CVE-2012-1854
Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Saturday's disclosures center on Azure IoT Central, Saltcorn, and Clerk identity platforms, with multiple critical flaws scoring 9.8 or higher across cloud and authentication infrastructure. The brief covers 19 critical CVEs (down 49% from yesterday) and 72 high-priority issues (down 21%). Notable critical entries include CVE-2026-21515 (CVSS 9.9) in Azure IoT Central, CVE-2026-41478 (CVSS 9.9) in Saltcorn, and CVE-2026-1949 (CVSS 9.8) in Delta Electronics AS320T industrial controllers. Remote code execution and authentication bypass dominate the attack patterns, with cloud services, ICS hardware, and developer authentication libraries all represented. Patches are not yet broadly available for today's disclosures, so defenders should rely on access controls and monitoring while vendor fixes propagate.
Immediate action: Prioritize Azure IoT Central, Saltcorn, Clerk, and Delta Electronics AS320T deployments for immediate review, and isolate exposed instances pending vendor fixes. With no patches yet available for today's critical CVEs, apply network segmentation, restrict management interfaces, and monitor for exploitation indicators on Microsoft, Adobe, and SimpleHelp products listed in the actively exploited set.
Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Link Following Vulnerability - Active in CISA KEV catalog.
Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Out-of-Bounds Read Vulnerability - Active in CISA KEV catalog.
Adobe Acrobat Use-After-Free Vulnerability - Active in CISA KEV catalog.
Adobe Acrobat Reader is vulnerable to prototype pollution, which can result in arbitrary code execution when a victim opens a malicious file.
Microsoft Office Remote Code Execution - Active in CISA KEV catalog.
Microsoft SharePoint Server Improper Input Validation Vulnerability - Active in CISA KEV catalog.
Apache ActiveMQ Improper Input Validation Vulnerability - Active in CISA KEV catalog.
Kentico Xperience Path Traversal Vulnerability - Active in CISA KEV catalog.
PaperCut NG/MF Improper Authentication Vulnerability - Active in CISA KEV catalog.
Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability - Active in CISA KEV catalog.
JetBrains TeamCity Relative Path Traversal Vulnerability - Active in CISA KEV catalog.
Microsoft Defender Insufficient Granularity of Access Control Vulnerability - Active in CISA KEV catalog.
Marimo Remote Code Execution Vulnerability - Active in CISA KEV catalog.
D-Link DIR-823X Command Injection Vulnerability - Active in CISA KEV catalog.
Samsung MagicINFO 9 Server Path Traversal Vulnerability - Active in CISA KEV catalog.
SimpleHelp Path Traversal Vulnerability - Active in CISA KEV catalog.
SimpleHelp Missing Authorization Vulnerability - Active in CISA KEV catalog.
BridgeHead FileStore versions prior to 24A (released in early 2024) expose the Apache Axis2 administration module on network-accessible endpoints with default credentials that allows unauthenticated remote attackers to execute arbitrary OS commands. Attackers can authenticate to the admin console using default credentials, upload a malicious Java archive as a web service, and execute arbitrary commands on the host via SOAP requests to the deployed service.
Exposure of sensitive information to an unauthorized actor in Azure IOT Central allows an authorized attacker to elevate privileges over a network.
Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, a vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configuration where ACL is not enabled. The attack is a single HTTP POST to /mutate?commitNow=true containing a crafted cond field in an upsert mutation. The cond value is concatenated directly into a DQL query string via strings.Builder.WriteString after only a cosmetic strings.Replace transformation. No escaping, parameterization, or structural validation is applied. An attacker injects an additional DQL query block into the cond string, which the DQL parser accepts as a syntactically valid named query block. The injected query executes server-side and its results are returned in the HTTP response. This vulnerability is fixed in 25.3.3.
Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.6, 1.5.6, and 1.6.0-beta.5, a SQL injection vulnerability in Saltcornβs mobile-sync routes allows any authenticated low-privilege user with read access to at least one table to inject arbitrary SQL through sync parameters. This can lead to full database exfiltration, including admin password hashes and configuration secrets, and may also enable database modification or destruction depending on the backend. This vulnerability is fixed in 1.4.6, 1.5.6, and 1.6.0-beta.5.
Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, Dgraphl exposes the process command line through the unauthenticated /debug/vars endpoint on Alpha. Because the admin token is commonly supplied via the --security "token=..." startup flag, an unauthenticated attacker can retrieve that token and replay it in the X-Dgraph-AuthToken header to access admin-only endpoints. This is a variant of the previously fixed /debug/pprof/cmdline issue, but the current fix is incomplete because it blocks only /debug/pprof/cmdline and still serves http.DefaultServeMux, which includes expvar's /debug/vars handler. This vulnerability is fixed in 25.3.3.
Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, a vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configuration where ACL is not enabled. The attack requires two HTTP POSTs to port 8080. The first sets up a schema predicate with @unique @index(exact) @lang via /alter (also unauthenticated in default config). The second sends a crafted JSON mutation to /mutate?commitNow=true where a JSON key contains the predicate name followed by @ and a DQL injection payload in the language tag position. The injection exploits the addQueryIfUnique function in edgraph/server.go, which constructs DQL queries using fmt.Sprintf with unsanitized predicateName that includes the raw pred.Lang value. The Lang field is extracted from JSON mutation keys by x.PredicateLang(), which splits on @, and is never validated by any function in the codebase. The attacker injects a closing parenthesis to escape the eq() function, adds an arbitrary named query block, and uses a # comment to neutralize trailing template syntax. The injected query executes server-side and its results are returned in the HTTP response. This vulnerability is fixed in 25.3.3.
Clerk JavaScript is the official JavaScript repository for Clerk authentication. createRouteMatcher in @clerk/nextjs, @clerk/nuxt, and @clerk/astro can be bypassed by certain crafted requests, allowing them to skip middleware gating and reach downstream handlers. This vulnerability is fixed in @clerk/astro 1.5.7, 2.17.10, and 3.0.15; @clerk/nextjs 5.7.6, 6.39.2, and 7.2.1; @clerk/nuxt 1.13.28 and 2.2.2; and @clerk/shared 2.22.1, 3.47.4, anc 4.8.1
Delta Electronics AS320T is vulnerable to a stack-based buffer overflow due to incorrect buffer size calculations in its web service's GET/PUT request handler.
Missing JWT signature verification in AWS Ops Wheel allows unauthenticated attackers to forge JWT tokens and gain unintended administrative access to the application, including the ability to read, modify, and delete all application data across tenants and manage Cognito user accounts within the deployment's User Pool, via a crafted JWT sent to the API Gateway endpoint. To remediate this issue, users should redeploy from the updated repository and ensure any forked or derivative code is patched to incorporate the new fixes.
Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent --config form. If untrusted input can reach the options argument passed to simple-git, an attacker may still achieve remote code execution by enabling protocol.ext.allow=always and using an ext:: clone source.
Delta Electronics AS320T has No checking of the length of the buffer with the file name vulnerability.
Delta Electronics AS320T has no checking of the length of the buffer with the directory name vulnerability.
Delta Electronics AS320T has denial of service via the undocumented subfunctionΒ vulnerability.
A vulnerability inΒ SenseLiveΒ X3050βs remote management service allows firmware retrieval and update operations to be performed without authentication or authorization. The service accepts firmware-related requests from any reachable host and does not verify user privileges, integrity of uploaded images, or the authenticity of provided firmware.
A vulnerability in the SenseLive X3050 web management interface allows unauthorized modification of configuration parameters, leading to a persistent Denial-of-Service (DoS).
Budibase contains an authentication bypass vulnerability where unanchored regular expressions allow attackers to access protected endpoints via crafted query strings.
The SenseLive X3050 web management interface is vulnerable to an authentication bypass due to client-side logic that relies on hardcoded values instead of secure server-side verification.
The SenseLive X3050 embedded management service lacks any authentication or authorization, allowing unauthenticated attackers full administrative control over the device.
Improper access control enforcement in the SenseLive X3050 web management interface allows unauthorized users to interact with sensitive configuration endpoints.
OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology
Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized attacker to elevate privileges over a network
Race in GPU in Google Chrome on Windows prior to 147
The Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to, and including, 1
Uncontrolled search path element in Microsoft Power Apps allows an unauthorized attacker to execute code over a network
OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology
Xibo is an open source digital signage platform with a web content management system and Windows display player software
Contour is a Kubernetes ingress controller using Envoy proxy
arduino-esp32 is an Arduino core for the ESP32, ESP32-S2, ESP32-S3, ESP32-C3, ESP32-C6 and ESP32-H2 microcontrollers
Open Source Social Network (OSSN) is open-source social networking software developed in PHP
Kyverno is a policy engine designed for cloud native platform engineering teams
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ, Apache ActiveMQ Broker, Apache ActiveMQ All
Kyverno is a policy engine designed for cloud native platform engineering teams
Kyverno is a policy engine designed for cloud native platform engineering teams
Axios is a promise based HTTP client for the browser and Node
Axios is a promise based HTTP client for the browser and Node
The ExactMetrics β Google Analytics Dashboard for WordPress (Website Stats Plugin) plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation in all versions up to, and including, 9
Axios is a promise based HTTP client for the browser and Node
Incorrect Authorization vulnerability in Apache DolphinScheduler allows authenticated users with system login permissions to use tenants that are not defined on the platform during workflow execution
Flowise is a drag & drop user interface to build a customized large language model flow
Improperly controlled modification of dynamically-determined object attributes in the Cognito User Pool configuration in AWS Ops Wheel before PR #165 allows remote authenticated users to escalate to deployment admin privileges and manage Cognito user accounts via a crafted UpdateUserAttributes API call that sets the custom:deployment_admin attribute
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes
ERB is a templating system for Ruby
pretalx is a conference planning tool
lxml is a library for processing XML and HTML in the Python language
DWM-222W USB Wi-Fi Adapter developed by D-Link has a Brute-Force Protection Bypass vulnerability, allowing unauthenticated adjacent network attackers to bypass login attempt limits to perform brute-force attacks to gain control over the device
Tempo queries with large limits can cause large memory allocations which can impact the availability of the service, depending on its deployment strategy
Skim is a fuzzy finder designed to through files, lines, and commands
Flowise is a drag & drop user interface to build a customized large language model flow
OpenClaw before 2026
The LabOne Web Server, backing the LabOne User Interface, contains insufficient input validation in its file access functionality
Flowise is a drag & drop user interface to build a customized large language model flow
Flowise is a drag & drop user interface to build a customized large language model flow
Flowise is a drag & drop user interface to build a customized large language model flow
OpenClaw before 2026
OpenClaw before 2026
Actual is a local-first personal finance tool
Math
SiYuan is an open-source personal knowledge management system
A flaw was found in OVN (Open Virtual Network)
SocialEngine versions 7
OpenTelemetry eBPF Instrumentation provides eBPF instrumentation based on the OpenTelemetry standard
Flowise is a drag & drop user interface to build a customized large language model flow
Flowise is a drag & drop user interface to build a customized large language model flow
Flowise is a drag & drop user interface to build a customized large language model flow
OpenClaw before 2026
A vulnerability inΒ SenseLiveΒ X3050's web management interface allows state-changing operations to be triggered without proper Cross-Site Request Forgery (CSRF) protections
A vulnerability exists inΒ SenseLive X3050βs web management interface in which password updates are not reliably applied due to improper handling of credential changes on the backend
A vulnerability inΒ SenseLiveΒ X3050's web management interface allows critical system and network configuration parameters to be modified without sufficient validation and safety controls
A flaw was found in the X
A flaw was found in the X
A flaw was found in the X
OpenClaw before 2026
Deskflow is a keyboard and mouse sharing app
NSIS (Nullsoft Scriptable Install System) 3
4ga Boards is a boards system for realtime project management
Flowise is a drag & drop user interface to build a customized large language model flow
Flowise is a drag & drop user interface to build a customized large language model flow
Flowise is a drag & drop user interface to build a customized large language model flow
A vulnerability inΒ SenseLiveΒ X3050βs management ecosystem allows unauthenticated discovery of deployed units through the vendorβs management protocol, enabling identification of device presence, identifiers, and management interfaces without requiring credentials
basic-ftp is an FTP client for Node
Zserio is a framework for serializing structured data with a compact and efficient way with low overhead
Zserio is a framework for serializing structured data with a compact and efficient way with low overhead
Yadea T5 Electric Bicycles (models manufactured in/after 2024) have a weak authentication mechanism in their keyless entry system
OpenClaw before 2026
OpenShell before 2026
Flowise is a drag & drop user interface to build a customized large language model flow
Flowise is a drag & drop user interface to build a customized large language model flow
radare2 prior to 6
OpenClaw before 2026
OpenClaw before 2026