CVE-2012-1854
Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Thursday's disclosures concentrate heavily on HP products and WordPress plugins, with multiple remote code execution flaws affecting enterprise printing infrastructure and content management deployments. Yesterday brought 15 critical CVEs, down 46% from the prior day's 28, alongside 100 high-priority vulnerabilities matching the previous day's volume. Notable entries include CVE-2026-41228 (CVSS 9.9) enabling HP code execution, CVE-2026-41167 (CVSS 9.1) affecting PostgreSQL host handling, and CVE-2026-40575 (CVSS 9.1) impacting Nginx configurations. Code execution and injection patterns dominate the disclosure set, with WordPress plugin vulnerabilities (CVE-2026-6235, CVE-2026-3844, CVE-2026-4119) creating broad exposure across hosted sites. No patches are currently available across yesterday's disclosures, and 14 entries appear on the CISA KEV list indicating confirmed exploitation activity.
Immediate action: Prioritize assessment of HP infrastructure, WordPress deployments, PostgreSQL hosts, and Nginx edge services for exposure to yesterday's critical disclosures. With 0% patch availability, apply network segmentation, WAF rules, and access restrictions while monitoring vendor advisories for remediation updates.
Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Link Following Vulnerability - Active in CISA KEV catalog.
Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Out-of-Bounds Read Vulnerability - Active in CISA KEV catalog.
Adobe Acrobat Use-After-Free Vulnerability - Active in CISA KEV catalog.
Adobe Acrobat Reader is vulnerable to prototype pollution, which can result in arbitrary code execution when a victim opens a malicious file.
Microsoft Office Remote Code Execution - Active in CISA KEV catalog.
Microsoft SharePoint Server Improper Input Validation Vulnerability - Active in CISA KEV catalog.
Apache ActiveMQ Improper Input Validation Vulnerability - Active in CISA KEV catalog.
Kentico Xperience Path Traversal Vulnerability - Active in CISA KEV catalog.
PaperCut NG/MF Improper Authentication Vulnerability - Active in CISA KEV catalog.
Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability - Active in CISA KEV catalog.
JetBrains TeamCity Relative Path Traversal Vulnerability - Active in CISA KEV catalog.
Microsoft Defender Insufficient Granularity of Access Control Vulnerability - Active in CISA KEV catalog.
A path traversal flaw in the Froxlor API allows authenticated customers to execute arbitrary PHP code via the `def_language` parameter.
An injection vulnerability in Froxlor's `PhpHelper` allows administrators to inject and execute arbitrary PHP code via unescaped string literals.
Jellystat is vulnerable to SQL injection and subsequent remote code execution due to improper sanitization of user-supplied data in API endpoints.
ThinkPHP 5.0.23 contains a remote code execution vulnerability that allows unauthenticated attackers to execute commands via malicious routing parameters.
Xerte Online Toolkits 3.15 and earlier allow unauthenticated attackers to upload and execute malicious PHP code via an elFinder connector flaw.
The Sendmachine for WordPress plugin is vulnerable to an authorization bypass, allowing unauthenticated attackers to modify SMTP configurations.
ELBA5 5.8.0 contains a hardcoded credential and RCE vulnerability, allowing attackers to execute commands with SYSTEM-level privileges.
The Breeze Cache plugin for WordPress is vulnerable to unauthenticated arbitrary file uploads via the Gravatar fetching function.
The Create DB Tables plugin for WordPress is vulnerable to authorization bypass, allowing authenticated attackers to drop or create database tables.
OAuth2 Proxy is vulnerable to authentication bypass when configured with specific headers and skip-auth rules, allowing unauthorized access to protected routes.
WWBN AVideo is vulnerable to server-side request forgery (SSRF) and potential command injection due to insufficient URL validation.
An unauthenticated remote code execution vulnerability exists in Paperclip due to improper handling of API calls in default configurations.
A privilege escalation vulnerability in Infor web applications allows standard users to gain super administrator access via parameter manipulation.
A path traversal vulnerability in EspoCRM's formula scripting engine allows authenticated administrators to read or write arbitrary files on the server.
A logic error in the Nimiq block proof verification process allows attackers to bypass quorum requirements using manipulated BLS signatures.
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services)
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Core)
Vulnerability in the Oracle Life Sciences Empirica Signal product of Oracle Life Science Applications (component: Common Core)
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Security)
Vulnerability in the Oracle Application Development Framework (ADF) product of Oracle Fusion Middleware (component: ADF Faces)
Vulnerability in the Oracle Applications DBA product of Oracle E-Business Suite (component: ADPatch)
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Platform)
Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core)
Vulnerability in the Oracle HCM Common Architecture product of Oracle E-Business Suite (component: Knowledge Integration)
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Platform)
Vulnerability in the Oracle Financial Services Customer Screening product of Oracle Financial Services Applications (component: User Interface)
Vulnerability in the Java VM component of Oracle Database Server
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle Financial Services Transaction Filtering product of Oracle Financial Services Applications (component: User Interface)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Kyverno is a policy engine designed for cloud native platform engineering teams
In Dolibarr ERP & CRM <= 22
In the Website module of Dolibarr ERP & CRM 22
A vulnerability exists in the chroot utility of uutils coreutils when using the --userspec option
The installers of LiveOn Meet Client for Windows (Downloader5Installer
Xerte Online Toolkits versions 3
Use-after-free in the DOM: Core & HTML component
Use-after-free in the JavaScript Engine component
Mitigation bypass in Firefox for Android
Use-after-free in the JavaScript: WebAssembly component
Memory safety bugs present in Firefox 149 and Thunderbird 149
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP)
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking)
free5GC UDR is the Policy Control Function (PCF) for free5GC, an an open-source project for 5th generation (5G) mobile core networks
Dell PowerProtect Data Domain with Domain Operating System (DD OS) of Feature Release versions 7
WWBN AVideo is an open source video platform
FreeScout is a free self-hosted help desk and shared mailbox
WWBN AVideo is an open source video platform
WWBN AVideo is an open source video platform
WWBN AVideo is an open source video platform
Vulnerability in Spring Spring Security
NVIDIA KAI Scheduler contains a vulnerability where an attacker could access API endpoints without authorization
pyLoad is a free and open-source download manager written in Python
An issue was discovered in guardsix (formerly Logpoint) ODBC Enrichment Plugins before 5
HKUDS OpenHarness prior to PR #156 remediation exposes plugin lifecycle commands including /plugin install, /plugin enable, /plugin disable, and /reload-plugins to remote senders by default
PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API
NVIDIA CUDA-Q contains a vulnerability in an endpoint, where an unauthenticated attacker could cause an out-of-bounds read by sending a maliciously crafted request
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18
Vulnerability related to an unquoted search path in CivetWeb v1
HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit allow_from = ["*"] permitting arbitrary remote senders to pass admission checks
OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines
Hermes WebUI contains an arbitrary file deletion vulnerability in the /api/session/delete endpoint that allows authenticated attackers to delete files outside the session directory by supplying an absolute path or path traversal payload in the session_id parameter
Privilege escalation in the Networking component
Privilege escalation in the Debugger component
A SQL injection vulnerability exists in Genesys Latitude v25
OpenRemote is an open-source internet-of-things platform
Let's Encrypt client and ACME library written in Go (Lego)
A flaw was found in InstructLab
Paperclip is a Node
Beghelli Sicuro24 SicuroWeb embeds AngularJS 1
WWBN AVideo is an open source video platform
WeKan before 8
Froxlor is open source server administration software
In NTFS-3G 2022
Compressing is a compressing and uncompressing lib for node
The implementation of TIOCNOTTY failed to clear a back-pointer from the structure representing the controlling terminal to the calling process' session
Terminal Services Manager 3
MAGIX Music Editor 3
Iperius Backup 5
LanSpy 2
LanSpy 2
RustFS is a distributed object storage system built in Rust
WeKan before 8
blueprintUE is a tool to help Unreal Engine developers
LinkAce is a self-hosted archive to collect website links
WWBN AVideo is an open source video platform
In ProgressÂŽ TelerikÂŽ UI for AJAX versions 2024
Statamic is a Laravel and Git powered content management system (CMS)
Incorrect boundary conditions in the WebRTC: Networking component
A flaw was found in binutils
radare2 prior to 6
FreeScout is a free self-hosted help desk and shared mailbox
Use-after-free in the WebRTC component
Information disclosure due to uninitialized memory in the Graphics: Canvas2D component
Use-after-free in the Widget: Cocoa component
Incorrect boundary conditions in the Libraries component in NSS
Incorrect boundary conditions in the Libraries component in NSS
Denial-of-service due to integer overflow in the Graphics: WebGPU component
Denial-of-service in the Audio/Video: Playback component
Denial-of-service in the Audio/Video: Playback component
Information disclosure in the IP Protection component
blueprintUE is a tool to help Unreal Engine developers
Coturn is a free open source implementation of TURN and STUN Server
Parsing a WEBP image with an invalid, large size panics on 32-bit platforms
Decidim is a participatory democracy framework
Decidim is a participatory democracy framework
Nest is a framework for building scalable Node
The package `github
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines