CVE-2026-20700
A memory corruption vulnerability in Apple software was addressed through improved state management to prevent potential exploitation.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Wednesday's vulnerability disclosures include two CVSS 10.0 flaws affecting HP FreeScout (CVE-2026-28289) and the MedEx module for OpenEMR (CVE-2026-24898), both enabling full system compromise. The day's 13 critical CVEs represent a 24% decrease from the prior day, while 100 high-priority vulnerabilities mark a 45% increase over Tuesday's count. Additional critical issues target Apache Ranger (CVE-2025-59059), D-Link DIR routers (CVE-2026-3485), and a Microsoft 365 WordPress SSO plugin (CVE-2026-2628), all carrying CVSS 9.8 scores. Attack patterns center on remote code execution and authentication bypass across healthcare, networking, and enterprise collaboration platforms, with 13 CVEs confirmed under active exploitation including flaws in Apple OS, Google Chromium, Roundcube Webmail, and VMware Aria Operations. No patches are currently available for today's disclosed vulnerabilities, requiring organizations to implement compensating controls and monitor vendor advisories.
Immediate action: Prioritize network segmentation and access restrictions for HP FreeScout, OpenEMR MedEx, D-Link DIR routers, and Apache Ranger deployments given maximum-severity scores and no available patches. Monitor vendor security advisories for patch releases on all 13 actively exploited vulnerabilities, particularly Apple OS, Google Chromium, and VMware Aria Operations, and apply updates immediately upon availability.
A memory corruption vulnerability in Apple software was addressed through improved state management to prevent potential exploitation.
Microsoft Configuration Manager SQL Injection Vulnerability - Active in CISA KEV catalog.
Notepad++ Download of Code Without Integrity Check Vulnerability - Active in CISA KEV catalog.
Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability - Active in CISA KEV catalog.
TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability - Active in CISA KEV catalog.
Google Chrome is vulnerable to a "Use After Free" condition in its CSS engine, which could allow a remote attacker to execute arbitrary code via a crafted webpage.
GitLab Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
RoundCube Webmail Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
RoundCube Webmail Cross-site Scripting Vulnerability - Active in CISA KEV catalog.
FileZen is affected by a high-severity OS command injection vulnerability that allows a threat actor to execute arbitrary commands on the underlying operating system.
VMware Aria Operations contains a command injection vulnerability that could allow an attacker to execute arbitrary commands on the affected system.
A TOCTOU flaw in FreeScout's file upload sanitization allows authenticated users to achieve RCE by uploading malicious .htaccess files using zero-width space prefixes.
A remote code execution (RCE) vulnerability exists in the NashornScriptEngineCreator component of Apache Ranger versions 2.7.0 and earlier.
The All-in-One Microsoft 365 SSO Login plugin for WordPress allows unauthenticated attackers to bypass authentication and gain full administrative access due to an insecure login implementation.
A heap-based buffer overflow in libbiosig's Intan CLP parsing allows for arbitrary code execution via a specially crafted file. This critical flaw stems from improper memory handling.
An authentication bypass in OpenSTAManager allows attackers to arbitrarily modify user groups, leading to full administrative privilege escalation.
The RegistrationMagic WordPress plugin allows unauthenticated attackers to create administrator accounts by exploiting improper privilege management during the membership registration process.
A stored cross-site scripting (XSS) vulnerability in AliasVault Web Client allows attackers to execute malicious JavaScript in the victim's browser via crafted emails.
An OS command injection vulnerability in the D-Link DIR-868L SSDP service allows unauthenticated remote attackers to execute arbitrary commands via the ST argument.
A typo in Froxlor's input validation enables an authenticated administrator to achieve root-level remote code execution via shell command injection.
An unauthenticated token disclosure in OpenEMR's MedEx callback endpoint leaks API tokens, leading to PHI exfiltration and HIPAA violations.
OpenMQ's imqbrokerd service uses a default administrative account (admin/admin) and fails to enforce password changes, allowing remote attackers full control.
OpenEMR leaks gateway_api_key secrets in plaintext to the client, enabling unauthorized financial transactions and account takeovers of payment gateways.
A command injection vulnerability in the DHCP activation feature of Weintek cMT-3072XH2 allows attackers to execute arbitrary commands with root privileges.
A memory corruption vulnerability exists in memory allocation processes when handling specific alignments, potentially leading to arbitrary code execution or system instability.
The Master Addons for Elementor Premium plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2
Microsoft Exchange Server (through 2019) ActiveSync configurations may transmit sensitive user data, including passwords and bearer tokens, in cleartext when communicating with Samsung devices.
The LatePoint â Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to privilege escalation via password reset in all versions up to, and including, 5
The WP Zendesk for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form submission data in all versions up to, and including, 1
A heap-based buffer overflow vulnerability exists in the Nicolet WFT parsing functionality of The Biosig Project libbiosig 3
The Contest Gallery â Upload & Vote Photos, Media, Sell with PayPal & Stripe plugin for WordPress is vulnerable to blind SQL Injection via the âcgLostPasswordEmailâ and the âcgl_mailâ parameter in all versions up to, and including, 28
NocoDB is affected by a high-severity vulnerability that could compromise the security of database-driven spreadsheets and the underlying platform.
AFFiNE is an open-source, all-in-one workspace and an operating system
The Page Builder by SiteOrigin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2
Dell Command | Intel vPro Out of Band versions prior to 4 contain a high-severity vulnerability that could permit unauthorized management operations.
Textream for macOS is affected by a security vulnerability that could allow for unauthorized interactions with the teleprompter application environment.
The Uncanny Automator â Easy Automation, Integration, Webhooks & Workflow Builder Plugin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 7
The Post Grid Gutenberg Blocks for News, Magazines, Blog Websites â PostX plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5
The WPBookit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpb_user_name' and 'wpb_user_email' parameters in all versions up to, and including, 1
Dell Optimizer, versions prior to 6
Chamilo is a learning management system
Chamilo is a learning management system
Chamilo is a learning management system
Chamilo is a learning management system
Chamilo is a learning management system
Chamilo is a learning management system
sourcecodester Personnel Property Equipment System v1
Chamilo is a learning management system
Chamilo is a learning management system
joserfc is a Python library that provides an implementation of several JSON Object Signing and Encryption (JOSE) standards
In exitKeyguardAndFinishSurfaceBehindRemoteAnimation of KeyguardViewMediator
Delta Electronics CNCSoft-G2Â lacks proper validation of the user-supplied file
An issue was discovered in /goform/WifiWpsStart in Tenda AC6V2
Improper certificate validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass certificate chain verification when processing PKCS7 objects with multiple signers, except the final signer
Improper signature validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass signature verification when processing PKCS7 objects with Authenticated Attributes
Tenda AX3 firmware v16
An authentication bypass vulnerability in the authorization mechanism of Weintek cMT-3072XH2 easyweb v2
A command injection vulnerability in the szc script of the ccurtsinger/stabilizer repository allows remote attackers to execute arbitrary system commands via unsanitized user input passed to os
In multiple locations, there is a possible information disclosure due to SQL injection
In multiple locations, there is a possible privilege escalation due to a confused deputy
Chamilo is a learning management system
In broadcastIntentLockedTraced of BroadcastController
A security vulnerability has been detected in LLM-Claw 0
In writeToParcel of WindowInfo
ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI
In UsageEvents of UsageEvents
In validateAddingWindowLw of DisplayPolicy
In multiple functions of MediaProvider
In multiple locations, there is a possible way to delete media without the MANAGE_EXTERNAL_STORAGE permission due to an intent redirect
In multiple functions of KeyguardViewMediator
In multiple functions of ContentProvider
In openFile of BugreportContentProvider
In onTransact of IDrmManagerService
In enableSystemPackageLPw of Settings
In setupLayout of PickActivity
In parsePermissionGroup of ParsedPermissionUtils
In hasInteractAcrossUsersFullPermission of AppInfoBase
In hasImage of Notification
In __pkvm_host_share_guest of mem_protect
In __pkvm_init_vm of pkvm
In __host_check_page_state_range of mem_protect
In multiple functions of mem_protect
In setPackageOrComponentEnabled of ManagedServices
In createRequest of MediaProvider
In multiple functions of ffa
In multiple functions of mem_protect
In dumpBitmapsProto of ActivityManagerService
theshit is a command-line utility that automatically detects and fixes common mistakes in shell commands
Chamilo is a learning management system
Memory Corruption when accessing buffers with invalid length during TA invocation
Memory corruption while handling different IOCTL calls from the user-space simultaneously
Memory Corruption when concurrent access to shared buffer occurs during IOCTL calls
Memory Corruption when accessing a buffer after it has been freed while processing IOCTL calls
Memory Corruption when concurrent access to shared buffer occurs due to improper synchronization between assignment and deallocation of buffer resources
Memory Corruption while processing IOCTL calls when concurrent access to shared buffer occurs
Memory Corruption when accessing trusted execution environment without proper privilege check
Memory Corruption while invoking IOCTL calls when concurrent access to shared buffer occurs
Memory Corruption when adding user-supplied data without checking available buffer space
Memory Corruption when processing invalid user address with nonstandard buffer address
In multiple locations, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization
In multiple functions of MediaProvider
In VBMeta, there is a possible way to modify and resign VBMeta using a test key, assuming the original image was previously signed with the same key
In loadDescription of DeviceAdminInfo
In executeRequest of ActivityStarter
In loadDataAndPostValue of multiple files, there is a possible way to obscure permission usage due to a logic error in the code
In onStart of CompanionDeviceManagerService
In createSessionInternal of PackageInstallerService
In removePermission of PermissionManagerServiceImpl
In multiple functions of mem_protect
OpenViking versions 0
In multiple functions of TaskFragmentOrganizerController
In onChange of BiometricService
An issue was discovered in 6
In multiple locations, there is a possible lockscreen bypass due to a race condition
In multiple functions of KeyguardViewMediator
In drawLayersInternal of SkiaRenderEngine
HomeBox is a home inventory and organization system
In relayoutWindow of WindowManagerService
Chamilo is a learning management system
Weak configuration may lead to cryptographic issue when a VoWiFi call is triggered from UE
Incorrect access control in the component /opt/SRLtzm/bin/TapeDumper of Cohesity TranZman Migration Appliance Release 4
An authenticated arbitrary file upload vulnerability in Cohesity TranZman Migration Appliance Release 4
Cohesity TranZman Migration Appliance Release 4
Multiple authenticated OS command injection vulnerabilities exist in the Cohesity (formerly Stone Ram) TranZman 4