CVE-2025-6204
Dassault Systèmes DELMIA Apriso Code Injection Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Sunday's security landscape reveals notable activity with two maximum-severity CVSS 10.0 vulnerabilities affecting General Industrial Controls products and Desktop Alert PingAlert systems. The weekend disclosure includes 4 critical CVEs (CVSS 9.0+) and 26 high-priority vulnerabilities, representing a 25% increase in critical disclosures compared to Friday while high-priority issues decreased by 49%. Patch availability remains limited at 16%, requiring organizations to implement compensating controls for unpatched systems. Eleven actively exploited CISA KEV vulnerabilities continue to demand attention, including recent additions affecting VMware Aria Operations (CVE-2025-41244), Microsoft Windows (CVE-2025-62215), and Fortinet FortiWeb (CVE-2025-64446). Industrial control systems face heightened risk this weekend with authentication bypass flaws enabling remote device resets.
Immediate action: Immediate action: Deploy patches for the two CVSS 10.0 industrial control vulnerabilities (CVE-2025-58083 affecting General Industrial Controls Lynx+ Gateway, CVE-2025-54339 affecting Desktop Alert PingAlert). Implement network segmentation and access controls for unpatched ICS components. Priority patching recommended for 11 actively exploited CISA KEV vulnerabilities, particularly CVE-2025-64446 (Fortinet FortiWeb path traversal), CVE-2025-62215 (Microsoft Windows), and CVE-2025-41244 (VMware Aria Operations). Monitor industrial control system web interfaces for unauthorized reset attempts and unexpected device reboots.
Dassault Systèmes DELMIA Apriso Code Injection Vulnerability - Active in CISA KEV catalog.
Dassault Systèmes DELMIA Apriso Missing Authorization Vulnerability - Active in CISA KEV catalog.
Broadcom VMware Aria Operations and VMware Tools Privilege Defined with Unsafe Actions Vulnerability - Active in CISA KEV catalog.
XWiki Platform Eval Injection Vulnerability - Active in CISA KEV catalog.
A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.
CWP Control Web Panel OS Command Injection Vulnerability - Active in CISA KEV catalog.
Gladinet CentreStack and Triofox Files or Directories Accessible to External Parties Vulnerability - Active in CISA KEV catalog.
Samsung Mobile Devices Out-of-Bounds Write Vulnerability - Active in CISA KEV catalog.
Gladinet Triofox Improper Access Control Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Race Condition Vulnerability - Active in CISA KEV catalog.
WatchGuard Firebox Out-of-Bounds Write Vulnerability - Active in CISA KEV catalog.
General Industrial Controls Lynx+ Gateway is missing critical authentication in the embedded web server which could allow an attacker to remotely reset the device.
Information Disclosure in web-accessible backup file in SourceCodester Simple Online Book Store System allows a remote unauthenticated attacker to disclose full database contents (including schema and credential hashes) via an unauthenticated HTTP GET request to /obs/database/obs_db
The Brightpick Mission Control web application exposes hardcoded credentials in its client-side JavaScript bundle
The SNORDIAN's H5PxAPIkatchu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'insert_data' AJAX endpoint in all versions up to, and including, 0
Use after free in Internals in Google Chrome on iOS prior to 127
Nero BackItUp in the Nero Productline is vulnerable to a path parsing/UI rendering flaw (CWE-22) that, in combination with Windows ShellExecuteW fallback extension resolution, leads to arbitrary code execution when a user clicks a crafted entry
Inappropriate implementation in DevTools in Google Chrome prior to 126
The Creta Testimonial Showcase WordPress plugin before 1
General Industrial Controls Lynx+ Gateway is vulnerable to a weak password requirement vulnerability, which may allow an attacker to execute a brute-force attack resulting in unauthorized access and login
IQ-Support developed by IQ Service International has an Arbitrary File Read vulnerability, allowing unauthenticated remote attackers to exploit Relative Path Traversal to download arbitrary system files
General Industrial Controls Lynx+ Gateway is missing critical authentication in the embedded web server which could allow an attacker to send GET requests to obtain sensitive device information
General Industrial Controls Lynx+ Gateway is vulnerable to a cleartext transmission vulnerability that could allow an attacker to observe network traffic to obtain sensitive information, including plaintext credentials
Authorization Bypass Through User-Controlled Key, Weak Password Recovery Mechanism for Forgotten Password, Authentication Bypass by Assumed-Immutable Data vulnerability in Optimus Software Brokerage Automation allows Exploiting Trust in Client, Authentication Bypass, Manipulate Registry Information
A vulnerability has been found in D-Link DIR-816L 2_06_b09_beta
A vulnerability was found in D-Link DIR-816L 2_06_b09_beta
A vulnerability was determined in D-Link DIR-816L 2_06_b09_beta
Brightpick Mission Control discloses device telemetry, configuration, and credential information via WebSocket traffic to unauthenticated users when they connect to a specific URL
The vulnerability, if exploited, could allow a miscreant with read access to Edge Project files or Edge Offline Cache files to reverse engineer Edge users' app-native or Active Directory passwords through computational brute-forcing of weak hashes
A Reflected Cross Site Scripting (XSS) vulnerability was found in the Application Server of Desktop Alert PingAlert version 6
An issue was found in the Application Server of Desktop Alert PingAlert version 6
A vulnerability was identified in the email parsing library due to improper handling of specially formatted recipient email addresses
A security vulnerability has been detected in code-projects Simple Online Hotel Reservation System 1
A vulnerability was detected in code-projects Simple Online Hotel Reservation System 1
npm package `expr-eval` is vulnerable to Prototype Pollution
A vulnerability was identified in code-projects Simple Cafe Ordering System 1
A weakness has been identified in code-projects Simple Cafe Ordering System 1
Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in NCP-HG100 1