CVE-2025-10585
Google Chromium V8 Type Confusion Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
This week witnessed unprecedented volatility in the security landscape, with critical vulnerabilities surging from just 2 on Saturday to 16 by week's end - a 700% increase. The WordPress ecosystem emerged as the primary target with over a dozen plugin vulnerabilities including SQL injection flaws in Community Events and RegistrationMagic plugins. Federal agencies face immediate pressure with 20 CISA KEV vulnerabilities carrying imminent compliance deadlines. Most concerning is the patch availability crisis, dropping to just 15% by Friday, leaving organizations vulnerable through the weekend. Enterprise systems including Newforma Info Exchange and multiple Tenda router models require urgent attention.
Immediate action: Weekend teams must prioritize WordPress plugin updates, especially Community Events and RegistrationMagic with CVSS 10.0 scores. Deploy WAF rules for SQL injection protection across all WordPress instances. Review and implement compensating controls for the 85% of vulnerabilities lacking patches. Monitor for exploitation attempts on Newforma Info Exchange and Tenda router infrastructure.
Google Chromium V8 Type Confusion Vulnerability - Active in CISA KEV catalog.
Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability - Active in CISA KEV catalog.
Libraesva Email Security Gateway Command Injection Vulnerability - Active in CISA KEV catalog.
Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability - Active in CISA KEV catalog.
Adminer Server-Side Request Forgery Vulnerability - Active in CISA KEV catalog.
GNU Bash OS Command Injection Vulnerability - Active in CISA KEV catalog.
Jenkins Remote Code Execution Vulnerability - Active in CISA KEV catalog.
Juniper ScreenOS Improper Authentication Vulnerability - Active in CISA KEV catalog.
Samsung Mobile Devices Out-of-Bounds Write Vulnerability - Active in CISA KEV catalog.
Smartbedded Meteobridge Command Injection Vulnerability - Active in CISA KEV catalog.
Linux Kernel Heap Out-of-Bounds Write Vulnerability - Active in CISA KEV catalog.
Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Privilege Escalation Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Out-of-Bounds Write Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Remote Code Execution Vulnerability - Active in CISA KEV catalog.
Mozilla Multiple Products Remote Code Execution Vulnerability - Active in CISA KEV catalog.
Oracle E-Business Suite Unspecified Vulnerability - Active in CISA KEV catalog.
Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability - Active in CISA KEV catalog.
Grafana Path Traversal Vulnerability - Active in CISA KEV catalog.
The Community Events plugin for WordPress is vulnerable to SQL Injection via the âevent_venueâ parameter in all versions up to, and including, 1.5.1 due to insufficient escaping on the user supplied p...
Newforma Info Exchange (NIX) accepts serialized .NET data via the '/remoteweb/remote.rem' endpoint, allowing a remote, unauthenticated attacker to execute arbitrary code with 'NT AUTHORITY\NetworkServ...
The Search & Go - Directory WordPress Theme theme for WordPress is vulnerable to Authentication Bypass via account takeover in all versions up to, and including, 2.7. This is due to insufficient user ...
SourceCodester Pet Grooming Management Software 1.0 is vulnerable to SQL Injection in admin/view_customer.php via the ID parameter.
JEEWMS 20250820 is vulnerable to SQL Injection in the exportXls function located in the src/main/java/org/jeecgframework/web/cgreport/controller/excel/CgExportExcelController.java file.
The WP Travel Engine â Tour Booking Plugin â Tour Operator Software plugin for WordPress is vulnerable to arbitrary file deletion (via renaming) due to insufficient file path validation in the set_use...
The WP Travel Engine â Tour Booking Plugin â Tour Operator Software plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 6.6.7 via the mode parameter. This ...
Azure Entra ID Elevation of Privilege Vulnerability
Azure Entra ID Elevation of Privilege Vulnerability
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to store script tags directly in web pages that...
Grafana Image Renderer is vulnerable to remote code execution due to an arbitrary file write vulnerability. This is due to the fact that the /render/csv endpoint lacked validation of the filePath para...
BBOT's unarchive module could be abused by supplying malicious archives files and when extracted can then perform an arbitrary file write, resulting in remote code execution.
Newforma Project Center Server (NPCS) accepts serialized .NET data via the '/ProjectCenter.rem' endpoint on 9003/tcp, allowing a remote, unauthenticated attacker to execute arbitrary code with 'NT AUT...
code-projects Simple Car Rental System 1.0 has a permission bypass issue where low privilege users can forge high privilege sessions and perform sensitive operations.
BBOT's gitdumper module could be abused to execute commands through a malicious git repository.
Cherry Studio is a desktop client that supports for multiple LLM providers. Cherry Studio registers a custom protocol called `cherrystudio://`. When handling the MCP installation URL, it parses the ba...
The Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 2
The Lisfinity Core - Lisfinity Core plugin used for pebasÂŽ Lisfinity WordPress theme plugin for WordPress is vulnerable to privilege escalation via password update in all versions up to, and including, 1
Newforma Info Exchange (NIX) '/UserWeb/Common/UploadBlueimp
Azure PlayFab Elevation of Privilege Vulnerability
Improper neutralization of input during web page generation ('cross-site scripting') in Azure Monitor allows an authorized attacker to perform spoofing over a network
An out-of-bounds write vulnerability exists in VS6ComFile!CItemExChange::WinFontDynStrCheck of V-SFT v6
The Cookie Notice & Consent plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the uuid parameter in all versions up to, and including, 1
An Uncontrolled Resource Consumption vulnerability in the HTTP daemon (httpd) of Juniper Networks Junos Space allows an unauthenticated network-based attacker flooding the device with inbound API calls to consume all resources on the system, leading to a Denial of Service (DoS)
Redis Enterprise Elevation of Privilege Vulnerability
A Missing Authorization vulnerability in the Juniper Networks Junos Space Security Director allows an unauthenticated network-based attacker to read or modify metadata via the web interface
Rack is a modular Ruby web server interface
A Use of Uninitialized Resource vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX4700Â devices allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS)
An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-Of-Service (DoS)
A Missing Authentication for Critical Function vulnerability in Juniper Networks Security Director Policy Enforcer allows an unauthenticated, network-based attacker to replace legitimate vSRX images with malicious ones
Incorrect Execution-Assigned Permissions vulnerability in Apache StreamPark
pyLoad is a free and open-source download manager written in Python
Authlib is a Python library which builds OAuth and OpenID Connect servers
A vulnerability exists in the Progress Flowmon web application prior to version 12
New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system
Memory corruption while invoking remote procedure IOCTL calls
A stack-based buffer overflow vulnerability exists in VS6ComFile!CV7BaseMap::WriteV7DataToRom of V-SFT v6
A use after free vulnerability exists in VS6ComFile!load_link_inf of V-SFT v6
A flaw has been found in Tenda AC7 15
A vulnerability has been found in Tenda AC7 15
A vulnerability was found in Tenda AC7 15
A vulnerability was determined in Tenda AC7 15
A vulnerability was identified in Tenda AC7 15
Memory corruption while performing SCM call
Memory corruption while performing SCM call with malformed inputs
A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems
A vulnerability has been found in Tenda W12 3
Improper authentication in Smart Switch prior to version 3
A vulnerability was determined in Tenda AC7 15
Improper Neutralization of Input During Web Page Generation in Kibana can lead to stored Cross-Site Scripting (XSS)
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Junos Space Security Director allows an attacker to inject malicious scripts into the application, which are then stored and executed in the context of other users' browsers when they access affected pages
An authenticated stored XSS vulnerability exists in the Bagisto 2
A HTML injection vulnerability exists in Perfex CRM v3
Improper Neutralization of Input During Web Page Generation in Kibana can lead to Cross-Site Scripting (XSS)
Inline script execution allowed in CSP vulnerability has been identified in HCL AION v2
NVIDIA Display Driver contains a vulnerability where an uncontrolled DLL loading path might lead to arbitrary denial of service, escalation of privileges, code execution, and data tampering
Stored HTML injection in RISE Ultimate Project Manager & CRM allows authenticated users to inject arbitrary HTML into invoices and messages
Emlog is an open source website building system
Memory corruption while processing camera platform driver IOCTL calls
Memory corruption during PlayReady APP usecase while processing TA commands
Memory corruption while processing a malformed license file during reboot
Memory corruption while processing escape commands from userspace
Memory corruption while processing IOCTL call to get the mapping
memory corruption while processing an image encoding completion event
Memory corruption while processing control commands in the virtual memory management interface
Memory corruption while processing an escape call
Memory corruption while processing user buffers
Memory corruption while allocating buffers in DSP service
Use of a broken or risky cryptographic algorithm in Smart Switch prior to version 3
An out-of-bounds write vulnerability exists in VS6ComFile!set_AnimationItem of V-SFT v6
An out-of-bounds write vulnerability exists in VS6ComFile!CItemDraw::is_motion_tween of V-SFT v6
An out-of-bounds read vulnerability exists in VS6MemInIF!set_temp_type_default of V-SFT v6
An out-of-bounds read vulnerability exists in VS6ComFile!load_link_inf of V-SFT v6
An out-of-bounds read vulnerability exists in VS6ComFile!get_ovlp_element_size of V-SFT v6
An out-of-bounds read vulnerability exists in VS6ComFile!CSaveData::delete_mem of V-SFT v6
GitLab has remediated an issue in GitLab EE affecting all versions from 18
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13
D-Link DIR-816A2_FWv1
An infinite loop issue in Amazon
BigBlueButton is an open-source virtual classroom
BigBlueButton is an open-source virtual classroom
All versions of the package cross-zip are vulnerable to Directory Traversal via consecutive usage of zipSync() and unzipSync () functions that allow arguments such as __dirname
quic-go is an implementation of the QUIC protocol in Go
cel-rust is a Common Expression Language interpreter written in Rust
A vulnerability was determined in code-projects E-Commerce Website 1
A security flaw has been discovered in ChurchCRM up to 5
Lavasoft Web Companion (also known as Ad-Aware WebCompanion) versions 8
A vulnerability was detected in Campcodes Online Learning Management System 1
A flaw has been found in code-projects Simple Leave Manager 1
A vulnerability has been found in projectworlds Gate Pass Management System 1
A vulnerability was found in code-projects E-Commerce Website 1
The authentication mechanism in Perfex CRM before 3
Improper access control in Routines prior to version 4
Publii CMS v0
A vulnerability was detected in code-projects Online Job Search Engine 1
A flaw has been found in code-projects Online Job Search Engine 1
A vulnerability has been found in code-projects Online Job Search Engine 1
A vulnerability was found in code-projects Project Monitoring System 1
In Flowmon versions prior to 12
Transient DOS may occur when multi-profile concurrency arises with QHS enabled
BigBlueButton is an open-source virtual classroom
Improper input validiation in Contacts prior to SMR Oct-2025 Release 1 allows local attackers to access data across multiple user profiles
Cleartext storage of sensitive information in Smart Switch prior to version 3
NVIDIA Display Driver for Linux contains a vulnerability where an attacker could cause a use-after-free
NVIDIA Display Driver for Linux contains a vulnerability where an attacker might be able to use a race condition to escalate privileges