CVE-2009-0556
Microsoft Office PowerPoint Code Injection Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Yesterday's vulnerability disclosures included 14 critical-severity CVEs, a 17% increase from the prior day's 12 critical issues. High-priority vulnerabilities rose significantly to 100, representing a 45% increase from 69 the previous day. Five actively exploited vulnerabilities were added to the KEV catalog, including CVE-2026-20805 affecting Microsoft Windows, CVE-2025-37164 in HPE OneView, and CVE-2025-8110 targeting Gogs. Critical vulnerabilities of note include CVE-2026-23524 (CVSS 9.8) in Laravel Reverb, CVE-2026-24061 (CVSS 9.8) in GNU Inetutils telnetd, and CVE-2021-47748 (CVSS 9.8) in Hasura GraphQL. Patch availability currently stands at 0%, requiring organizations to prioritize compensating controls and monitoring.
Immediate action: Organizations using Microsoft Windows, HPE OneView, Gogs, and Microsoft Office should implement compensating controls immediately given confirmed active exploitation. With no patches currently available for yesterday's disclosures, focus on network segmentation, enhanced monitoring, and vendor advisory tracking for affected critical systems.
Microsoft Office PowerPoint Code Injection Vulnerability - Active in CISA KEV catalog.
Hewlett Packard Enterprise (HPE) OneView Code Injection Vulnerability - Active in CISA KEV catalog.
Gogs Path Traversal Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Information Disclosure Vulnerability - Active in CISA KEV catalog.
Laravel Reverb provides a real-time WebSocket communication backend for Laravel applications. In versions 1.6.3 and below, Reverb passes data from the Redis channel directly into PHPβs unserialize() function without restricting which classes can be instantiated, which leaves users vulnerable to Remote Code Execution. The exploitability of this vulnerability is increased because Redis servers are commonly deployed without authentication, but only affects Laravel Reverb when horizontal scaling is enabled (REVERB_SCALING_ENABLED=true). This issue has been fixed in version 1.7.0. As a workaround, require a strong password for Redis access and ensure the service is only accessible via a private network or local loopback, and/or set REVERB_SCALING_ENABLED=false to bypass the vulnerable logic entirely (if the environment uses only one Reverb node).
5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe option parsing vulnerability in the ECharts Markdown plugin allows any user able to submit ECharts code blocks to execute arbitrary JavaScript code in the renderer context. This can lead to Remote Code Execution (RCE) in environments where privileged APIs (such as Electronβs electron.mcp) are exposed, resulting in full compromise of the host system. Version 0.15.3 patches the issue.
The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Administrative User Creation in all versions up to, and including, 1.5.6.3. This is due to the 'ajax_register_handle' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'lakit_bkrole' parameter during registration and gain administrator access to the site.
5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Prior to version 0.15.3, an unsafe HTML rendering permits untrusted HTML (including on* event attributes) to execute in the renderer context. An attacker can inject an `<img onerror=...>` payload to run arbitrary JavaScript in the renderer, which can call exposed bridge APIs such as `window.bridge.mcpServersManager.createServer`. This enables unauthorized creation of MCP servers and lead to remote command execution. Version 0.15.3 fixes the issue.
The Academy LMS β WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.5.0. This is due to the plugin not properly validating a user's identity prior to updating their password and relying solely on a publicly-exposed nonce for authorization. This makes it possible for unauthenticated attackers to change arbitrary user's password, including administrators, and gain access to their account.
Hasura GraphQL 1.3.3 contains a remote code execution vulnerability that allows attackers to execute arbitrary shell commands through SQL query manipulation. Attackers can inject commands into the run_sql endpoint by crafting malicious GraphQL queries that execute system commands through PostgreSQL's COPY FROM PROGRAM functionality.
sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4. A private key recovery vulnerability exists in the SM2 decryption logic of sm-crypto prior to version 0.3.14. By interacting with the SM2 decryption interface multiple times, an attacker can fully recover the private key within approximately several hundred interactions. Version 0.3.14 patches the issue.
telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.
Mini Mouse 9.2.0 contains a remote code execution vulnerability that allows attackers to execute arbitrary commands through an unauthenticated HTTP endpoint. Attackers can leverage the /op=command endpoint to download and execute payloads by sending crafted JSON requests with malicious script commands.
DD-WRT version 45723 contains a buffer overflow vulnerability in the UPNP network discovery service that allows remote attackers to potentially execute arbitrary code. Attackers can send crafted M-SEARCH packets with oversized UUID payloads to trigger buffer overflow conditions on the target device.
Grist is spreadsheet software using Python as its formula language. Grist offers several methods for running those formulas in a sandbox, for cases where the user may be working with untrusted spreadsheets. One such method runs them in pyodide, but pyodide on node does not have a useful sandbox barrier. If a user of Grist sets `GRIST_SANDBOX_FLAVOR` to `pyodide` and opens a malicious document, that document could run arbitrary processes on the server hosting Grist. The problem has been addressed in Grist version 1.7.9 and up, by running pyodide under deno. As a workaround, a user can use the gvisor-based sandbox by setting `GRIST_SANDBOX_FLAVOR` to `gvisor`.
MeetingHub developed by HAMASTAR Technology has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
Appsmith is a platform to build admin panels, internal tools, and dashboards. In versions 1.94 and below, publicly accessible apps allow unauthenticated users to execute unpublished (edit-mode) actions by sending viewMode=false (or omitting it) to POST /api/v1/actions/execute. This bypasses the expected publish boundary where public viewers should only execute published actions, not edit-mode versions. An attack can result in sensitive data exposure, execution of editβmode queries and APIs, development data access, and the ability to trigger side effect behavior. This issue does not have a released fix at the time of publication.
GeoGebra CAS Calculator 6.0.631.0 contains a denial of service vulnerability that allows attackers to crash the application by generating a large buffer overflow. Attackers can create a payload with 8000 repeated characters and paste it into the calculator's input field to trigger an application crash.
A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device
The Nexter Extension β Site Enhancements Toolkit plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4
The Creator LMS β The LMS for Creators, Coaches, and Trainers plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check in the get_items_permissions_check function in all versions up to, and including, 1
The NotificationX β FOMO, Live Sales Notification, WooCommerce Sales Popup, GDPR, Social Proof, Announcement Banner & Floating Notification Bar plugin for WordPress is vulnerable to DOM-Based Cross-Site Scripting via the 'nx-preview' POST parameter in all versions up to, and including, 3
phpPgAdmin 7
Vulnerability in the Oracle Hospitality OPERA 5 product of Oracle Hospitality Applications (component: Opera Servlet)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle FLEXCUBE Investor Servicing product of Oracle Financial Services Applications (component: Security Management System)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
The installer of ServerView Agents for Windows provided by Fsas Technologies Inc
Hi-Rez Studios 5
A buffer over-read in the PublicKey::verify() method of Binance - Trust Wallet Core before commit 5668c67 allows attackers to cause a Denial of Service (DoS) via a crafted input
Vulnerability in the Siebel CRM Deployment product of Oracle Siebel CRM (component: Server Infrastructure)
Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component: User and User Group)
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core)
sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4
sm-crypto provides JavaScript implementations of the Chinese cryptographic algorithms SM2, SM3, and SM4
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: AWT, JavaFX)
NVIDIA Nsight Visual Studio for Windows contains a vulnerability in Nsight Monitor where an attacker can execute arbitrary code with the same privileges as the NVIDIA Nsight Visual Studio Edition Monitor application
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Oracle Analytics Cloud)
Deployments of Apache Solr 5
A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node
OpenPLC v3 contains an authenticated remote code execution vulnerability that allows attackers with valid credentials to inject malicious code through the hardware configuration interface
AES contains a SQL injection vulnerability due to an inactive configuration that prevents the latest SQL parsing logic from being applied
Tenda D151 and D301 routers contain an unauthenticated configuration download vulnerability that allows remote attackers to retrieve router configuration files
MeetingHub developed by HAMASTAR Technology has an Arbitrary File Read vulnerability, allowing unauthenticated remote attackers to exploit Absolute Path Traversal to download arbitrary system files
IBM Concert 1
Rockstar Games Launcher 1
Hestia Control Panel 1
vLLM is an inference and serving engine for large language models (LLMs)
Horilla is a free and open source Human Resource Management System (HRMS)
IBM Licensing Operator incorrectly assigns privileges to security critical files which could allow a local root escalation inside a container running the IBM Licensing Operator image
IBM Sterling Connect:Direct for UNIX Container 6
EVerest is an EV charging software stack
Digital Crime Report Management System 1
Blitar Tourism 1
Horilla is a free and open source Human Resource Management System (HRMS)
NVIDIA Merlin Transformers4Rec for all platforms contains a vulnerability where an attacker could cause code injection
ActivIdentity 8
Event Log Explorer 4
MacPaw Encrypto 1
OSAS Traverse Extension 11 contains an unquoted service path vulnerability in the TravExtensionHostSvc service running with LocalSystem privileges
WIN-PACK PRO 4
WIN-PACK PRO4
WIN-PACK PRO 4
Brother BRAdmin Professional 3
VFS for Git 1
eBeam Education Suite 2
eBeam Interactive Suite 3
Realtek Wireless LAN Utility 700
FreeLAN 2
Sandboxie Plus 0
OKI Configuration Tool 1
Pingzapper 2
OKI Print Job Accounting 4
HTML injection in Project Release in Altium Enterprise Server (AES) 7
In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), a memory leak occurs due to the broker's failure to validate or reject malformed UTF-8 strings in topic filters
NULL pointer dereference in the daap_reply_groups function in src/httpd_daap
NULL pointer dereference in the dacp_reply_playqueueedit_clear function in src/httpd_dacp
A NULL pointer dereference in the parse_meta function (src/httpd_daap
A NULL pointer dereference in the dacp_reply_playqueueedit_move function (src/httpd_dacp
An input validation issue in in Pithikos websocket-server v
Malformed BRID/HHIT records can cause `named` to terminate unexpectedly
Tenda AX-1806 v1
Tenda AX-1806 v1
Tenda AX-1803 v1
NodeBB Plugin Emoji 3
Mini Mouse 9
ProFTPD 1
GeoGebra Classic 5
GeoGebra Graphing Calculator 6
seroval facilitates JS value stringification, including complex structures beyond JSON
seroval facilitates JS value stringification, including complex structures beyond JSON
seroval facilitates JS value stringification, including complex structures beyond JSON
Mastodon is a free, open-source social network server based on ActivityPub
Seroval facilitates JS value stringification, including complex structures beyond JSON
EVerest is an EV charging software stack
EVerest is an EV charging software stack
EVerest is an EV charging software stack
EVerest is an EV charging software stack
IBM ApplinX 11
NVIDIA Nsight Systems contains a vulnerability in the gfx_hotspot recipe, where an attacker could cause an OS command injection by supplying a malicious string to the process_nsys_rep_cli
NVIDIA Nsight Systems for Linux contains a vulnerability in the
seroval facilitates JS value stringification, including complex structures beyond JSON
Openlitespeed 1
Moodle 3
Genexis Platinum-4410 P4410-V2-1
VestaCP versions prior to 0
AP180 series with firmware versions prior to AP_RGOS 11
A flaw in Node
A flaw in Node
HackerOne community member Jad Ghamloush (0xjad) has reported an authorization bypass vulnerability in the `tracker-delete