CVE-2026-20045
Cisco Unified Communications Products Code Injection Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Yesterday's disclosure cycle identified 13 critical-severity vulnerabilities (CVSS 9.0+), a 44% increase from the prior day's 9 critical issues. High-priority vulnerabilities (CVSS 7.0-8.9) decreased 23% to 77, down from 100, bringing the total disclosed CVE count to 90. Sixteen actively exploited vulnerabilities were added to the CISA Known Exploited Vulnerabilities catalog, including issues affecting Cisco Unified Communications Manager, Zimbra Collaboration Suite, VMware vCenter Server, and Microsoft Office. Notable critical disclosures include CVE-2026-24300 affecting Azure Front Door, CVE-2026-21643 targeting Fortinet FortiClientEMS, and CVE-2026-1499 impacting WordPress installations. Patch availability currently stands at 0%, requiring organizations to prioritize compensating controls and monitoring until vendor fixes are released.
Immediate action: Organizations running Cisco Unified Communications Manager, Zimbra, VMware vCenter Server, Microsoft Office, Fortinet FortiClientEMS, or Azure Front Door should immediately assess exposure and apply network-level mitigations for the 16 actively exploited vulnerabilities. With 0% patch availability, prioritize compensating controls such as network segmentation, access restrictions, and enhanced logging until vendor patches are released.
Cisco Unified Communications Products Code Injection Vulnerability - Active in CISA KEV catalog.
Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability - Active in CISA KEV catalog.
Versa Concerto Improper Authentication Vulnerability - Active in CISA KEV catalog.
Vite Vitejs Improper Access Control Vulnerability - Active in CISA KEV catalog.
Prettier eslint-config-prettier Embedded Malicious Code Vulnerability - Active in CISA KEV catalog.
Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability - Active in CISA KEV catalog.
Linux Kernel Integer Overflow Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability - Active in CISA KEV catalog.
GNU InetUtils Argument Injection Vulnerability - Active in CISA KEV catalog.
Microsoft Office Security Feature Bypass Vulnerability - Active in CISA KEV catalog.
GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
Sangoma FreePBX OS Command Injection Vulnerability - Active in CISA KEV catalog.
Sangoma FreePBX Improper Authentication Vulnerability - Active in CISA KEV catalog.
React Native Community CLI OS Command Injection Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability - Active in CISA KEV catalog.
Pinger 1.0 contains a remote code execution vulnerability where unauthenticated attackers can inject shell commands into the ping and socket parameters of ping.php to execute system commands.
The WP Duplicate plugin for WordPress allows authenticated subscribers to trigger a chain of vulnerabilities leading to unauthenticated remote code execution via arbitrary file upload.
A critical elevation of privilege vulnerability in Azure Front Door allows attackers to gain unauthorized access levels. Successful exploitation could lead to full administrative control.
An unauthenticated SQL injection vulnerability in Fortinet FortiClientEMS 7.4.4 allows for unauthorized code or command execution via crafted HTTP requests.
A buffer overflow in the Nsauditor DNS Lookup tool allows attackers to bypass ASLR and execute arbitrary shellcode via a crafted DNS query payload.
A buffer overflow in the Rubo DICOM Viewer server name input field allows attackers to overwrite the Structured Exception Handler (SEH) and execute arbitrary code.
An unauthenticated remote code execution vulnerability in the Edimax EW-7438RPn-v3 Mini allows attackers to execute arbitrary commands via the /goform/mp endpoint.
A stack-based buffer overflow in the 10-Strike Network Inventory Explorer file import functionality allows remote attackers to execute arbitrary code via a malicious text file.
An improper access control vulnerability in the Axigen Mail Server WebAdmin interface allows delegated admins with zero permissions to manage and manipulate SSL certificates.
A buffer overflow in the B64dec utility allows attackers to execute arbitrary code by overwriting the Structured Exception Handler (SEH) during the base64 decoding process.
Free Desktop Clock 3.0 contains a stack overflow vulnerability in the Time Zones display name input that allows unauthenticated attackers to overwrite SEH registers and execute arbitrary code.
MEmu Play 7.1.3 contains an insecure folder permissions vulnerability allowing low-privileged users to replace the MemuService.exe file and gain SYSTEM-level privileges upon system restart.
A missing bounds check in the vpu_mmap function of the VPU driver allows for arbitrary address mapping. This facilitates local escalation of privilege without requiring user interaction.
The Popup builder with Gamification plugin for WordPress is vulnerable to SQL Injection via REST API endpoints. This allows attackers to execute arbitrary SQL commands.
Azure Arc Elevation of Privilege Vulnerability allows an authenticated attacker to gain higher administrative permissions than intended within the Azure environment.
phpMyChat Plus 1
Azure Functions Information Disclosure Vulnerability allows an attacker to gain unauthorized access to sensitive information, potentially leading to further compromise of the cloud environment.
A flaw in the Certificate Management feature of Cisco Meeting Management allows authenticated attackers to upload files and execute commands with root privileges.
A vulnerability in the text rendering subsystem of Cisco TelePresence CE and RoomOS allows unauthenticated remote attackers to cause a denial of service (DoS) condition.
The SportsPress plugin for WordPress is vulnerable to Local File Inclusion (LFI). This allows attackers to read sensitive files from the server's filesystem.
Mitsubishi Electric FREQSHIP-mini for Windows contains an incorrect default permissions vulnerability, potentially allowing unauthorized local users to gain elevated system privileges.
A security issue was discovered in ingress-nginx where the `nginx
ProficySCADA for iOS 5
The All In One Image Viewer Block plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1
Improper access control inâ¯theâ¯TeamViewerâ¯Full and Host clientsâ¯(Windows,â¯macOS, Linux)â¯priorâ¯versionâ¯15
Apache Answer is vulnerable to the exposure of Private Personal Information (PPI) to unauthorized actors. This flaw could lead to a breach of user privacy.
A postâauthentication command injection vulnerability in the Dynamic DNS (DDNS) configuration CLI command in Zyxel ATP series firmware versions from V5
A vulnerability was found in itsourcecode Student Management System 1
A vulnerability was determined in itsourcecode Student Management System 1
IBM Aspera Console 3
Autodesk 3ds Max is vulnerable to arbitrary code execution via an Untrusted Search Path flaw when opening a maliciously crafted project directory.
Rockwell Automation Studio 5000 Logix Designer version 30 contains a high-severity vulnerability that could impact industrial control system (ICS) configuration and security.
BartVPN 1 contains a high-severity vulnerability that could allow an attacker to compromise the secure communication channel or escalate privileges on the host system.
Shrew Soft VPN Client 2 is vulnerable to a high-severity security flaw that could lead to local privilege escalation or the compromise of secure network tunnels.
Autodesk 3ds Max is vulnerable to a stack-based buffer overflow when parsing maliciously crafted GIF files, which could lead to arbitrary code execution.
Autodesk 3ds Max is vulnerable to a stack-based buffer overflow when parsing maliciously crafted GIF files, which could lead to arbitrary code execution.
n8n is an open source workflow automation platform
Alist, a file list program powered by Gin and Solidjs, contains a high-severity vulnerability that could lead to unauthorized file access or system compromise.
Axigen Mail Server before 10
jizhiCMS 1
Tanium addressed an improper input validation vulnerability in Deploy
Heap-based buffer overflow vulnerability in the image module
A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary
A vulnerability in the 'Compressing' Node.js library could allow for arbitrary file manipulation during the compression or decompression process.
Odin Secure FTP Expert 7
10-Strike Network Inventory Explorer 8
Out-of-bounds write vulnerability in the camera module
UAF concurrency vulnerability in the graphics module
A security flaw in Melange, a tool for building apk packages using declarative pipelines, could allow for unauthorized actions during the build process.
n8n is an open source workflow automation platform
OpenSlides, a web-based presentation and assembly system, is affected by a high-severity vulnerability that could impact the management of agendas and elections.
AutoGPT, an AI agent orchestration platform, is affected by a high-severity vulnerability that could compromise automated workflows. Administrators should refer to vendor advisories for specific details.
Edimax EW-7438RPn-v3 Mini 1
A second high-severity vulnerability has been identified in the Melange apk package builder's declarative pipeline system.
Autodesk 3ds Max is vulnerable to memory corruption when parsing a maliciously crafted RGB file, potentially leading to arbitrary code execution.
Autodesk 3ds Max contains an out-of-bounds write vulnerability when processing maliciously crafted GIF files, which may result in arbitrary code execution.
A maliciously crafted USD file, when loaded into Autodesk Arnold or 3ds Max, triggers an Out-of-Bounds Write vulnerability, potentially leading to arbitrary code execution.
Autodesk 3ds Max is subject to a memory corruption vulnerability when parsing maliciously crafted RGB files, potentially allowing for remote code execution.
A high-severity vulnerability in melange affects how declarative pipelines build apk packages, posing a significant risk to supply chain integrity.
The Godot MCP server, used for interacting with the Godot game engine, contains a vulnerability that could lead to unauthorized interactions or system compromise.
The iccDEV color management libraries are vulnerable to a flaw during the processing of ICC profiles, which could lead to memory corruption or arbitrary code execution.
The iccDEV color management libraries contain a high-severity vulnerability that could be triggered by malformed ICC profiles, leading to system instability or code execution.
A vulnerability in the iccDEV color management libraries could allow an attacker to execute arbitrary code by processing a specially crafted ICC profile.
A critical flaw in the iccDEV libraries and tools allows for potential exploitation during the manipulation and application of ICC color management profiles.
A high-severity security vulnerability exists in Wing FTP Server 6 that could allow an attacker to compromise server integrity. The flaw likely involves improper handling of system resources.
Amiti Antivirus 25 contains a high-severity security flaw that may allow an attacker to bypass security features. This vulnerability could lead to local system compromise.
NETGATE Data Backup 3 is affected by a security vulnerability that could compromise backup data integrity. The flaw is rated high severity due to its potential impact on data availability.
TexasSoft CyberPlanet 6 contains a high-severity security vulnerability that could lead to unauthorized system control. The flaw affects the management capabilities of the software.
Easy-Hide-IP 5 is affected by a high-severity security vulnerability that could result in information disclosure or traffic interception. The flaw undermines the core privacy features of the product.
ProShow Producer 9 contains a high-severity security vulnerability that could lead to arbitrary code execution. This flaw is particularly dangerous when processing specially crafted project files.
NCP Secure Entry Client 9 is affected by a high-severity vulnerability that could compromise VPN tunnel security. This flaw could allow for unauthorized access to internal network resources.
Alps Pointing-device Controller 8 contains a high-severity vulnerability that could allow for local privilege escalation. This flaw resides in the driver-level software.
Garena GCafÊ 3 is affected by a high-severity security vulnerability that could lead to unauthorized administrative access. The flaw impacts the management of cafÊ networks.
Adaware Web Companion version 4 contains a high-severity security vulnerability that could allow for unauthorized system modifications. The flaw affects the software's ability to protect web traffic.
A security vulnerability exists in Wacom WTabletService 6 that could allow for unauthorized actions. The flaw resides in the core service handling tablet input and driver communications.
Tanium addressed an unauthorized code execution vulnerability in Tanium Appliance
A vulnerability in the n8n open-source workflow automation platform could allow for unauthorized access or execution. The flaw affects the core automation engine and its handling of workflow data.
The OpenClaw personal AI assistant contains a high-severity vulnerability that could allow for unauthorized access or system manipulation.
A high-severity vulnerability in apko affects the building and publishing of OCI container images, potentially compromising container security.
Another high-severity vulnerability has been identified in the apko container build tool, impacting the security of OCI image generation.
Water-Melon Melon commit 9df9292 and below is vulnerable to Denial of Service
Apollo Server is vulnerable to a security flaw that may allow unauthorized GraphQL operations or data exposure.
Nsauditor 3
UltraVNC Launcher 1
UltraVNC Viewer 1
ZOC Terminal 7
Edimax EW-7438RPn-v3 Mini 1
pgAdmin versions 9
Open5GS, an open-source implementation for 5G Core and EPC, is affected by a security flaw in versions up to 2. This vulnerability may impact mobile core network stability.
MCP TypeScript SDK is the official TypeScript SDK for Model Context Protocol servers and clients