CVE-2024-37079
Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Thursday's vulnerability disclosures include 16 critical-severity CVEs affecting WordPress, METIS WIC and DFS IoT devices, HP systems, and AWS infrastructure, alongside active exploitation of Microsoft Office and Windows components. Critical CVE volume increased 78% from the prior day (16 vs. 9), while high-priority disclosures held steady at 100. Notable critical entries include CVE-2025-64075 (CVSS 10.0) affecting WE2001 check systems, CVE-2026-1357 and CVE-2026-1729 targeting WordPress installations, and CVE-2026-2248/CVE-2026-2249 impacting METIS industrial devices. Attack patterns span remote code execution, command injection in media converters, and authentication bypass in enterprise mail platforms including SmarterTools SmarterMail and Sangoma FreePBX. No patches are currently available for the disclosed vulnerabilities, requiring defenders to implement compensating controls and monitor for exploitation activity.
Immediate action: Prioritize reviewing exposure to Microsoft Office (CVE-2026-21509), Microsoft Windows (CVE-2026-21525), VMware vCenter Server (CVE-2024-37079), and SmarterTools SmarterMail (CVE-2025-52691, CVE-2026-23760, CVE-2026-24423), all of which have confirmed active exploitation. With 0% patch availability, implement network segmentation, restrict access to affected services, and deploy available detection signatures as interim mitigations until vendor patches are released.
Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability - Active in CISA KEV catalog.
Linux Kernel Integer Overflow Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability - Active in CISA KEV catalog.
GNU InetUtils Argument Injection Vulnerability - Active in CISA KEV catalog.
Microsoft Office Security Feature Bypass Vulnerability - Active in CISA KEV catalog.
GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
Sangoma FreePBX OS Command Injection Vulnerability - Active in CISA KEV catalog.
Sangoma FreePBX Improper Authentication Vulnerability - Active in CISA KEV catalog.
React Native Community CLI OS Command Injection Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability - Active in CISA KEV catalog.
Microsoft Windows NULL Pointer Dereference Vulnerability - Active in CISA KEV catalog.
Chevereto 3.13.4 Core contains a remote code execution vulnerability where attackers can inject a PHP shell via the database table prefix parameter during installation.
The WPvivid Backup & Migration plugin for WordPress allows unauthenticated remote code execution via arbitrary file uploads due to improper RSA error handling and directory traversal.
METIS WIC devices (<= oscore 2.1.234-r18) allow unauthenticated remote attackers to execute arbitrary commands with root privileges via the /console endpoint, leading to full system compromise.
METIS DFS devices (<= oscore 2.1.234-r18) expose an unauthenticated /console endpoint, allowing remote attackers to execute arbitrary commands with 'daemon' privileges and compromise the software.
The AdForest WordPress theme (<= 6.0.12) is vulnerable to authentication bypass via the sb_login_user_with_otp_fun function, allowing attackers to log in as any user, including admins.
Torrent FLV Converter 1.51 Build 117 contains a stack overflow vulnerability in the registration code input, allowing attackers to execute arbitrary code via SEH overwrite on Windows 32-bit systems.
ASTPP 4.0.1 is vulnerable to XSS and command injection in SIP and plugin management interfaces, allowing attackers to hijack sessions and execute code with root permissions.
A path traversal vulnerability in the check_token function of ZBT WE2001 (23.09.27) allows remote attackers to bypass authentication and perform admin actions via crafted session cookies.
An unprotected API endpoint in the affected software allows unauthenticated remote attackers to change the device password, leading to complete unauthorized administrative control.
Torrent 3GP Converter 1.51 is vulnerable to a stack overflow via the registration dialog, allowing attackers to overwrite SEH registers and execute arbitrary code on the host system.
Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 contains a stack overflow in the License Name input field, allowing attackers to overwrite SEH registers and execute arbitrary code.
Dinosoft ERP contains a critical vulnerability due to missing authentication and improper access control, allowing unauthenticated attackers to access restricted functions.
Logo j-Platform is vulnerable to the insertion of sensitive information into externally accessible files due to incorrectly configured access control levels.
The ZLAN5143D device is vulnerable to authentication bypass, allowing attackers to access internal URLs directly and gain unauthorized administrative access.
Allok Video Converter 4.6.1217 contains a stack overflow vulnerability in the License Name field, allowing attackers to execute arbitrary code via SEH handler overwrites.
Turboard is vulnerable to Reflected Cross-Site Scripting (XSS) due to improper neutralization of input during web page generation.
A security feature bypass vulnerability in Microsoft Office Word exists due to reliance on untrusted inputs, allowing an unauthorized local attacker to circumvent security protections.
Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate their privileges locally on the affected system.
A protection mechanism failure in the Windows Shell allows an unauthenticated attacker to bypass security features over a network connection.
A protection mechanism failure in the MSHTML Framework allows an unauthenticated attacker to bypass security features over a network, potentially leading to unauthorized system access.
The wpForo Forum plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2
An Authentication Bypass by Primary Weakness vulnerability [CWE-305] vulnerability in Fortinet FortiOS 7
A type confusion vulnerability in the Desktop Window Manager (DWM) allows an authorized local attacker to elevate their privileges to a higher level.
Use after free in CSS in Google Chrome prior to 145
Heap buffer overflow in Codecs in Google Chrome prior to 145
The Custom Block Builder â Lazy Blocks plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4
A heap-based buffer overflow in the Microsoft Graphics Component allows an authenticated user to gain elevated system privileges through local exploitation.
A heap-based buffer overflow in Microsoft Office Excel enables an unauthorized attacker to achieve local privilege escalation on affected systems.
A code injection vulnerability in Microsoft Defender for Linux allows an unauthenticated attacker on an adjacent network to execute arbitrary code.
Inappropriate implementation in WebGPU in Google Chrome prior to 145
Improper certificate validation in Azure Local allows an unauthenticated network attacker to execute arbitrary code on the target system.
The 'Videospirecore Theme Plugin' plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1
Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally
Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally
Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally
Use after free in Windows Cluster Client Failover allows an authorized attacker to elevate privileges locally
Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code over a network
Improper access control in Windows Hyper-V allows an authorized attacker to bypass a security feature locally
Improper Neutralization of Data within XPath Expressions ('XPath Injection') vulnerability in Apache HertzBeat
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability [CWE-79] vulnerability in Fortinet FortiSandbox 5
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kernel allows an authorized attacker to elevate privileges locally
Untrusted pointer dereference in Windows HTTP
Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally
Time-of-check time-of-use (toctou) race condition in Windows HTTP
Untrusted pointer dereference in Windows HTTP
WorkgroupMail 7
Dell Update Package (DUP) Framework, versions 23
PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a temporary view based on a function containing malicious code
An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthenticated attacker to leak specific stored credential data
PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a custom operator in the public schema and place malicious code in that operator
A buffer overflow vulnerability has been reported to affect several QNAP operating system versions
Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute code over a network
Improper neutralization of special elements used in a command ('command injection') in Github Copilot allows an unauthorized attacker to execute code over a network
Improper input validation in AMD Graphics Driver could allow an attacker to supply a specially crafted pointer, potentially leading to arbitrary code execution
The serialize function used to compile MDX in next-mdx-remote is vulnerable to arbitrary code execution due to insufficient sanitization of MDX content
Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an authorized attacker to elevate privileges over a network
Time-of-check time-of-use (toctou) race condition in GitHub Copilot and Visual Studio allows an authorized attacker to execute code over a network
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ergosis Security Systems Computer Industry and Trade Inc
A buffer overflow vulnerability has been reported to affect Qsync Central
A buffer overflow vulnerability has been reported to affect Qsync Central
A buffer overflow vulnerability has been reported to affect Qsync Central
Authorization Bypass Through User-Controlled Key vulnerability in Dinibh Puzzle Software Solutions Dinibh Patrol Tracking System allows Exploitation of Trusted Identifiers
Worklenz is a project management tool
An out-of-bounds write vulnerability has been reported to affect Qsync Central
JUNG Smart Visu Server 1
Execution After Redirect (EAR) vulnerability in Sarman Soft Software and Technology Services Industry and Trade Ltd
Statmatic is a Laravel and Git powered content management system (CMS)
An out-of-bounds write in the firmware for Intel AMT and Standard Manageability within Ring 3 user applications may allow an attacker to cause a denial of service.
Kanboard is project management software focused on Kanban methodology
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Saastech Cleaning and Internet Services Inc
Cleartext Transmission of Sensitive Information vulnerability in Pan Software & Information Technologies Ltd
Improper input validation for some Server Firmware Update Utility(SysFwUpdt) before version 16
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Vadi Corporate Information Systems Ltd
A use of externally-controlled format string vulnerability has been reported to affect Qsync Central
Improper input validation in Power BI allows an authorized attacker to execute code over a network
Race condition for some TDX Module within Ring 0: Hypervisor may allow an escalation of privilege
A flaw in Intel Quick Assist Technology allows an attacker with Ring 0 access to bypass hardware interface protections, leading to kernel-level privilege escalation.
A vulnerability has been identified in NX (All versions < V2512)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512)
A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512)
A vulnerability has been identified in SINEC NMS (All versions < V4
A vulnerability has been identified in SINEC NMS (All versions), User Management Component (UMC) (All versions < V2
Audition versions 25
After Effects versions 25
After Effects versions 25
After Effects versions 25
After Effects versions 25
After Effects versions 25
After Effects versions 25
After Effects versions 25
After Effects versions 25
After Effects versions 25
After Effects versions 25
After Effects versions 25
After Effects versions 25
Substance3D - Designer versions 15
Substance3D - Designer versions 15
After Effects versions 25
InDesign Desktop versions 21
Substance3D - Stager versions 3
Substance3D - Stager versions 3
Substance3D - Stager versions 3
Substance3D - Stager versions 3
Substance3D - Stager versions 3
Bridge versions 15
Bridge versions 15
DNG SDK versions 1
DNG SDK versions 1
Lightroom Desktop versions 15
BlackMoon FTP Server 3
Mikogo 5