CVE-2025-6204
Dassault Systèmes DELMIA Apriso Code Injection Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Saturday's security landscape presents a critical weekend challenge with 4 critical vulnerabilities (down 20% from Friday's 5), including two maximum-severity CVSS 10.0 flaws in Desktop Alert PingAlert (CVE-2025-54339) and General Industrial Controls (CVE-2025-58083) requiring immediate weekend response. High-priority disclosures decreased to 51 issues (down 16% from Friday's 61), while active exploitation increased with 11 vulnerabilities in the CISA KEV catalog (up 10% from 10). Organizations face mounting weekend pressure with two critical federal compliance deadlines expiring Monday morning, November 17 for Dassault DELMIA Apriso manufacturing systems (CVE-2025-6204, CVE-2025-6205, both CVSS 9.5). Desktop Alert PingAlert deployments face dual weekend emergencies with CVSS 10.0 and 9.6 access control flaws enabling complete system compromise of alert notification infrastructure. Industrial control environments must address the CVSS 10.0 General Industrial Controls vulnerability before Monday operations. Patch availability improved to 16%, though weekend security teams must prioritize five CISA KEV deadlines within the next five days, including VMware Aria Operations (CVE-2025-41244), XWiki Platform (CVE-2025-24893), and Fortinet FortiWeb (CVE-2025-64446).
Immediate action: IMMEDIATE WEEKEND ACTION REQUIRED: Emergency patching needed before Monday morning for Desktop Alert PingAlert systems - dual CVSS 10.0/9.6 vulnerabilities enable complete compromise of critical alert infrastructure. Organizations using Dassault DELMIA Apriso manufacturing platforms must complete patches by Monday November 17 morning to meet federal compliance deadline. Industrial control operators must deploy General Industrial Controls CVSS 10.0 patches before Monday operational restart. Weekend security teams should prepare for VMware Aria Operations, XWiki Platform, and Fortinet FortiWeb patches due Tuesday-Wednesday.
Dassault Systèmes DELMIA Apriso Code Injection Vulnerability - Active in CISA KEV catalog.
Dassault Systèmes DELMIA Apriso Missing Authorization Vulnerability - Active in CISA KEV catalog.
Broadcom VMware Aria Operations and VMware Tools Privilege Defined with Unsafe Actions Vulnerability - Active in CISA KEV catalog.
XWiki Platform Eval Injection Vulnerability - Active in CISA KEV catalog.
A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.
CWP Control Web Panel OS Command Injection Vulnerability - Active in CISA KEV catalog.
Gladinet CentreStack and Triofox Files or Directories Accessible to External Parties Vulnerability - Active in CISA KEV catalog.
Samsung Mobile Devices Out-of-Bounds Write Vulnerability - Active in CISA KEV catalog.
Gladinet Triofox Improper Access Control Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Race Condition Vulnerability - Active in CISA KEV catalog.
WatchGuard Firebox Out-of-Bounds Write Vulnerability - Active in CISA KEV catalog.
A vulnerability was detected in D-Link DIR-816L 2_06_b09_beta. Affected by this vulnerability is the function authenticationcgi_main of the file /authentication.cgi. Performing manipulation of the argument Password results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
An Incorrect Access Control vulnerability was found in the Application Server of Desktop Alert PingAlert version 6.1.0.11 to 6.1.1.2 exploitable remotely for Escalation of Privileges.
General Industrial Controls Lynx+ Gateway is missing critical authentication in the embedded web server which could allow an attacker to remotely reset the device.
An Incorrect Access Control vulnerability was found in the Application Server of Desktop Alert PingAlert version 6.1.0.11 to 6.1.1.2 exploitable remotely for Escalation of Privileges.
The AI Engine plugin for WordPress is vulnerable to PHP Object Injection via PHAR Deserialization in all versions up to, and including, 3
The Import any XML, CSV or Excel File to WordPress (WP All Import) plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 3
A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2
The LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes plugin for WordPress is vulnerable to privilege escalation
Information Disclosure in web-accessible backup file in SourceCodester Simple Online Book Store System allows a remote unauthenticated attacker to disclose full database contents (including schema and credential hashes) via an unauthenticated HTTP GET request to /obs/database/obs_db
The Brightpick Mission Control web application exposes hardcoded credentials in its client-side JavaScript bundle
The SNORDIAN's H5PxAPIkatchu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'insert_data' AJAX endpoint in all versions up to, and including, 0
Use after free in Internals in Google Chrome on iOS prior to 127
An issue in Intermesh BV GroupOffice vulnerable before v
Nero BackItUp in the Nero Productline is vulnerable to a path parsing/UI rendering flaw (CWE-22) that, in combination with Windows ShellExecuteW fallback extension resolution, leads to arbitrary code execution when a user clicks a crafted entry
Improper authorization handling in Zoom Workplace for Android before version 6
Improper verification of cryptographic signature in the installer for Zoom Workplace VDI Client for Windows may allow an authenticated user to conduct an escalation of privilege via local access
Inappropriate implementation in DevTools in Google Chrome prior to 126
A vulnerability in Cisco Catalyst Center Virtual Appliance could allow an authenticated, remote attacker to elevate privileges to Administrator on an affected system
The Creta Testimonial Showcase WordPress plugin before 1
Dell Alienware Command Center 6
Dell Alienware Command Center 6
A stack-based buffer overflow exists in the httpd binary of Linksys E1200 v2 routers (Firmware E1200_v2
A stack buffer overflow vulnerability exists in the D-Link DIR-816A2 router firmware DIR-816A2_FWv1
A stack-based buffer overflow exists in the validate_static_route function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2
SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process
General Industrial Controls Lynx+ Gateway is vulnerable to a weak password requirement vulnerability, which may allow an attacker to execute a brute-force attack resulting in unauthorized access and login
Apollo Federation is an architecture for declaratively composing APIs into a unified graph
IQ-Support developed by IQ Service International has an Arbitrary File Read vulnerability, allowing unauthenticated remote attackers to exploit Relative Path Traversal to download arbitrary system files
General Industrial Controls Lynx+ Gateway is missing critical authentication in the embedded web server which could allow an attacker to send GET requests to obtain sensitive device information
General Industrial Controls Lynx+ Gateway is vulnerable to a cleartext transmission vulnerability that could allow an attacker to observe network traffic to obtain sensitive information, including plaintext credentials
A stack-based buffer overflow vulnerability exists in the libshared
A stack-based buffer overflow vulnerability exists in the makeRequest
A command injection vulnerability exists in the D-Link DIR-882 Router firmware DIR882A1_FW102B02 within the `prog
A command injection vulnerability exists in the D-Link DIR-882 Router firmware DIR882A1_FW102B02 within the `prog
Authorization Bypass Through User-Controlled Key, Weak Password Recovery Mechanism for Forgotten Password, Authentication Bypass by Assumed-Immutable Data vulnerability in Optimus Software Brokerage Automation allows Exploiting Trust in Client, Authentication Bypass, Manipulate Registry Information
The issue was addressed by refusing external connections by default
Brightpick Mission Control discloses device telemetry, configuration, and credential information via WebSocket traffic to unauthenticated users when they connect to a specific URL
The vulnerability, if exploited, could allow a miscreant with read access to Edge Project files or Edge Offline Cache files to reverse engineer Edge users' app-native or Active Directory passwords through computational brute-forcing of weak hashes
IBM AIX 7
Inefficient regular expression complexity in certain Zoom Workplace Clients before version 6
Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs
A vulnerability has been found in Radarr 5
A vulnerability was found in Sonarr 4
A Reflected Cross Site Scripting (XSS) vulnerability was found in the Application Server of Desktop Alert PingAlert version 6
pgAdmin <= 9
pgAdmin <= 9
An issue was found in the Application Server of Desktop Alert PingAlert version 6
A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses
MaxKB is an open-source AI assistant for enterprise
A security vulnerability has been detected in cameasy Liketea 1
A vulnerability was detected in SourceCodester Patients Waiting Area Queue Management System 1
A security vulnerability has been detected in code-projects Simple Online Hotel Reservation System 1
A vulnerability was detected in code-projects Simple Online Hotel Reservation System 1
npm package `expr-eval` is vulnerable to Prototype Pollution
Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in NCP-HG100 1