CVE-2026-20045
Cisco Unified Communications Products Code Injection Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Sunday's vulnerability disclosures include 5 critical CVEs (CVSS 9.0+), a 71% decrease from Saturday's 17 critical findings. High-priority vulnerabilities remain steady at 78, a modest 2% decline from the prior day's 80. All 16 actively exploited KEV entries carry CVSS 9.5 scores, affecting infrastructure from Cisco Unified Communications Manager and Broadcom VMware vCenter Server to Microsoft Office and multiple SmarterTools SmarterMail instances. Notable critical disclosures include CVE-2025-15027 targeting WordPress (CVSS 9.8) and CVE-2020-37095 affecting Cyberoam Authentication Client (CVSS 9.8). Patch availability currently stands at 0%, meaning no vendor-supplied fixes are available for these disclosures and organizations should prioritize compensating controls.
Immediate action: Organizations running Cisco Unified Communications Manager, VMware vCenter Server, Microsoft Office, SmarterTools SmarterMail, Zimbra, GitLab, or Sangoma FreePBX should assess exposure immediately given active exploitation across all 16 KEV entries. With 0% patch availability, implement network segmentation, access restrictions, and monitoring for indicators of compromise as interim mitigations until vendor patches are released.
Cisco Unified Communications Products Code Injection Vulnerability - Active in CISA KEV catalog.
Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability - Active in CISA KEV catalog.
Versa Concerto Improper Authentication Vulnerability - Active in CISA KEV catalog.
Vite Vitejs Improper Access Control Vulnerability - Active in CISA KEV catalog.
Prettier eslint-config-prettier Embedded Malicious Code Vulnerability - Active in CISA KEV catalog.
Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability - Active in CISA KEV catalog.
Linux Kernel Integer Overflow Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability - Active in CISA KEV catalog.
GNU InetUtils Argument Injection Vulnerability - Active in CISA KEV catalog.
Microsoft Office Security Feature Bypass Vulnerability - Active in CISA KEV catalog.
GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
Sangoma FreePBX OS Command Injection Vulnerability - Active in CISA KEV catalog.
Sangoma FreePBX Improper Authentication Vulnerability - Active in CISA KEV catalog.
React Native Community CLI OS Command Injection Vulnerability - Active in CISA KEV catalog.
SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability - Active in CISA KEV catalog.
The JAY Login & Register plugin for WordPress allows unauthenticated privilege escalation to administrator by exploiting the 'jay_login_register_ajax_create_final_user' function.
Buffer overflow in Cyberoam Authentication Client 2.1.2.7 allows remote attackers to execute arbitrary code by overwriting SEH memory via a crafted server address.
Parallaxis Cuckoo Clock 5.0 is vulnerable to a buffer overflow in alarm scheduling, enabling shellcode execution via EIP and EBP register overwrites.
Wedding Slideshow Studio 1.36 contains a buffer overflow in the registration name field, allowing attackers to execute arbitrary system commands via a malicious payload.
A stack-based buffer overflow in Wedding Slideshow Studio 1.36 allows attackers to execute arbitrary code by supplying a malicious 1608-byte registration key.
Infor SyteLine ERP uses hard-coded static cryptographic keys to encrypt stored credentials, including user passwords, database connection strings, and API keys
Qdrant is a vector similarity search engine and vector database
The JAY Login & Register plugin for WordPress is vulnerable to privilege escalation. All versions up to and including version 2 are affected by this flaw.
A flaw has been found in mathurvishal CloudClassroom-PHP-Project up to 5dadec098bfbbf3300d60c3494db3fb95b66e7be
Core FTP LE 2
Core FTP Lite 1
A vulnerability has been found in PHPGurukul Beauty Parlour Management System 1
AMSS++ version 4
A security vulnerability has been detected in yuan1994 tpadmin up to 1
ATutor 2
Mattermost Confluence plugin version <1
A vulnerability was identified in itsourcecode Student Management System 1
A security flaw has been discovered in itsourcecode Student Management System 1
A flaw has been found in itsourcecode School Management System 1
A vulnerability was detected in SourceCodester Medical Center Portal Management System 1
A vulnerability has been found in SourceCodester Medical Center Portal Management System 1
A vulnerability was found in code-projects Simple Blood Donor Management System 1
A vulnerability was determined in itsourcecode School Management System 1
A security flaw has been discovered in code-projects Social Networking Site 1
A flaw has been found in SourceCodester Online Class Record System 1
A vulnerability was found in SourceCodester Online Class Record System 1
A vulnerability was detected in itsourcecode Society Management System 1
A flaw has been found in itsourcecode Society Management System 1
A vulnerability has been found in itsourcecode Society Management System 1
A vulnerability was found in itsourcecode Society Management System 1
A security flaw has been discovered in code-projects Online Music Site 1
A weakness has been identified in code-projects Online Music Site 1
A flaw has been found in projectworlds Online Food Ordering System 1
Pydantic AI is a Python agent framework for building applications and workflows with Generative AI
A vulnerability has been found in Tenda TX3 up to 16
A vulnerability was found in Tenda TX9 up to 22
A vulnerability was determined in Tenda TX9 up to 22
A vulnerability was identified in Tenda TX9 up to 22
A security vulnerability in the NiceGUI Python-based UI framework could allow attackers to compromise the integrity of web-based user interfaces.
Pydantic AI is a Python agent framework for building applications and workflows with Generative AI
Acer Launch Manager 6
JumpStart 0
A weakness has been identified in D-Link DIR-823X 250416
A security vulnerability has been detected in D-Link DWR-M921 1
A vulnerability was identified in D-Link DIR-823X 250416
A vulnerability was found in D-Link DIR-823X 250416
A weakness has been identified in D-Link DIR-823X 250416
RimbaLinux AhadPOS 1
A critical security weakness has been identified in the UTT čŋå 520W 1 router, potentially allowing for remote unauthorized access.
A security vulnerability in the UTT čŋå 520W 1 router could lead to unauthorized system access or configuration changes.
A vulnerability has been detected in the UTT čŋå 520W 1 router that could facilitate unauthorized administrative actions.
A vulnerability found in the UTT čŋå 520W 1 router could allow an attacker to bypass security measures and gain unauthorized access.
The UTT čŋå 520W 1 router contains a vulnerability that could be exploited to gain unauthorized control over the device.
A vulnerability was detected in UTT HiPER 810G up to 1
calibre is an e-book manager
A high-severity vulnerability in the OpenClaw personal AI assistant could allow attackers to gain unauthorized access to personal data or system functions.
REVA is an interoperability platform
calibre is an e-book manager
QuickDate 1
Wondershare Application Framework Service 2
Alps HID Monitor Service 8
BlueStacks App Player 2
SecurOS Enterprise 10
A security vulnerability in the iccDEV libraries and tools for ICC color management could lead to unauthorized system manipulation or data compromise.
calibre is an e-book manager
Gophish <=0
A vulnerability in the DataHub open-source metadata platform could allow for unauthorized access to sensitive metadata or system functions.
AdonisJS framework contains a high-severity vulnerability that may compromise application integrity. Technical details suggest a flaw within the core TypeScript-first web framework architecture.
aSc TimeTables 2020
SpotFTP-FTP Password Recover 2
AMSS++ version 4 is affected by a high-severity vulnerability. This late-disclosure entry indicates a significant security flaw within the application's core logic.
ACE Security WiP-90113 HD Camera contains a configuration disclosure vulnerability. Unauthenticated attackers can remotely retrieve sensitive configuration files from the device.
DBPower C300 HD Camera contains a configuration disclosure vulnerability. Unauthenticated attackers can retrieve sensitive credentials via an unprotected configuration backup endpoint.
Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases
A vulnerability was determined in SourceCodester Online Class Record System 1
AdonisJS is a TypeScript-first web framework
A vulnerability has been found in UTT HiPER 810 1
A vulnerability was determined in UTT HiPER 810 1
A security vulnerability has been detected in D-Link DIR-823X 250416
html5_snmp 1
thejshen Globitek CMS 1
TheJshen ContentManagementSystem 1
eLection 2