queries by injecting malicious SQL conditions into application input fields.
ZKTeco ZKBioSecurity 3.0 contains a user enumeration vulnerability in the authLoginAction!login.do script, allowing unauthenticated attackers to discover valid usernames.
Fields is a GLPI plugin that allows users to add custom fields on GLPI items forms. Prior to version 1.23.3, it is possible to execute arbitrary PHP code from users that are allowed to create dropdowns. This issue has been patched in version 1.23.3.
A security flaw has been discovered in D-Link DIR-816 1.10CNB05. This affects an unknown function of the file /goform/form2RepeaterStep2.cgi of the component goahead. The manipulation of the argument key1/key2/key3/key4/pskValue results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unknown function of the file /goform/form2Wl5RepeaterStep2.cgi of the component goahead. This manipulation of the argument key1/key2/key3/key4/pskValue causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the argument pskValue leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
A vulnerability was detected in D-Link DIR-816 1.10CNB05. Affected by this vulnerability is an unknown functionality of the file /goform/form2Wl5BasicSetup.cgi of the component goahead. Performing a manipulation of the argument pskValue results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
A weakness has been identified in Tenda AC8 up to 16.03.50.11. This vulnerability affects the function doSystemCmd of the file /goform/SysToolChangePwd of the component HTTP Endpoint. This manipulation of the argument local_2c causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.
A vulnerability was identified in Tenda AC8 16.03.50.11. Affected by this issue is the function check_is_ipv6 of the component IPv6 Handler. The manipulation leads to reliance on ip address for authentication. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
A JWK Header Injection vulnerability in Authlib's JWS implementation allows unauthenticated attackers to forge arbitrary JWT tokens by embedding a malicious public key in the header.
An unauthenticated arbitrary file upload vulnerability in the Telesquare SDT-CS3B1 router allows attackers to execute remote code or delete files by exploiting enabled WebDAV HTTP methods.
A command injection vulnerability in the executeClaudeCode method of claude-hovercraft allows unauthenticated remote attackers to execute arbitrary code.
A Streaming Phase XSS in AnythingLLM Desktop's chat pipeline escalates to Remote Code Execution (RCE) on the host OS due to insecure Electron configurations and lack of sanitization.
An Insecure Direct Object Reference (IDOR) vulnerability in Telesquare SDT-CS3B1 routers allows attackers to bypass authorization and access sensitive resources by manipulating input parameters.
A command injection vulnerability in the SetName/GuestWifi function of Wavlink WL-WN579A3 firmware allows remote attackers to execute arbitrary commands via POST requests.
Wavlink WL-WN578W2 firmware contains a command injection vulnerability in the Delete_Mac_list/SetName/GuestWifi functions, enabling remote attackers to execute arbitrary commands.
A missing authentication vulnerability in DrangSoft GCB/FCB Audit Software allows unauthenticated remote attackers to create unauthorized administrative accounts via exposed APIs.
ZKTeco ZKTime.Net 3.0.1.6 contains insecure file permissions that allow unprivileged users to escalate privileges by replacing executable files with malicious binaries.
Raytha CMS lacks brute force protection, allowing unauthenticated attackers to perform unlimited automated login attempts without triggering lockouts or throttling.
A write-what-where condition in p2r3 Bareiron allows unauthenticated attackers to execute arbitrary code by sending a crafted packet that writes arbitrary values to memory.
An out-of-bounds memory access (OOB) in p2r3 Bareiron commit 8e4d40 allows unauthenticated attackers to access sensitive information and cause a Denial of Service (DoS) via supplying a crafted packet.
The WowStore โ Store Builder & Product Blocks for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the โsearchโ parameter in all versions up to, and including, 4
Unraid Update Request Path Traversal Remote Code Execution Vulnerability
xmlseclibs is a library written in PHP for working with XML Encryption and Signatures
All versions of the package sjcl are vulnerable to Improper Verification of Cryptographic Signature due to missing point-on-curve validation in sjcl
SQL Injection vulnerability in Chyrp v
Chamilo LMS is a learning management system
Unraid Authentication Request Path Traversal Authentication Bypass Vulnerability
The NEX-Forms โ Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 9
A missing S3 ownership verification in the Bedrock AgentCore Starter Toolkit before version v0
A flaw has been found in vanna-ai vanna up to 2
Next Click Ventures RealtyScript 4
Dell ThinOS 10 versions prior to ThinOS 2602_10
Next Click Ventures RealtyScript 4
Next Click Ventures RealtyScript 4
Philips Hue Bridge HomeKit Pair-Setup Heap-based Buffer Overflow Remote Code Execution Vulnerability
Philips Hue Bridge HomeKit hk_hap_pair_storage_put Heap-based Buffer Overflow Remote Code Execution Vulnerability
A weakness has been identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205
A security vulnerability has been detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205
A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205
A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205
Philips Hue Bridge Zigbee Stack Custom Command Handler Heap-based Buffer Overflow Remote Code Execution Vulnerability
Philips Hue Bridge hap_pair_verify_handler Sub-TLV Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Philips Hue Bridge hk_hap characteristics Heap-based Buffer Overflow Remote Code Execution Vulnerability
AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting
A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205
A vulnerability was identified in itsourcecode Payroll Management System 1
A weakness has been identified in itsourcecode Online Enrollment System 1
A flaw has been found in itsourcecode Free Hotel Reservation System 1
GStreamer rtpqdm2depay Out-Of-Bounds Write Remote Code Execution Vulnerability
GStreamer rtpqdm2depay Heap-based Buffer Overflow Remote Code Execution Vulnerability
Philips Hue Bridge HomeKit Accessory Protocol Transient Pairing Mode Authentication Bypass Vulnerability
Philips Hue Bridge HomeKit Accessory Protocol Static Nonce Authentication Bypass Vulnerability
A security flaw has been discovered in D-Link DIR-619L 2
GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerability
GStreamer RIFF Palette Integer Overflow Remote Code Execution Vulnerability
GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote Code Execution Vulnerability
GStreamer DVB Subtitles Out-Of-Bounds Write Remote Code Execution Vulnerability
GStreamer JPEG Parser Heap-based Buffer Overflow Remote Code Execution Vulnerability
GROWI OpenAI thread/message API endpoints do not perform authorization
Serviio PRO 1
A vulnerability was identified in D-Link DIR-816 1
A security vulnerability has been detected in D-Link DIR-823G 1
Telesquare SKT LTE Router SDT-CS3B1 software version 1
A vulnerability was detected in JawherKl node-api-postgres up to 2
A flaw has been found in JawherKl node-api-postgres up to 2
ZKTeco ZKAccess Professional 3
Wowza Streaming Engine 4
Raytha CMS allows an attacker to spoof `X-Forwarded-Host` or `Host` headers to attacker controlled domain
arduino-TuyaOpen before version 1
A vulnerability was determined in Belkin F9K1122 1
A weakness has been identified in LB-LINK BL-WR9000 2
A security vulnerability has been detected in LB-LINK BL-WR9000 2
A local, non-privileged attacker can abuse a vulnerable IOCTL interface exposed by the OpenEDR 2
Chamilo LMS is a learning management system
cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library
arduino-TuyaOpen before version 1
A flaw was found in libucl
Next Click Ventures RealtyScript 4
xml-security is a library that implements XML signatures and encryption
Pigeon is a message board/notepad/social system/blog
Runtipi is a personal homeserver orchestrator
Wowza Streaming Engine 4
PX4 autopilot is a flight control solution for drones
GStreamer H
GStreamer H
GStreamer H
A Code Injection vulnerability affecting SOLIDWORKS Desktop from Release 2025 through Release 2026 could allow an attacker to execute arbitrary code on the user's machine while opening a specially crafted file
arduino-TuyaOpen before version 1
Mattermost Plugins versions <=2
Qool CMS contains multiple persistent cross-site scripting vulnerabilities in several administrative scripts where POST parameters are not properly sanitized before being stored and returned to users
Serviio PRO 1
Serviio PRO 1
A command injection vulnerability exists in mlflow/mlflow versions before v3
Mattermost versions 11
IceWarp collaboration Directory Traversal Information Disclosure Vulnerability
Go ShangMi (Commercial Cryptography) Library (GMSM) is a cryptographic library that covers the Chinese commercial cryptographic public algorithms SM2/SM3/SM4/SM9/ZUC
libexif through 0
A security flaw has been discovered in glowxq glowxq-oj up to 6f7c723090472057252040fd2bbbdaa1b5ed2393
A weakness has been identified in glowxq glowxq-oj up to 6f7c723090472057252040fd2bbbdaa1b5ed2393
A vulnerability has been found in Technologies Integrated Management Platform 7
A vulnerability was found in Tiandy Easy7 Integrated Management Platform 7
A vulnerability was found in vanna-ai vanna up to 2
A vulnerability was determined in Tiandy Integrated Management Platform 7
A security vulnerability has been detected in itsourcecode Online Enrollment System 1
A security flaw has been discovered in Tiandy Easy7 Integrated Management Platform 7
A weakness has been identified in Tiandy Easy7 Integrated Management Platform 7
A security vulnerability has been detected in Tiandy Easy7 Integrated Management Platform up to 7
ZKTeco ZKAccess Security System 5
OpenLiteSpeed and LSWS Enterprise provided by LiteSpeed Technologies contain an OS command injection vulnerability
A vulnerability was detected in TRENDnet TEW-632BRP 1
AI command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network
AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting
PX4 autopilot is a flight control solution for drones
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Flexmls Flexmlsยฎ IDX allows Reflected XSS