CVE-2026-21513
A protection mechanism failure in the MSHTML Framework allows an unauthenticated attacker to bypass security features over a network, potentially leading to unauthorized system access.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Monday's vulnerability disclosures reveal 3 critical-severity flaws affecting Changing IDExpert Windows Logon Agent and e-Excellence U-Office Force, all scoring CVSS 9.8. Critical CVE count rose from 0 to 3 compared to the prior day, while high-priority vulnerabilities dropped 57% from 35 to 15. CVE-2026-2999 and CVE-2026-3000 target Changing IDExpert's Windows Logon Agent, and CVE-2026-3422 impacts e-Excellence U-Office Force, each enabling potential remote code execution or authentication bypass. Active exploitation spans 17 vulnerabilities across Microsoft Windows, Microsoft Office, Apple OS, Google Chromium, GitLab, Roundcube Webmail, and Notepad++, indicating broad targeting of enterprise infrastructure and productivity tools. No patches are currently available for the newly disclosed CVEs, requiring organizations to prioritize compensating controls and monitoring.
Immediate action: Prioritize review of Changing IDExpert Windows Logon Agent and e-Excellence U-Office Force deployments, applying network segmentation and access restrictions until patches are released. Monitor for exploitation activity targeting Microsoft Windows, Apple OS, Google Chromium, and Roundcube Webmail, and apply any available vendor mitigations for the 17 actively exploited vulnerabilities.
A protection mechanism failure in the MSHTML Framework allows an unauthenticated attacker to bypass security features over a network, potentially leading to unauthorized system access.
Microsoft Windows NULL Pointer Dereference Vulnerability - Active in CISA KEV catalog.
A protection mechanism failure in the Windows Shell allows an unauthenticated attacker to bypass security features over a network connection.
Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate their privileges locally on the affected system.
A type confusion vulnerability in the Desktop Window Manager (DWM) allows an authorized local attacker to elevate their privileges to a higher level.
A security feature bypass vulnerability in Microsoft Office Word exists due to reliance on untrusted inputs, allowing an unauthorized local attacker to circumvent security protections.
A memory corruption vulnerability in Apple software was addressed through improved state management to prevent potential exploitation.
Microsoft Configuration Manager SQL Injection Vulnerability - Active in CISA KEV catalog.
Notepad++ Download of Code Without Integrity Check Vulnerability - Active in CISA KEV catalog.
Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability - Active in CISA KEV catalog.
TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability - Active in CISA KEV catalog.
Google Chrome is vulnerable to a "Use After Free" condition in its CSS engine, which could allow a remote attacker to execute arbitrary code via a crafted webpage.
GitLab Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
RoundCube Webmail Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
RoundCube Webmail Cross-site Scripting Vulnerability - Active in CISA KEV catalog.
FileZen is affected by a high-severity OS command injection vulnerability that allows a threat actor to execute arbitrary commands on the underlying operating system.
A remote code execution vulnerability in IDExpert Windows Logon Agent allows unauthenticated attackers to force arbitrary file downloads and execution from remote sources.
IDExpert Windows Logon Agent is vulnerable to unauthenticated remote code execution via unauthorized remote DLL downloads and execution.
An insecure deserialization vulnerability in U-Office Force allows unauthenticated remote attackers to execute arbitrary code via crafted serialized content.
The wpForo 2 forum plugin for WordPress contains a high-severity vulnerability that could lead to unauthorized database access or system compromise.
A vulnerability in projectworlds Online Art Gallery Shop version 1 could allow attackers to compromise the e-commerce platform's security.
A security flaw in MaxSite CMS up to version 109 presents a high-severity risk to the integrity of the content management system.
A security weakness has been identified in itsourcecode Society Management System version 1, potentially allowing for unauthorized data access.
A security vulnerability in itsourcecode University Management System version 1 could lead to unauthorized access to academic and administrative records.
A flaw in itsourcecode University Management System version 1 presents a high-severity security risk to the application's environment.
A security vulnerability has been detected in the Tenda F453 router, version 1, potentially allowing for remote device compromise.
A high-severity vulnerability has been identified in the Tenda F453 router, which may allow an attacker to compromise the device's integrity and gain unauthorized access.
A critical flaw has been discovered in the Tenda F453 router that could lead to unauthorized system manipulation or a complete compromise of the device.
A vulnerability in the Tenda F453 router has been identified that could permit unauthorized actors to interfere with device operations or gain elevated privileges.
A security vulnerability found in the Tenda F453 router could allow for unauthorized access or execution of arbitrary actions by an attacker.
A high-severity vulnerability has been determined in the Tenda F453 router, which could lead to unauthorized administrative access or system failure.
A vulnerability was identified in Tenda F453 1
A security flaw has been discovered in Tenda AC15 up to 15
A security vulnerability has been identified in eosphoros-ai db-gpt version 0, potentially impacting the security of AI-driven database interactions.