CVE-2026-1281
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Friday's vulnerability landscape includes 9 critical CVEs (CVSS 9.0+), a 44% decrease from Thursday's 16 critical disclosures. High-priority vulnerabilities remain steady at 91 (down 5% from 96), while actively exploited CVEs hold constant at 14 KEV entries. Notable critical vulnerabilities include CVE-2026-1340, a code injection flaw in Ivanti Endpoint Manager Mobile enabling unauthenticated RCE, and CVE-2026-1453, a missing authentication vulnerability in KiloView Encoder Series allowing unauthorized admin account manipulation. The 14 actively exploited vulnerabilities span multiple vendors including Microsoft Windows and Office, Cisco Unified Communications Manager, VMware vCenter Server, and Zimbra Collaboration Suite. Current patch availability sits at 0%, requiring organizations to implement compensating controls until vendor fixes become available.
Immediate action: Priority assessment needed for environments running Microsoft Windows/Office, Cisco UCM, VMware vCenter, and Zimbraβall present in the active exploitation list. With zero patches currently available, implement network segmentation, enhanced monitoring, and access restrictions for affected systems until vendor remediations are released.
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
Gogs Path Traversal Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Information Disclosure Vulnerability - Active in CISA KEV catalog.
Cisco Unified Communications Products Code Injection Vulnerability - Active in CISA KEV catalog.
Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability - Active in CISA KEV catalog.
Versa Concerto Improper Authentication Vulnerability - Active in CISA KEV catalog.
Vite Vitejs Improper Access Control Vulnerability - Active in CISA KEV catalog.
Prettier eslint-config-prettier Embedded Malicious Code Vulnerability - Active in CISA KEV catalog.
Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability - Active in CISA KEV catalog.
Linux Kernel Integer Overflow Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability - Active in CISA KEV catalog.
GNU InetUtils Argument Injection Vulnerability - Active in CISA KEV catalog.
Microsoft Office Security Feature Bypass Vulnerability - Active in CISA KEV catalog.
Free MP3 CD Ripper 2.8 contains a stack buffer overflow vulnerability that allows remote attackers to execute arbitrary code by crafting a malicious WAV file with oversized payload. Attackers can leverage a specially crafted exploit file with shellcode, SEH bypass, and egghunter technique to achieve remote code execution on vulnerable Windows systems.
Tea LaTex 1.0 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary shell commands through the /api.php endpoint. Attackers can craft a malicious LaTeX payload with shell commands that are executed when processed by the application's tex2png API action.
vCluster Platform provides a Kubernetes platform for managing virtual clusters, multi-tenancy, and cluster sharing. Prior to versions 4.6.0, 4.5.4, 4.4.2, and 4.3.10, when an access key is created with a limited scope, the scope can be bypassed to access resources outside of it. However, the user still cannot access resources beyond what is accessible to the owner of the access key. Versions 4.6.0, 4.5.4, 4.4.2, and 4.3.10 fix the vulnerability. Some other mitigations are available. Users can limit exposure by reviewing access keys which are scoped and ensuring any users with access to them have appropriate permissions set. Creating automation users with very limited permissions and using access keys for these automation users can be used as a temporary workaround where upgrading is not immediately possible but scoped access keys are needed.
An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.
Ajenti 2.1.36 contains an authentication bypass vulnerability that allows remote attackers to execute arbitrary commands after successful login. Attackers can leverage the /api/terminal/create endpoint to send a netcat reverse shell payload targeting a specified IP and port.
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
BacklinkSpeed 2.4 contains a buffer overflow vulnerability that allows attackers to corrupt the Structured Exception Handler (SEH) chain through malicious file import. Attackers can craft a specially designed payload file to overwrite SEH addresses, potentially executing arbitrary code and gaining control of the application.
BearShare Lite 5.2.5 contains a buffer overflow vulnerability in the Advanced Search keywords input that allows attackers to execute arbitrary code. Attackers can craft a specially designed payload to overwrite the EIP register and execute shellcode by pasting malicious content into the search keywords field.
A missing authentication for critical function vulnerability in KiloView Encoder Series could allow an unauthenticated attacker to create or delete administrator accounts. This vulnerability can grant the attacker full administrative control over the product.
The Search Atlas SEO β Premier SEO Plugin for One-Click WP Publishing & Integrated AI Optimization plugin for WordPress is vulnerable to authentication bypass due to a missing capability check on the 'generate_sso_url' and 'validate_sso_token' functions in versions 2
The Simple User Registration plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 6
NVIDIA Display Driver for Windows contains a vulnerability where an attacker could trigger a use after free
The Custom Login Page Customizer WordPress plugin before 2
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm
The Frontend File Manager Plugin for WordPress is vulnerable to unauthorized file sharing due to a missing capability check on the 'wpfm_send_file_in_email' AJAX action in all versions up to, and including, 23
Mocha Telnet Lite for iOS 4
FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, does not properly validate TLS certificates when downloading update packages through its auto-update mechanism
Dell PremierColor Panel Driver, versions prior to 1
Dell Unity, version(s) 5
Dell UnityVSA, version(s) 5
The $uri$args concatenation in nginx configuration file present in Open Security Issue Management (OSIM) prior v2025
An input neutralization vulnerability in the Backup Configuration component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal
Nord VPN 6
FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, exposes an HTTP server over the LAN interface of affected devices
Intelbras Router RF 301K firmware version 1
WebDamn User Registration Login System contains a SQL injection vulnerability that allows unauthenticated attackers to bypass login authentication by manipulating email credentials
TrustTunnel is an open-source VPN protocol with a server-side request forgery and and private network restriction bypass in versions prior to 0
Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Disable Login Page allows Functionality Bypass
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Global Interactive Design Media Software Inc
OpenProject is an open-source, web-based project management software
Shadow mode tracing code uses a set of per-CPU variables to avoid cumbersome parameter passing
M/Monit 3
MedDream PACS Server 6
A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1
A vulnerability was identified in Tenda AC21 16
Explorance Blue versions prior to 8
docPrint Pro 8
PMB 5
Nidesoft 3GP Video Converter 2
Frigate Professional 3
Audio Playback Recorder 3
Parsec is a cloud-based application for cryptographically secure file sharing
SmartBlog 2
Elaniin CMS 1
Ultimate Project Manager CRM PRO 2
berliCRM 1
Generation of Error Message Containing Sensitive Information vulnerability in Codriapp Innovation and Software Technologies Inc
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction allows Cross Site Request Forgery
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub allows Cross Site Request Forgery
A vulnerability was found in Tenda AX12 Pro V2 16
Improper Access Control vulnerability in AkΔ±n Software Computer Import Export Industry and Trade Ltd
EPSON 1
IP Watcher 3
Prey 1
Program Access Controller 1
ForensiT AppX Management Service 2
Input Director 1
ShareMouse 5
The Node
NVIDIA Display Driver for Linux contains a vulnerability in the NVIDIA kernel module where an attacker could cause an integer overflow or wraparound
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause heap memory access after the memory is freed
Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles
BarcodeOCR 19
CodeMeter 6
SonarQube 8
10-Strike Bandwidth Monitor 3
Discourse is an open source discussion platform
Runtipi is a personal homeserver orchestrator
A shape mismatch vulnerability in OneFlow v0
A dimension validation flaw in the flow
A type validation flaw in the flow
A device-ID validation flaw in OneFlow v0
aSc TimeTables 2021
A GPU device-ID validation flaw in OneFlow v0
A GPU device-ID validation flaw in the flow
An issue in the flow
Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal HTTP Client Manager allows Forceful Browsing
The net/url package does not set a limit on the number of query parameters in a query
An input validation vulnerability in the flow
An input validation vulnerability in the oneflow
EasyPMS 1
Gnome Fonts Viewer 3
Ruijie Networks Switch eWeb S29_RGOS 11
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Global Interactive Design Media Software Inc
Some end of service NETGEAR products provide "TelnetEnable" functionality, which allows a magic packet to activate telnet service on the box
A weakness has been identified in code-projects Online Music Site 1
A security vulnerability has been detected in code-projects Online Music Site 1
A weakness has been identified in itsourcecode School Management System 1
A vulnerability was determined in itsourcecode School Management System 1
A vulnerability was identified in itsourcecode School Management System 1
A weakness has been identified in itsourcecode Society Management System 1
A security vulnerability has been detected in itsourcecode Society Management System 1
A vulnerability was detected in itsourcecode Society Management System 1
immich is a high performance self-hosted photo and video management solution
Discourse is an open source discussion platform
TimeClock Software 1
PolarLearn is a free and open-source learning program
WSS Agent, prior to 9
Downloading and building modules with malicious version strings can cause local code execution