CVE-2025-47827
IGEL OS Use of a Key Past its Expiration Date Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
This curated brief highlights 7 critical vulnerabilities and 75 high-priority updates requiring immediate attention.
IGEL OS Use of a Key Past its Expiration Date Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Untrusted Pointer Dereference Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Improper Access Control Vulnerability - Active in CISA KEV catalog.
SKYSEA Client View Improper Authentication Vulnerability - Active in CISA KEV catalog.
Adobe Experience Manager Forms Code Execution Vulnerability - Active in CISA KEV catalog.
Apple Multiple Products Unspecified Vulnerability - Active in CISA KEV catalog.
Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability - Active in CISA KEV catalog.
Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability - Active in CISA KEV catalog.
Microsoft Windows SMB Client Improper Access Control Vulnerability - Active in CISA KEV catalog.
Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability - Active in CISA KEV catalog.
Adobe Commerce andâ¯Magento Improper Input Validation Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
Dassault Systèmes DELMIA Apriso Code Injection Vulnerability - Active in CISA KEV catalog.
Dassault Systèmes DELMIA Apriso Missing Authorization Vulnerability - Active in CISA KEV catalog.
Broadcom VMware Aria Operations and VMware Tools Privilege Defined with Unsafe Actions Vulnerability - Active in CISA KEV catalog.
XWiki Platform Eval Injection Vulnerability - Active in CISA KEV catalog.
WordPress plugin Contact Form CFDB7 versions up to and including 1.3.2 are affected by a pre-authentication SQL injection vulnerability that cascades into insecure deserialization (PHP Object Injectio...
A vulnerability was found in code-projects Online Complaint Site 1.0. This issue affects some unknown processing of the file /cms/admin/subcategory.php. This manipulation of the argument category caus...
A stack-based buffer overflow issue was discovered in the phddns client in Blu-Castle BCUM221E 1.0.0P220507 via the password field.
win-cli-mcp-server resolveCommandPath Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of win-cli-m...
A vulnerability was identified in NeuVector, where the enforcer used environment variables CLUSTER_RPC_PORT and CLUSTER_LAN_PORT to generate a command to be executed via popen, without first sanitisin...
A critical severity vulnerability has been identified in the ALPR Manager role of Security Center that could allow attackers to gain administrative access to the Genetec Security Center system. The Ge...
JumpServer is an open source bastion host and an operation and maintenance security audit system. In JumpServer versions prior to v3.10.20-lts and v4.10.11-lts, an authenticated, non-privileged user c...
Jenkins Azure CLI Plugin 0
LangGraph SQLite Checkpoint is an implementation of LangGraph CheckpointSaver that uses SQLite DB (both sync and async, via aiosqlite)
Cross-Site Request Forgery (CSRF) vulnerability in Allegro Marketing hpb seo plugin for WordPress hpbseo allows Reflected XSS
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThimPress Eduma eduma allows PHP Local File Inclusion
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeSphere SmartMag smart-mag allows PHP Local File Inclusion
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Majestic Support Majestic Support majestic-support allows PHP Local File Inclusion
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station
The installer of WTW EAGLE (for Windows) 3
ABC Fine Wine & Spirits Android App version v
AdForest - Classified Android App version 4
Senza: Keto & Fasting Android App version 2
2nd Line Android App version v1
Kanova Android App version 1
AG Life Logger Android App version v1
Mobile Scanner Android App version 2
Dell Unity, version(s) 5
Dell Unity, version(s) 5
Dell Unity, version(s) 5
Dell Unity, version(s) 5
Dell Unity, version(s) 5
Jenkins SAML Plugin 4
Dell Unity, version(s) 5
Jenkins JDepend Plugin 1
MLflow Tracking Server Model Creation Directory Traversal Remote Code Execution Vulnerability
GIMP ICNS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
GIMP HDR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
GIMP DCM File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
GIMP WBMP File Parsing Integer Overflow Remote Code Execution Vulnerability
GIMP FF File Parsing Integer Overflow Remote Code Execution Vulnerability
GIMP ILBM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
GIMP XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Ashlar-Vellum Cobalt XE File Parsing Integer Overflow Remote Code Execution Vulnerability
Ashlar-Vellum Cobalt CO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Ashlar-Vellum Cobalt CO File Parsing Use-After-Free Remote Code Execution Vulnerability
On affected platforms, restricted users could use SSH port forwarding to access host-internal services
Incorrect access control in the Web management interface in Each Italy Wireless Mini Router WIRELESS-N 300M v28K
Each Italy Wireless Mini Router WIRELESS-N 300M v28K
MLflow Weak Password Requirements Authentication Bypass Vulnerability
Razer Synapse 3 Macro Module Link Following Local Privilege Escalation Vulnerability
Razer Synapse 3 RazerPhilipsHueUninstall Link Following Local Privilege Escalation Vulnerability
Razer Synapse 3 Chroma Connect Link Following Local Privilege Escalation Vulnerability
Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Simple OAuth (OAuth2) & OpenID Connect allows Authentication Bypass
A buffer overflow in the UPnP service of Tenda AC8 Hardware v03
An issue in NCR Atleos Terminal Manager (ConfigApp) v3
An issue in BusinessNext CRMnext v
n8n is an open source workflow automation platform
This vulnerability affects NeuVector deployments only when the Report anonymous cluster data option is enabled
IBM Tivoli Monitoring 6
GitLab has remediated an issue in EE affecting all versions from 17
DLL hijacking vulnerability in Evope Collector 1
Uncontrolled Resource Consumption vulnerability in Progress MOVEit Transfer (AS2 module)
SPH Engineering UgCS 5
A path traversal vulnerability was identified in SourceCodester Pet Grooming Management System 1
Zitadel is open-source identity infrastructure software
Statmatic is a Laravel and Git powered content management system (CMS)
Incorrect access control in the kernel driver of ThreatFire System Monitor v4
An unquoted service path in Kingosoft Technology Ltd Kingo ROOT v1
On affected platforms, a restricted user could break out of the CLI sandbox to the system shell and elevate their privileges
An issue discovered in Dyson App v6
Incorrect access control on Dataphone A920 v2025
To trigger the issue, three configuration parameters must have specific settings: "hostname-char-set" must be left at the default setting, which is "[^A-Za-z0-9
Prior to September 19, 2025, the Hospital Manager Backend Services exposed the ASP
Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method
The ParseAddress function constructeds domain-literal address components through repeated string concatenation
Incorrect Authorization vulnerability in Drupal CivicTheme Design System allows Forceful Browsing
Missing Authorization vulnerability in Drupal Acquia DAM allows Forceful Browsing
TalkTalk 3
mCarFix Motorists App version 2
IBM Tivoli Monitoring 6
sqls-server/sqls 0
A flaw was identified in the X
A flaw was found in the X
A flaw was discovered in the X
IBM Sterling Connect Direct for Unix 6
JumpServer is an open source bastion host and an operation and maintenance security audit system