CVE-2020-25078
D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
This week's threat landscape delivered 109 critical vulnerabilities and 48 actively exploited CISA KEV entries, marking an intense period for security teams. D-Link surveillance infrastructure faces catastrophic authentication bypass exposures with federal deadlines expiring Monday. Friday brings fresh threats including Salesforce Tableau type confusion (CVE-2025-26496, CVSS 9.6) and Voltronic Power management systems with perfect CVSS 10 remote code execution. The week saw WordPress ecosystem under sustained attack, Microsoft Office vulnerabilities resurface in KEV catalog, and critical authentication bypasses across enterprise platforms.
Immediate action: URGENT: D-Link DCS-2530L, DCS-2670L, and DNR-322L devices must be isolated or replaced by Monday federal deadline. Patch Voltronic Power ViewPower/PowerShield immediately. Review and secure all Tableau Server instances.
D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability - Active in CISA KEV catalog.
D-Link DCS-2530L and DCS-2670L Command Injection Vulnerability - Active in CISA KEV catalog.
D-Link DNR-322L Download of Code Without Integrity Check Vulnerability - Active in CISA KEV catalog.
RARLAB WinRAR Path Traversal Vulnerability - Active in CISA KEV catalog.
Microsoft Office Excel Remote Code Execution Vulnerability - Active in CISA KEV catalog.
Microsoft Internet Explorer Resource Management Errors Vulnerability - Active in CISA KEV catalog.
Trend Micro Apex One OS Command Injection Vulnerability - Active in CISA KEV catalog.
Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability - Active in CISA KEV catalog.
Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in Salesforce Tableau Server, Tableau Desktop on Windows, Linux (File Upload modules) allows Local Code Inclusion.This issue...
MallChat v1.0-SNAPSHOT has an authentication bypass vulnerability. An attacker can exploit this vulnerability to access API without any token.
Voltronic Power ViewPower through 1.04-24215, ViewPower Pro through 2.0-22165, and PowerShield Netguard before 1.04-23292 allows a remote attacker to run arbitrary code via an unspecified web interfac...
WebITR developed by Uniong has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to log into the system as arbitrary users by exploiting a specific functionality.
Voltronic Power ViewPower through 1.04-21353 and PowerShield Netguard before 1.04-23292 allows a remote attacker to configure the system via an unspecified web interface. An unauthenticated remote att...
spimsimulator spim v9.1.24 and before is vulnerable to Buffer Overflow in READ_STRING_SYSCALL.
An authentication bypass vulnerability in anji-plus AJ-Report up to v1.4.2 allows unauthenticated attackers to execute arbitrary code via a crafted URL.
Tenda O3V2 1.0.0.12(3880) is vulnerable to Buffer Overflow in the fromSafeSetMacFilter function via the mac parameter.
Incorrect access control in the doFilter function of my-site v1.0.2.RELEASE allows attackers to access sensitive components without authentication.
WebITR developed by Uniong has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents
Improper Input Validation vulnerability in Salesforce Tableau Server on Windows, Linux (tabdoc api - create-data-source-from-file-upload modules) allows Absolute Path Traversal
The Inspiro theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2
Untrusted pointer dereference in Windows MBT Transport driver allows an authorized attacker to elevate privileges locally
In MindManager Windows versions prior to 24
An issue was discovered in the changePassword method in file /usr/share/php/openmediavault/system/user
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Storage allows an unauthorized attacker to execute code over a network
A vulnerability was identified in PHPGurukul User Management System 1
A flaw has been found in PHPGurukul Online Course Registration 3
The WP Talroo WordPress plugin through 2
SQL Injection vulnerability in Apache StreamPark
Dell iDRAC Service Module (iSM), versions prior to 6
QuantumNous new-api v
An authentication bypass vulnerability in PandoraNext-TokensTool v0
A buffer overflow vulnerability exists in libsndfile version 1
A vulnerability was detected in Tenda i22 1
A flaw has been found in Tenda M3 1
A vulnerability has been found in Tenda M3 1
Incorrect access control in the component \controller\RoleController
Incorrect access control in the component \controller\ResourceController
A security flaw has been discovered in TOTOLINK A720R 4
A Reflected Cross Site Scripting (XSS) vulnerability was found in /index
UnoPim is an open-source Product Information Management (PIM) system built on the Laravel framework
WeGIA is a Web manager for charitable institutions
Aikaan IoT management platform v3
hippo4j 1
Audiobookshelf is an open-source self-hosted audiobook server
OperaMasks SDK ELite Script Engine v0
On the monitoring event logs page, it is possible to alter the http request to insert a payload in the DB
A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Moss before v0
On N-central, it is possible for any authenticated user to read, write and modify syslog configuration across customers on an N-central server
An issue was discovered in Shopizer 3
UnoPim is an open-source Product Information Management (PIM) system built on the Laravel framework
Roo Code is an AI-powered autonomous coding agent that lives in users' editors
UnoPim is an open-source Product Information Management (PIM) system built on the Laravel framework
IBM QRadar SIEM 7
Tenda AC15 v15
vLLM is an inference and serving engine for large language models (LLMs)
Unauthorized users can access INFINITT PACS System ManagerΒ without proper authorization, which could lead to unauthorized access to system resources
Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime - firmware v3
Incorrect access control in the RTMP server settings of Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime - firmware v3
A weakness has been identified in SourceCodester Online Bank Management System 1
A security vulnerability has been detected in SourceCodester Online Bank Management System 1
A vulnerability was identified in itsourcecode Apartment Management System 1
Insecure permissions in Agent-Zero v0
A discrepancy in the error message returned by the login function of Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime - firmware v3
D-Link DCS-825L firmware version 1
User with high privileges is able to introduce a SQLi using the Meta Service indicator page
The vulnerability, if exploited, could allow an authenticated miscreant (with privileges to create or access publication targets of type Text File or HDFS) to upload and persist files that could potentially be executed
HTML injection vulnerability in the registration interface in Evolution Consulting Kft