CVE-2026-5281
A use-after-free vulnerability exists in the Dawn component of Google Chrome. This flaw allows attackers to potentially execute arbitrary code or cause a denial-of-service via a crafted HTML page.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Friday's disclosures reveal significant exposure across AWS services, with CVE-2026-40175 (CVSS 10.0) enabling IMDSv2 bypass and CVE-2026-5058/CVE-2026-5059 (CVSS 9.8) affecting AWS CLI and aws-mcp-server. Twenty critical vulnerabilities were disclosed, a 39% decrease from the prior day's 33, while 100 high-priority CVEs held steady. Additional critical flaws include CVE-2026-4149 (CVSS 10.0) in Sonos Era 300 smart speakers, CVE-2026-5412 (CVSS 9.9) in Canonical Juju, and CVE-2026-34621 (CVSS 9.6) in Adobe Acrobat Reader. Remote code execution and authentication bypass patterns dominate, spanning cloud infrastructure, consumer IoT, and document processing software. No patches are currently available for any disclosed vulnerabilities, requiring defenders to prioritize compensating controls and network-level mitigations.
Immediate action: Prioritize AWS environments for immediate review β audit IMDSv2 configurations, restrict AWS CLI and MCP server access, and apply network segmentation around Sonos Era 300 and Totolink A7100RU devices. With no patches currently available for any of the 120 disclosed CVEs, implement WAF rules, disable unnecessary services, and monitor for exploitation indicators on Google Dawn and TrueConf Client.
A use-after-free vulnerability exists in the Dawn component of Google Chrome. This flaw allows attackers to potentially execute arbitrary code or cause a denial-of-service via a crafted HTML page.
TrueConf Client Download of Code Without Integrity Check Vulnerability - Active in CISA KEV catalog.
Axios is vulnerable to a prototype pollution attack chain that can be escalated to remote code execution or AWS IMDSv2 bypass.
Chamilo LMS contains an OS Command Injection vulnerability in its file move function, allowing authenticated users to execute arbitrary commands on the underlying server.
A stored Cross-Site Scripting (XSS) vulnerability in the lollms social feature allows unauthenticated attackers to inject malicious JavaScript, leading to potential account takeover.
Adobe Acrobat Reader is vulnerable to prototype pollution, which can result in arbitrary code execution when a victim opens a malicious file.
The aws-mcp-server is vulnerable to remote code execution via AWS CLI command injection, allowing attackers to execute arbitrary system commands without authentication.
The Sonos Era 300 is vulnerable to remote code execution due to an out-of-bounds memory access issue within SMB response handling.
FalkorDB Browser 1.9.3 contains an unauthenticated path traversal vulnerability in the file upload API, leading to remote code execution.
The aws-mcp-server is vulnerable to remote code execution via command injection due to improper validation of user-supplied input in the allowed commands list.
Juju contains an authorization flaw in the Controller facade that allows authenticated users to extract sensitive cloud credentials.
The Totolink A7100RU CGI Handler contains an OS command injection vulnerability in the setWiFiGuestCfg function, allowing remote attackers to execute arbitrary commands.
The Totolink A7100RU CGI Handler contains an OS command injection vulnerability in the setTelnetCfg function, allowing remote attackers to execute arbitrary commands.
The Totolink A7100RU CGI Handler contains an OS command injection vulnerability in the setMiniuiHomeInfoShow function, allowing remote attackers to execute arbitrary commands.
A remote OS command injection vulnerability exists in the Totolink A7100RU CGI handler, allowing unauthenticated attackers to execute arbitrary system commands via the tty_server argument.
A remote OS command injection vulnerability in the Totolink A7100RU CGI handler allows unauthenticated attackers to execute arbitrary system commands via the admpass argument.
An OS command injection vulnerability in the Totolink A7100RU CGI handler allows unauthenticated remote attackers to execute arbitrary commands via the enable argument in setSyslogCfg.
A remote OS command injection vulnerability exists in the Totolink A7100RU CGI handler, allowing unauthenticated attackers to execute commands via the enable argument in setPortalConfWeChat.
A remote OS command injection vulnerability in the Totolink A7100RU CGI handler allows unauthenticated remote attackers to execute commands via the enable argument in setUrlFilterRules.
The Totolink A7100RU router is vulnerable to remote OS command injection in the setPptpServerCfg function, which is publicly exploitable.
The Totolink A7100RU router is vulnerable to remote OS command injection in the setVpnAccountCfg function, which is publicly exploitable.
Chamilo LMS uses a predictable, non-random token generation mechanism for password resets, allowing unauthenticated attackers to hijack user accounts.
A Key Exchange without Entity Authentication vulnerability in the SSH implementation of Juniper Networks Apstra allows a unauthenticated, MITM attacker to impersonate managed devices
Apache Tomcatβs EncryptInterceptor contains a Padding Oracle vulnerability when running under default configurations, potentially allowing for cryptographic attacks.
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CactusThemes VideoPro allows PHP Local File Inclusion
Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Tomcat
PraisonAI is a multi-agent teams system
PraisonAI is a multi-agent teams system
A Dynamic-link Library Injection vulnerability in GatewayGeo MapServer for Windows version 5 allows attackers to escalate privileges via a crafted executable
WordPress adivaha Travel Plugin 2
Directus is a real-time API and App dashboard for managing SQL database content
PraisonAI is a multi-agent teams system
PraisonAI is a multi-agent teams system
PraisonAIAgents is a multi-agent teams system
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension
Configured cipher preference order not preserved vulnerability in Apache Tomcat
Missing Encryption of Sensitive Data vulnerability in Apache Tomcat due to theΒ fix for CVE-2026-29146 allowing the bypass of the EncryptInterceptor
The cloud membership component of Apache Tomcat contains a vulnerability that inadvertently logs sensitive Kubernetes bearer tokens, leading to potential unauthorized access.
PraisonAI is a multi-agent teams system
The BuddyPress Groupblog plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1
Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts
The n8n-MCP server contains an unspecified vulnerability that may expose sensitive documentation, properties, and operations to unauthorized AI assistants.
Saltcorn is an extensible, open source, no-code database application builder
The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal in all versions up to, and including, 2
A Missing Authorization vulnerability in the CLI of Juniper Networks Junos OS on MX Series allows a local, authenticated user with low privileges to execute specific commands which will lead to a complete compromise of managed devices
Chamilo LMS is a learning management system
A plaintext storage of a password vulnerability in Synology SSL VPN Client before 1
The Tutor LMS β eLearning and online course solution plugin for WordPress is vulnerable to an Insecure Direct Object Reference in all versions up to, and including, 3
Chamilo LMS is a learning management system
HDF5 is software for managing data
A Missing Authentication for Critical Function vulnerability in the Flexible PIC Concentrators (FPCs) of Juniper Networks Junos OS Evolved on PTX Series allows a local, authenticated attacker with low privileges to gain direct access to FPCs installed in the device
An Execution with Unnecessary Privileges vulnerabilityΒ in the User Interface (UI) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to gain root privileges, thus compromising the system
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Apache DolphinScheduler
Use of Hard-coded Cryptographic Key vulnerability in Apache OpenMeetings
Use of GET Request Method With Sensitive Query Strings vulnerability in Apache OpenMeetings
Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT
An Improper Validation of Syntactic Correctness of Input vulnerability in the IPsec library used by kmd and iked of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated, network-based attacker to cause a complete Denial-of-Service (DoS)
An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow daemon (flowd) of Juniper Networks Junos OS on SRX Series allows an attacker sending a specific, malformed ICMPv6 packet to cause the srxpfe process to crash and restart
When configuring SSL bundles in Spring Cloud Gateway by using the configuration propertyΒ spring
OPNsense is a FreeBSD based firewall and routing platform
Samsung MagicINFO 9 Server Incorrect Default Permissions Local Privilege Escalation Vulnerability This issue affects MagicINFO 9 Server: less than 21
Local privilege escalation due to improper handling of environment variables
NoMachine Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
BSV Ruby SDK is the Ruby SDK for the BSV blockchain
A vulnerability was detected in D-Link DIR-605L 2
A flaw has been found in D-Link DIR-605L 2
A vulnerability has been found in D-Link DIR-605L 2
A vulnerability was found in D-Link DIR-605L 2
A vulnerability was determined in D-Link DIR-605L 2
A vulnerability was identified in D-Link DIR-605L 2
A vulnerability was detected in Tenda F451 1
A flaw has been found in Tenda F451 1
A vulnerability has been found in Tenda F451 1
A vulnerability was found in Tenda F451 1
A vulnerability was determined in Tenda F451 1
A security vulnerability has been detected in D-Link DIR-513 1
A vulnerability was detected in D-Link DIR-513 1
A flaw has been found in D-Link DIR-513 1
A vulnerability has been found in Tenda AC9 15
A vulnerability was found in Tenda AC9 15
osslsigncode is a tool that implements Authenticode signing and timestamping
GIMP PSD File Parsing Integer Overflow Remote Code Execution Vulnerability
GIMP ANI File Parsing Integer Overflow Remote Code Execution Vulnerability
GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
GIMP XPM File Parsing Integer Overflow Remote Code Execution Vulnerability
Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
Labcenter Electronics Proteus PDSPRJ File Parsing Type Confusion Remote Code Execution Vulnerability
A flaw was found in odh-dashboard in Red Hat Openshift AI
A flaw was found in gnutls
BSV Ruby SDK is the Ruby SDK for the BSV blockchain
LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via bytecode rewriting at the /guardrails/test_custom_code URI
A low-privileged remote attacker can send Modbus packets to manipulate register values that are inputs to the odorant injection logic such that too much or too little odorant is injected into a gas line
Rapid7 Velociraptor versions prior to 0
NoMachine External Control of File Path Local Privilege Escalation Vulnerability
Hashgraph Guardian through version 3
AGiXT is a dynamic AI Agent Automation Platform
OpenClaw before 2026
OpenClaw before 2026
OpenClaw before 2026
OpenClaw before 2026
OpenClaw before 2026
OpenClaw before 2026
basic-ftp is an FTP client for Node
Vikunja is an open-source self-hosted task management platform
Postiz is an AI social media scheduling tool
nimiq-blockchain provides persistent block storage for Nimiq's Rust implementation
OpenClaw before 2026
OpenClaw before 2026
OpenClaw before 2026
OpenClaw before 2026
An issue was discovered in musl libc 0
OpenClaw before 2026
Emocheck insecurely loads Dynamic Link Libraries (DLLs)
OpenClaw before 2026
Plane is an an open-source project management tool
OpenClaw before 2026
Chamilo LMS is a learning management system
goshs is a SimpleHTTPServer written in Go
HashiCorpβs go-getter library contains a vulnerability, potentially related to improper handling of remote resources, that could lead to security risks in dependent applications.