CVE-2009-0556
Microsoft Office PowerPoint Code Injection Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Yesterday's disclosures included 12 critical vulnerabilities, a 20% increase from the prior day's 10. High-priority CVEs saw significant growth at 69 disclosures, up 50% from 46. Four actively exploited vulnerabilities require attention, including CVE-2026-20805 affecting Microsoft Windows and CVE-2025-37164 targeting HPE OneView. Notable critical issues include CVE-2026-21962 (CVSS 10.0) in Oracle HTTP Server, CVE-2026-22844 (CVSS 9.9) affecting Zoom Node Multimedia Routers, and multiple Google Chrome security UI flaws rated at CVSS 9.8. With 0% patch availability reported, organizations should prioritize compensating controls and monitoring.
Immediate action: Prioritize Microsoft Windows, HPE OneView, Oracle HTTP Server, and Google Chrome environments for exposure assessment given active exploitation and critical severity ratings. With no patches currently available, implement network segmentation, access restrictions, and enhanced monitoring for affected systems.
Microsoft Office PowerPoint Code Injection Vulnerability - Active in CISA KEV catalog.
Hewlett Packard Enterprise (HPE) OneView Code Injection Vulnerability - Active in CISA KEV catalog.
Gogs Path Traversal Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Information Disclosure Vulnerability - Active in CISA KEV catalog.
Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in product of Oracle Fusion Middleware (component: Weblogic Server Proxy Plug-in for Apache HTTP Server, Weblogic Server Proxy Plug-in for IIS). Supported versions that are affected are 12.2.1.4.0, 14.1.1.0.0 and 14.1.2.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in. While the vulnerability is in Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in accessible data as well as unauthorized access to critical data or complete access to all Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in accessible data. Note: Affected version for Weblogic Server Proxy Plug-in for IIS is 12.2.1.4.0 only. CVSS 3.1 Base Score 10.0 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N).
Incorrect security UI in Google Chrome on Android prior to 144.0.7559.59 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)
Incorrect security UI in Split View in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has a Use of Hard-coded Credentials vulnerability, allowing unauthenticated remote attackers to log in to the database using hardcoded database credentials stored in the firmware.
The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 0.9.2.1. This is due to the 'insert_user' function not restricting the roles with which a user can register. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site. Note: The vulnerability can only be exploited if 'role' is mapped to the custom field.
The Academy LMS โ WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.5.0. This is due to the plugin not properly validating a user's identity prior to updating their password and relying solely on a publicly-exposed nonce for authorization. This makes it possible for unauthenticated attackers to change arbitrary user's password, including administrators, and gain access to their account.
Insufficient policy enforcement in Network in Google Chrome prior to 144.0.7559.59 allowed an attack who obtained a network log file to potentially obtain potentially sensitive information via a network log file. (Chromium security severity: Medium)
Vulnerability in the Oracle Agile Product Lifecycle Management for Process product of Oracle Supply Chain (component: Supplier Portal). The supported version that is affected is 6.2.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile Product Lifecycle Management for Process. Successful attacks of this vulnerability can result in takeover of Oracle Agile Product Lifecycle Management for Process. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the `picklefile` parameter in the `yacc()` function. This parameter accepts a `.pkl` file that is deserialized with `pickle.load()` without validation. Because `pickle` allows execution of embedded code via `__reduce__()`, an attacker can achieve code execution by passing a malicious pickle file. The parameter is not mentioned in official documentation or the GitHub repository, yet it is active in the PyPI version. This introduces a stealthy backdoor and persistence risk.
A Command Injection vulnerability in Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 may allow a meeting participant to conduct remote code execution of the MMR via network access.
telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.
An arbitrary file read vulnerability exists in the encapsulatedDoc functionality of MedDream PACS Premium 7.3.6.870. A specially crafted HTTP request can lead to an arbitrary file read. An attacker can send http request to trigger this vulnerability.
The Nexter Extension โ Site Enhancements Toolkit plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4
The Dokan: AI Powered WooCommerce Multivendor Marketplace Solution โ Build Your Own Amazon, eBay, Etsy plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 4
Use after free in ANGLE in Google Chrome prior to 144
The Creator LMS โ The LMS for Creators, Coaches, and Trainers plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check in the get_items_permissions_check function in all versions up to, and including, 1
The NotificationX โ FOMO, Live Sales Notification, WooCommerce Sales Popup, GDPR, Social Proof, Announcement Banner & Floating Notification Bar plugin for WordPress is vulnerable to DOM-Based Cross-Site Scripting via the 'nx-preview' POST parameter in all versions up to, and including, 3
Out of bounds memory access in V8 in Google Chrome prior to 144
Inappropriate implementation in V8 in Google Chrome prior to 144
Inappropriate implementation in V8 in Google Chrome prior to 144
Vulnerability in the Oracle Hospitality OPERA 5 product of Oracle Hospitality Applications (component: Opera Servlet)
Koko Analytics is an open-source analytics plugin for WordPress
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle FLEXCUBE Investor Servicing product of Oracle Financial Services Applications (component: Security Management System)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
The installer of ServerView Agents for Windows provided by Fsas Technologies Inc
Vulnerability in the Siebel CRM Deployment product of Oracle Siebel CRM (component: Server Infrastructure)
Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component: User and User Group)
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: AWT, JavaFX)
A security vulnerability has been detected in PHPGurukul Directory Management System 1
NVIDIA Nsight Visual Studio for Windows contains a vulnerability in Nsight Monitor where an attacker can execute arbitrary code with the same privileges as the NVIDIA Nsight Visual Studio Edition Monitor application
teklifolustur_app is a web-based PHP application that allows users to create, manage, and track quotes for their clients
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Oracle Analytics Cloud)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the SQLcl component of Oracle Database Server
Tugtainer is a self-hosted app for automating updates of Docker containers
A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node
An Improper Certificate Validation vulnerability in the OPC-UA client and ANSL over TLS client used in Automation Studio versions before 6
Incorrect Authorization vulnerability in virtual gateway component in Devolutions Server allows attackers to bypass deny IP rules
PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has an Arbitrary File Upload vulnerability, allowing privileged remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server
A vulnerability was found in Totolink LR350 9
A vulnerability was determined in Totolink LR350 9
A high-severity security vulnerability has been identified in Totolink LR350 devices, potentially allowing for unauthorized system access or control.
A security flaw discovered in Totolink LR350 9 hardware could allow attackers to bypass security measures and impact device stability.
node-tar,a Tar for Node
IBM Concert 1
OpenProject is an open-source, web-based project management software
jaraco
@fastify/middie is the plugin that adds middleware support on steroids to Fastify
The @fastify/express plugin adds full Express compatibility to Fastify
IBM Licensing Operator incorrectly assigns privileges to security critical files which could allow a local root escalation inside a container running the IBM Licensing Operator image
IBM Sterling Connect:Direct for UNIX Container 6
ImageMagick is free and open-source software used for editing and manipulating digital images
NVIDIA Merlin Transformers4Rec for all platforms contains a vulnerability where an attacker could cause code injection
Quicly, an IETF QUIC protocol implementation, is susceptible to a denial-of-service attack prior to commit d9d3df6a8530a102b57d840e39b0311ce5c9e14e
WeasyPrint helps web developers to create PDF documents
ChatterBot is a machine learning, conversational dialog engine for creating chat bots
EVerest is an EV charging software stack
A security weakness has been identified in the itsourcecode Online Frozen Foods Ordering System 1. This high-severity flaw could allow for unauthorized data access.
A security flaw has been discovered in itsourcecode School Management System 1, which could allow unauthorized access to sensitive educational records.
A vulnerability has been identified in the OnboardLite platform, a membership lifecycle tool used by student organizations. This flaw could lead to unauthorized access to member data.
A security weakness has been identified in Yonyou KSOA 9 that could compromise system integrity. This high-severity flaw requires immediate remediation.
A security vulnerability has been detected in Yonyou KSOA 9, posing a high risk to enterprise data security. Immediate patching is required.
A vulnerability was detected in Yonyou KSOA 9
A vulnerability was determined in Tosei Online Store Management System ใใใๅบ่็ฎก็ใทในใใ 1
A security flaw has been discovered in CRMEB up to 5
IBM ApplinX 11
NVIDIA Nsight Systems contains a vulnerability in the gfx_hotspot recipe, where an attacker could cause an OS command injection by supplying a malicious string to the process_nsys_rep_cli
NVIDIA Nsight Systems for Linux contains a vulnerability in the
A flaw in Node
A flaw in Node
HackerOne community member Jad Ghamloush (0xjad) has reported an authorization bypass vulnerability in the `tracker-delete