CVE-2025-21042
Samsung Mobile Devices Out-of-Bounds Write Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Wednesday's vulnerability landscape demonstrates significant escalation with 15 critical vulnerabilities (400% increase from yesterday's 3 CVEs), representing the highest mid-week critical disclosure volume this month. High-priority vulnerabilities increased modestly from 47 to 51 CVEs (8% growth), while six actively exploited CISA KEV vulnerabilities remain unchanged, requiring continued federal priority remediation. The disclosure environment features maximum severity CVSS 9.8-10.0 vulnerabilities across enterprise infrastructure, with 15 CVEs enhanced through Gemini AI analysis providing detailed exploitation scenarios and compensating controls. This Wednesday surge reflects heightened vendor disclosure activity following Tuesday's initial critical vulnerability return, establishing a pattern of accelerated mid-week vulnerability publication that demands immediate security operations response.
Immediate action: URGENT WEDNESDAY RESPONSE: Security teams must immediately assess organizational exposure to the 15 critical vulnerabilities disclosed today, prioritizing the 11 critical CVEs enhanced with Gemini AI analysis that provide detailed exploitation scenarios and remediation guidance (indicated by analysis badge). Organizations should begin with CVSS 9.8-10.0 vulnerabilities enabling unauthenticated remote code execution and authentication bypass attacks across enterprise infrastructure. The 400% surge in critical disclosures requires emergency security operations center activation to triage vendor notifications, identify affected systems through asset inventory correlation, and deploy emergency patches where available. The six CISA KEV vulnerabilities require continued priority remediation to meet federal compliance deadlines, with Samsung Mobile, Microsoft Windows, and Google Chromium V8 vulnerabilities enabling privilege escalation and code execution attacks across consumer and enterprise devices. Organizations should leverage Wednesday maintenance windows to address both the critical vulnerability surge and the 51 high-priority CVEs, focusing first on internet-facing systems and critical infrastructure components. For vulnerabilities lacking vendor patches, implement immediate compensating controls including network segmentation to isolate affected systems, Web Application Firewall deployment with command injection and authentication bypass detection rules, enhanced logging and SIEM correlation to detect exploitation attempts, and administrative access restrictions to trusted IP addresses only. Security teams should prepare for potential Thursday continuation of elevated disclosure activity and ensure incident response procedures are activated for rapid exploitation detection across the expanded Wednesday attack surface.
Samsung Mobile Devices Out-of-Bounds Write Vulnerability - Active in CISA KEV catalog.
Gladinet Triofox Improper Access Control Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Race Condition Vulnerability - Active in CISA KEV catalog.
WatchGuard Firebox Out-of-Bounds Write Vulnerability - Active in CISA KEV catalog.
Google Chromium V8 Type Confusion Vulnerability - Active in CISA KEV catalog.
Oracle Fusion Middleware Missing Authentication for Critical Function Vulnerability - Active in CISA KEV catalog.
The CIBELES AI plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php' file in all versions up to, and including, 1.10.8. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site's server which may make remote code execution possible.
The AI Feeds plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php' file in all versions up to, and including, 1.0.11. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site's server which may make remote code execution possible.
The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3 via the sneeit_articles_pagination_callback() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leveraged to inject backdoors or, for example, create new administrative user accounts.
Security Point (Windows) of MaLion and MaLionCloud contains a stack-based buffer overflow vulnerability in processing HTTP headers. Receiving a specially crafted request from a remote unauthenticated attacker could lead to arbitrary code execution with SYSTEM privilege.
Security Point (Windows) of MaLion and MaLionCloud contains a heap-based buffer overflow vulnerability in processing Content-Length. Receiving a specially crafted request from a remote unauthenticated attacker could lead to arbitrary code execution with SYSTEM privilege.
The EduKart Pro plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the 'edukart_pro_register_user_front_end' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.
An issue in the cms_rest.php component of SIGB PMB v8.0.1.14 allows attackers to execute arbitrary code via unserializing an arbitrary file.
lunary-ai/lunary version 1.9.34 is vulnerable to an account takeover due to improper authentication in the Google OAuth integration. The application fails to verify the 'aud' (audience) field in the access token issued by Google, which is crucial for ensuring the token is intended for the application. This oversight allows attackers to use tokens issued to malicious applications to gain unauthorized access to user accounts. The issue is resolved in version 1.9.35.
An issue was discovered in Syrotech SY-GPON-1110-WDONT SYRO_3.7L_3.1.02-240517 allowing attackers to exctract the SSL Private Key, CA Certificate, SSL Certificate, and Client Certificates in .pem format in firmware in etc folder.
Cross Site Request Forgery (CSRF) vulnerability in Ilevia EVE X1 Server Firmware Version v4.7.18.0.eden and before, Logic Version v6.00 - 2025_07_21 allows a remote attacker to execute arbitrary code via the /bh_web_backend component
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT, where an attacker could use privileged access to gain access to SoC protected areas. A successful exploit of this vulnerability might lead to code execution, information disclosure, data tampering, denial of service, or escalation of privileges.
Apache Syncope can be configured to store the user password values in the internal database with AES encryption, though this is not the default option
The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to time-based SQL Injection via the âsite_idâ parameter in all versions up to, and including, 4
The update mechanism in Xtooltech Xtool AnyScan Android Application 4
The Telegram Bot & Channel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Telegram username in all versions up to, and including, 4
The ProjectList plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 0
The WordPress eCommerce Plugin WordPress plugin through 2
The Broken Link Manager WordPress plugin through 0
The extract_name function in Fluent Bit in_docker input plugin copies container names into a fixed size stack buffer without validating length
Fugue is a unified interface for distributed computing that lets users execute Python, Pandas, and SQL code on Spark, Dask, and Ray with minimal rewrites
NULL pointer dereference in src/coap_openssl
NULL pointer dereference in get_san_or_cn_from_cert() in src/coap_openssl
Integer signedness error in tls_verify_call_back() in src/coap_openssl
A Remote Code Execution (RCE) vulnerability in the template management component in REDAXO CMS 5
New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system
NVIDIA NeMo Agent Toolkit UI for Web contains a vulnerability in the chat API endpoint where an attacker may cause a Server-Side Request Forgery
An unauthenticated remote attacker can send a specially crafted Modbus read command to the device which leads to a denial of service
Use after free in endpoint destructors in Redboltz async_mqtt 10
Cross-Site Request Forgery (CSRF) vulnerability in the OAuth implementation of the Tuya SDK 6
Primakon Pi Portal 1
A buffer overflow with Xilinx Run Time Environment may allow a local attacker to read or corrupt data from the advanced extensible interface (AXI), potentially resulting in loss of confidentiality, integrity, and/or availability
A stored Cross-site Scripting (XSS) vulnerability affecting Requirements in ENOVIA Product Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session
A stored Cross-site Scripting (XSS) vulnerability affecting Service Items Management in DELMIA Service Process Engineer on Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session
Inside Track / Entropy Derby is a research-grade horse-racing betting engine
Primakon Pi Portal 1
An interpretation-conflict (CWE-436) vulnerability in node-forge versions 1
A firmware downgrade vulnerability exists in the OTA Update functionality of GL-Inet GL-AXT1800 4
A vulnerability has been identified in keylime where an attacker can exploit this flaw by registering a new agent using a different Trusted Platform Module (TPM) device but claiming an existing agent's unique identifier (UUID)
GeoServer is an open source server that allows users to share and edit geospatial data
An issue in the size query parameter (/views/file
HCL iNotes is susceptible to a Reflected Cross-site Scripting (XSS) vulnerability caused by improper validation of user-supplied input
Improper input validation within the XOCL driver may allow a local attacker to generate an integer overflow condition, potentially resulting in loss of confidentiality or availability
NVIDIA DGX Spark GB10 contains a vulnerability in hardware resources where an attacker could tamper with hardware controls
A Stored Cross-Site Scripting vulnerability was discovered in the Dashboards functionality due to improper validation of an input parameter
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause an out-of-bound write
NVIDIA NeMo Framework for all platforms contains a vulnerability in the NLP and LLM components, where malicious data created by an attacker could cause code injection
ZIRA Group WBRM 7
An issue was discovered in Free5GC v4
An Incorrect Access Control vulnerability was found in the Application Server of Desktop Alert PingAlert version 6
An Incorrect Access Control vulnerability was found in the Application Server of Desktop Alert PingAlert version 6
A flaw was found in WebKitGTK and WPE WebKit
An issue was discovered in Veal98 Echo Open-Source Community System 2
A vulnerability has been found in code-projects Library System 1
A security flaw has been discovered in code-projects Jonnys Liquor 1
A weakness has been identified in code-projects Question Paper Generator 1
A vulnerability was detected in code-projects COVID Tracking System 1
Improper input validation within the XOCL driver may allow a local attacker to generate an integer overflow condition, potentially resulting in crash or denial of service
Inadequate lock protection within Xilinx Run time may allow a local attacker to trigger a Use-After-Free condition potentially resulting in loss of confidentiality or availability
NVIDIA NeMo framework contains a vulnerability in a predefined variable, where an attacker could cause inclusion of functionality from an untrusted control sphere by use of a predefined variable
Improper return value within AMD uProf can allow a local attacker to bypass KSLR, potentially resulting in loss of confidentiality or availability
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files