CVE-2021-26829
OpenPLC ScadaBR Cross-site Scripting Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Friday's vulnerability landscape reveals thirteen critical vulnerabilities (CVSS 9.0+) and 76 high-priority CVEs requiring immediate assessment. The critical CVE count increased by one issue from Thursday, while high-priority disclosures decreased by 24 vulnerabilities. Nine actively exploited vulnerabilities continue to require priority remediation. The overall critical CVE frequency shows a 149% increase compared to historical averages, marking significantly elevated end-of-week disclosure activity. Zero patch availability across all vulnerabilities represents a critical concern requiring organizations to implement compensating controls and risk mitigation strategies.
Immediate action: Security teams should immediately assess all thirteen critical vulnerabilities and prioritize review of the 76 high-priority CVEs for applicability to their environments. Organizations must expedite remediation of the nine actively exploited vulnerabilities. Given the zero percent patch availability, teams should implement compensating controls, network segmentation, access restrictions, and monitoring enhancements where patches are unavailable. Weekend security monitoring should be enhanced given the elevated critical vulnerability activity heading into the weekend period.
OpenPLC ScadaBR Cross-site Scripting Vulnerability - Active in CISA KEV catalog.
Android Framework Information Disclosure Vulnerability - Active in CISA KEV catalog.
Android Framework Privilege Escalation Vulnerability - Active in CISA KEV catalog.
OpenPLC ScadaBR Unrestricted Upload of File with Dangerous Type Vulnerability - Active in CISA KEV catalog.
D-Link Routers Buffer Overflow Vulnerability - Active in CISA KEV catalog.
Array Networks ArrayOS AG OS Command Injection Vulnerability - Active in CISA KEV catalog.
RARLAB WinRAR Path Traversal Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Use After Free Vulnerability - Active in CISA KEV catalog.
OSGeo GeoServer Improper Restriction of XML External Entity Reference Vulnerability - Active in CISA KEV catalog.
pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.
The WP CarDealer plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2.16. This is due to the 'WP_CarDealer_User::process_register' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.
Several stack-based buffer overflow vulnerabilities exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.1. A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger these vulnerabilities.When Tag is 3
Several stack-based buffer overflow vulnerabilities exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.1. A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger these vulnerabilities.When Tag is 64
Several stack-based buffer overflow vulnerabilities exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.1. A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger these vulnerabilities.When Tag is 65
Several stack-based buffer overflow vulnerabilities exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.1. A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger these vulnerabilities.When Tag is 67
Several stack-based buffer overflow vulnerabilities exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.1. A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger these vulnerabilities.When Tag is 131
Several stack-based buffer overflow vulnerabilities exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.1. A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger these vulnerabilities.When Tag is 133
An arbitrary file rename vulnerability in the /admin/filer.php component of EasyImages 2.0 v2.8.6 and below allows attackers with Administrator privileges to execute arbitrary code via injecting a crafted payload into an uploaded file name.
A vulnerability was determined in UTT čŋå 512W up to 3.1.7.7-171114. This impacts the function strcpy of the file /goform/formNatStaticMap of the component Endpoint. Executing manipulation of the argument NatBind can lead to buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was identified in UTT čŋå 512W up to 3.1.7.7-171114. Affected is the function strcpy of the file /goform/formConfigFastDirectionW. The manipulation of the argument ssid leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Cybersecurity AI (CAI) is an open-source framework for building and deploying AI-powered offensive and defensive automation. Versions 0.5.9 and below are vulnerable to Command Injection through the run_ssh_command_with_credentials() function, which is available to AI agents. Only password and command inputs are escaped in run_ssh_command_with_credentials to prevent shell injection; while username, host and port values are injectable. This issue does not have a fix at the time of publication.
In versions of ScreenConnectâĸ prior to 25.8, server-side validation and integrity checks within the extension subsystem could allow the installation and execution of untrusted or arbitrary extensions by authorized or administrative users. Abuse of this behavior could result in the execution of custom code on the server or unauthorized access to application configuration data. This issue affects only the ScreenConnect server component; host and guest clients are not impacted. ScreenConnect 25.8 introduces enhanced server-side configuration handling and integrity checks to ensure only trusted extensions can be installed.
LangGraph SQLite Checkpoint is an implementation of LangGraph CheckpointSaver that uses SQLite DB (both sync and async, via aiosqlite)
Okta Java Management SDK facilitates interactions with the Okta management API
The Hippoo Mobile App for WooCommerce plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1
The Video Merchant plugin for WordPress is vulnerable to Cross-Site Request Forgery in version <= 5
Neuron is a PHP framework for creating and orchestrating AI Agents
Protection Mechanism Failure of Software Downgrade in Zoom Rooms for Windows before 6
An issue was discovered in Foxit PDF and Editor for Windows before 13
An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13
An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13
Improper access control in Windows Admin Center allows an authorized attacker to elevate privileges locally
In aoc_service_read_message of aoc_ipc_core
An issue in the Bluetooth firmware of JXL 9 Inch Car Android Double Din Player Android v12
As UART download mode is still enabled on the ESP32 chip on which the firmware runs, an adversary can dump the flash from the device and retrieve sensitive information such as details about the current and previous Wi-Fi network from the NVS partition
Foxit PDF Editor and Reader before 2025
An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13
A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Explorer-TachyonCore-DevicesListeningOnAPort instruction prior V21
A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Explorer-TachyonCore-CheckSimpleIoC instruction
A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Explorer-TachyonCore-FindFileBySizeAndHash instruction prior V21
The HandL UTM Grabber / Tracker WordPress plugin before 2
The HandL UTM Grabber / Tracker WordPress plugin before 2
Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion
Jenkins Coverage Plugin 2
Jenkins 2
Incorrect Use of Privileged APIs vulnerability in NomySoft Information Technology Training and Consulting Inc
Due to improper BLE security configurations on the device's GATT server, an adjacent unauthenticated attacker can read and write device control commands through the mobile app service wich could render the device unusable
An unauthenticated attacker within proximity of the Meatmeet device can perform an unauthorized Over The Air (OTA) firmware upgrade using Bluetooth Low Energy (BLE), resulting in the firmware on the device being overwritten with the attacker's code
A vulnerability in TeamViewer DEX Client (former 1E client) - Content Distribution Service (NomadBranch
A security flaw has been discovered in Tenda CH22 1
edoc-doctor-appointment-system v1
IBM Aspera Orchestrator 4
MaxKB is an open-source AI assistant for enterprise
MaxKB is an open-source AI assistant for enterprise
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18
GitLab has remediated a security issue in GitLab CE/EE affecting all versions from 17
squid/cachemgr
An issue in sd command v1
A flaw in libsoupâs HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing
Unchecked output buffer may allowed arbitrary code execution in SMM and potentially result in SMM memory corruption
Multiple vulnerabilities in Aqara Hub firmware update process in the Camera Hub G3 4
IBM Aspera Orchestrator 4
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 15
In NrmmDecoder::DecodeSORTransparentContext of cn_NrmmDecoder
In ss_DecodeLcsAssistDataReqMsg(void) of ss_LcsManagement
A DLL hijacking vulnerability was reported in the Lenovo App Store and Lenovo Browser applications that could allow a local authenticated user to execute code with elevated privileges under certain conditions
A potential DLL hijacking vulnerability was reported in Lenovo One Client during an internal security assessment that could allow a local authenticated user to execute code with elevated privileges
An improper permissions vulnerability was reported in Lenovo Baiying Client that could allow a local authenticated user to execute code with elevated privileges
A command injection vulnerability exists in Windscribe for Linux Desktop App that allows a local user who is a member of the windscribe group to execute arbitrary commands as root via the 'adapterName' parameter of the 'changeMTU' function
QND Premium/Advance/Standard Ver
In aocc_read of aoc_channel_dev
In WAVES_send_data_to_dsp of libaoc_waves
In GetTachyonCommand of tachyon_server_common
In GetHostAddress of gxp_buffer
In GetHostAddress of gxp_buffer
In GetHostAddress of gxp_buffer
Improper access control for volatile memory containing boot code in Universal Boot Loader (U-Boot) before 2017
Authorization Bypass Through User-Controlled Key vulnerability in Aksis Computer Services and Consulting Inc
Authorization Bypass Through User-Controlled Key vulnerability in Netiket Information Technologies Ltd
IBM Aspera Orchestrator 4
A Server-Side Request Forgery (SSRF) vulnerability was discovered in the webpage-to-markdown conversion feature of markdownify-mcp v0
The application uses an insecure hashing algorithm (MD5) to hash passwords
Aqara Hub devices including Camera Hub G3 4
ImageMagick is a software suite to create, edit, compose, or convert bitmap images
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11
A pre-authentication denial of service vulnerability exists in React Server Components versions 19
It was found that the fix addressing CVE-2025-55184 in React Server Components was incomplete and does not prevent a denial of service attack in a specific case
Aqara Hub devices including Camera Hub G3 4
Command injection vulnerability in Aqara Hub devices including Camera Hub G3 4
A flaw has been found in Campcodes Supplier Management System 1
A vulnerability has been found in Campcodes Supplier Management System 1
A weakness has been identified in projectworlds Advanced Library Management System 1
A flaw has been found in Campcodes Retro Basketball Shoes Online Store 1
A security flaw has been discovered in code-projects Class and Exam Timetable Management 1
A weakness has been identified in code-projects Class and Exam Timetable Management 1
A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-GetCmContentLocations instruction prior V19
Shopware is an open commerce platform
In PrepareWorkloadBuffers of gxp_main_actor