CVE-2026-20045
Cisco Unified Communications Products Code Injection Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Saturday's security landscape is dominated by 16 actively exploited CISA KEV vulnerabilities spanning Cisco Unified Communications, Zimbra, VMware vCenter, and Microsoft Office. A critical wave of SandboxJS escape vulnerabilities threatens JavaScript sandboxing, while Fortinet FortiClientEMS faces an unauthenticated SQL injection flaw. Supply chain risks emerge with malicious code embedded in the popular eslint-config-prettier package and command injection in React Native CLI. With only 27% of patches available, most organizations remain exposed.
Immediate action: Immediately patch Cisco Unified Communications, Zimbra ZCS, and VMware vCenter Server. Audit any projects using eslint-config-prettier and React Native CLI for supply chain compromise. Review SmarterMail deployments for authentication bypass. Apply Fortinet FortiClientEMS updates as soon as patches are released.
Cisco Unified Communications Products Code Injection Vulnerability - Active in CISA KEV catalog.
Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability - Active in CISA KEV catalog.
Versa Concerto Improper Authentication Vulnerability - Active in CISA KEV catalog.
Vite Vitejs Improper Access Control Vulnerability - Active in CISA KEV catalog.
Prettier eslint-config-prettier Embedded Malicious Code Vulnerability - Active in CISA KEV catalog.
Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability - Active in CISA KEV catalog.
Linux Kernel Integer Overflow Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability - Active in CISA KEV catalog.
GNU InetUtils Argument Injection Vulnerability - Active in CISA KEV catalog.
Microsoft Office Security Feature Bypass Vulnerability - Active in CISA KEV catalog.
GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
Sangoma FreePBX OS Command Injection Vulnerability - Active in CISA KEV catalog.
Sangoma FreePBX Improper Authentication Vulnerability - Active in CISA KEV catalog.
React Native Community CLI OS Command Injection Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability - Active in CISA KEV catalog.
Microsoft Semantic Kernel .NET SDK contains an arbitrary file write flaw in the SessionsPythonPlugin. Attackers can exploit DownloadFileAsync or UploadFileAsync to write files to restricted paths.
The WP Duplicate plugin for WordPress allows authenticated subscribers to trigger a chain of vulnerabilities leading to unauthenticated remote code execution via arbitrary file upload.
An unauthenticated SQL injection vulnerability in Fortinet FortiClientEMS 7.4.4 allows for unauthorized code or command execution via crafted HTTP requests.
SandboxJS is vulnerable to a sandbox escape via unwrapped function return values. Attackers can access the host's Function constructor to execute arbitrary code outside the restricted environment.
SandboxJS allows sandbox escape via shadowing of the hasOwnProperty method. This disables prototype whitelist enforcement, enabling host Object.prototype pollution and persistent cross-sandbox impact.
A flaw in SandboxJS allows attackers to escape the sandbox by overwriting Map.prototype.has. Since Map is included in SAFE_PROTOTYPES, its prototype is accessible for malicious modification.
SandboxJS is vulnerable to an escape due to a key validation mismatch. Attackers can use malicious objects that coerce to different strings during sanitation versus actual property access.
Buffer overflow in Cyberoam Authentication Client 2.1.2.7 allows remote attackers to execute arbitrary code by overwriting SEH memory via a crafted server address.
EPyT-Flowâs REST API custom deserializer allows dynamic instantiation of attacker-specified classes. This leads to OS command execution via dangerous classes like subprocess.Popen.
The Keylime registrar fails to enforce client-side TLS authentication. This allows unauthenticated attackers to perform administrative operations, including deleting agents and retrieving TPM data.
A stack-based buffer overflow exists in the IP-COM W30AP access point via the R7WebsSecurityHandler function. Remote attackers can exploit the "data" argument in a POST request to execute code.
Payload CMS is vulnerable to blind SQL injection in JSON and richText field queries. Unauthenticated attackers can extract sensitive data and achieve full account takeover by embedding unescaped input into SQL.
Parallaxis Cuckoo Clock 5.0 is vulnerable to a buffer overflow in alarm scheduling, enabling shellcode execution via EIP and EBP register overwrites.
Wedding Slideshow Studio 1.36 contains a buffer overflow in the registration name field, allowing attackers to execute arbitrary system commands via a malicious payload.
3DP-MANAGER automatically creates an administrative account with default credentials (admin/admin) upon initialization. Attackers can use these credentials to gain full control over VPN and system settings.
Critical RCE in Frigate NVR via unsanitized input in the go2rtc video stream configuration allows command injection via the exec: directive.
A stack-based buffer overflow in Wedding Slideshow Studio 1.36 allows attackers to execute arbitrary code by supplying a malicious 1608-byte registration key.
Infor SyteLine ERP uses hard-coded static cryptographic keys to encrypt stored credentials, including user passwords, database connection strings, and API keys
Azure Arc Elevation of Privilege Vulnerability allows an authenticated attacker to gain higher administrative permissions than intended within the Azure environment.
Qdrant is a vector similarity search engine and vector database
phpMyChat Plus 1
Azure Functions Information Disclosure Vulnerability allows an attacker to gain unauthorized access to sensitive information, potentially leading to further compromise of the cloud environment.
A flaw has been found in mathurvishal CloudClassroom-PHP-Project up to 5dadec098bfbbf3300d60c3494db3fb95b66e7be
A security issue was discovered in ingress-nginx where the `nginx
ProficySCADA for iOS 5
Core FTP LE 2
Core FTP Lite 1
AMSS++ version 4
The All In One Image Viewer Block plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1
Improper access control inâ¯theâ¯TeamViewerâ¯Full and Host clientsâ¯(Windows,â¯macOS, Linux)â¯priorâ¯versionâ¯15
ATutor 2
Mattermost Confluence plugin version <1
A vulnerability was found in itsourcecode Student Management System 1
A vulnerability was determined in itsourcecode Student Management System 1
A vulnerability was identified in itsourcecode Student Management System 1
A security flaw has been discovered in itsourcecode Student Management System 1
A flaw has been found in itsourcecode School Management System 1
A vulnerability was detected in SourceCodester Medical Center Portal Management System 1
A vulnerability has been found in SourceCodester Medical Center Portal Management System 1
A vulnerability was found in code-projects Simple Blood Donor Management System 1
A vulnerability was determined in itsourcecode School Management System 1
Pydantic AI is a Python agent framework for building applications and workflows with Generative AI
IBM Aspera Console 3
NiceGUI is a Python-based UI framework
Pydantic AI is a Python agent framework for building applications and workflows with Generative AI
Acer Launch Manager 6
JumpStart 0
RimbaLinux AhadPOS 1
Axigen Mail Server before 10
jizhiCMS 1
Monstra CMS v3
Tanium addressed an improper input validation vulnerability in Deploy
A weakness has been identified in UTT čŋå 520W 1
A security vulnerability has been detected in UTT čŋå 520W 1
A vulnerability was detected in UTT čŋå 520W 1
A vulnerability has been found in UTT čŋå 520W 1
A vulnerability was found in UTT čŋå 520W 1
Heap-based buffer overflow vulnerability in the image module
calibre is an e-book manager
Odin Secure FTP Expert 7
10-Strike Network Inventory Explorer 8
Out-of-bounds write vulnerability in the camera module
UAF concurrency vulnerability in the graphics module
OpenClaw is a personal AI assistant
REVA is an interoperability platform
calibre is an e-book manager
QuickDate 1
Edimax EW-7438RPn-v3 Mini 1
Tanium addressed an unauthorized code execution vulnerability in Tanium Appliance
Wondershare Application Framework Service 2
Alps HID Monitor Service 8
BlueStacks App Player 2
SecurOS Enterprise 10
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles
calibre is an e-book manager
Gophish <=0
Nsauditor 3
UltraVNC Launcher 1
UltraVNC Viewer 1
ZOC Terminal 7
Edimax EW-7438RPn-v3 Mini 1
A path traversal in My Text Editor v1
DataHub is an open-source metadata platform
AdonisJS is a TypeScript-first web framework
aSc TimeTables 2020
SpotFTP-FTP Password Recover 2
AMSS++ 4
ACE Security WiP-90113 HD Camera contains a configuration disclosure vulnerability that allows unauthenticated attackers to retrieve sensitive configuration files
DBPower C300 HD Camera contains a configuration disclosure vulnerability that allows unauthenticated attackers to retrieve sensitive credentials through an unprotected configuration backup endpoint
pgAdmin versions 9
Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases
AdonisJS is a TypeScript-first web framework
A vulnerability has been found in UTT HiPER 810 1
html5_snmp 1
thejshen Globitek CMS 1
TheJshen ContentManagementSystem 1
eLection 2