ECV 2026   2026  2025  2024  2023  2022| CWE

ECV 2026  January(17) February(28) March(23) April(29) May(5) June(0) July(0) August(0) September(0) October(0) November(0) December(0)

DATE

CVE

NAME

INFO

CWE

9.5.26 CVE-2026-42208 BerriAI | LiteLLM BerriAI LiteLLM SQL Injection Vulnerability: BerriAI LiteLLM contains a SQL injection vulnerability that allows an attacker to read data from the proxy's database and potentially modify it, leading to unauthorised access to the proxy and the credentials it manages. CWE-89
9.5.26 CVE-2026-6973 Ivanti | Endpoint Manager Mobile (EPMM) Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability: Ivanti Endpoint Manager Mobile (EPMM) contains an improper input validation vulnerability that allows a remotely authenticated user with administrative access to achieve remote code execution. CWE-20
9.5.26 CVE-2026-0300 Palo Alto Networks | PAN-OS Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability: Palo Alto Networks PAN-OS contains an out-of-bounds write vulnerability in the User-ID Authentication Portal (aka Captive Portal) service that can allow an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. CWE-787
3.5.26 CVE-2026-31431 Linux | Kernel Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability: Linux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation. CWE-699
3.5.26 CVE-2026-41940 WebPros | cPanel & WHM and WP2 (WordPress Squared) WebPros cPanel & WHM and WP2 (WordPress Squared) Missing Authentication for Critical Function Vulnerability: WebPros cPanel & WHM (WebHost Manager) and WP2 (WordPress Squared) contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel. CWE-306
29.4.26 CVE-2026-32202 Microsoft | Windows Microsoft Windows Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network. CWE-693
29.4.26 CVE-2024-1708 ConnectWise | ScreenConnect
 
ConnectWise ScreenConnect Path Traversal Vulnerability: ConnectWise ScreenConnect contains a path traversal vulnerability which could allow an attacker to execute remote code or directly impact confidential data and critical systems. CWE-22
27.4.26 CVE-2024-57726 SimpleHelp | SimpleHelp SimpleHelp Missing Authorization Vulnerability: SimpleHelp contains a missing authorization vulnerability that could allow low-privileged technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role. CWE-862
27.4.26 CVE-2024-57728 SimpleHelp | SimpleHelp
 
SimpleHelp Path Traversal Vulnerability: SimpleHelp contains a path traversal vulnerability that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user. CWE-22
27.4.26 CVE-2024-7399 Samsung | MagicINFO 9 Serve Samsung MagicINFO 9 Server Path Traversal Vulnerability: Samsung MagicINFO 9 Server contains a path traversal vulnerability that could allow an attacker to write arbitrary files as system authority.  CWE-22| CWE-434
27.4.26 CVE-2025-29635 D-Link | DIR-823X D-Link DIR-823X Command Injection Vulnerability: D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. CWE-77
27.4.26 CVE-2026-39987 Marimo | Marimo  Marimo Remote Code Execution Vulnerability: Marimo contains an pre-authorization remote code execution vulnerability, allowing an unauthenticated attacked to shell access and execute arbitrary system commands. CWE-306
27.4.26 CVE-2026-33825 Microsoft | Defender Microsoft Defender Insufficient Granularity of Access Control Vulnerability: Microsoft Defender contains an insufficient granularity of access control vulnerability that could allow an authorized attacker to escalate privileges locally. CWE-1220
21.4.26 CVE-2024-27199 JetBrains | TeamCity JetBrains TeamCity Relative Path Traversal Vulnerability: JetBrains TeamCity contains a relative path traversal vulnerability that could allow limited admin actions to be performed. CWE-23
21.4.26 CVE-2025-32975 Quest | KACE Systems Management Appliance (SMA) Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability: Quest KACE Systems Management Appliance (SMA) contains an improper authentication vulnerability that could allow attackers to impersonate legitimate users without valid credentials. CWE-287
21.4.26 CVE-2026-20128 Cisco | Catalyst SD-WAN Manager Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability: Cisco Catalyst SD-WAN Manager contains a storing passwords in a recoverable format vulnerability that allows an authenticated, local attacker to gain DCA user privileges by accessing a credential file for the DCA user on the filesystem as a low-privileged user. CWE-257
21.4.26 CVE-2025-48700 Synacor | Zimbra Collaboration Suite (ZCS) Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability: Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that could allow attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information. CWE-79
21.4.26 CVE-2023-27351 PaperCut | NG/MF PaperCut NG/MF Improper Authentication Vulnerability: PaperCut NG/MF contains an improper authentication vulnerability that could allow remote attackers to bypass authentication on affected installations via the SecurityRequestFilter class. CWE-287
21.4.26 CVE-2025-2749 Kentico | Kentico Xperience Kentico Xperience Path Traversal Vulnerability: Kentico Xperience contains a path traversal vulnerability that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations. CWE-22| CWE-434
21.4.26 CVE-2026-20133 Cisco | Catalyst SD-WAN Manger Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability: Cisco Catalyst SD-WAN Manager contains an exposure of sensitive information to an unauthorized actor vulnerability that could allow remote attackers to view sensitive information on affected systems.  CWE-200
21.4.26 CVE-2026-20122 Cisco | Catalyst SD-WAN Manger Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability: Cisco Catalyst SD-WAN Manager contains an incorrect use of privileged APIs vulnerability due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges. CWE-648
16.4.26

CVE-2026-34197

Apache | ActiveMQ Apache ActiveMQ Improper Input Validation Vulnerability: Apache ActiveMQ contains an improper input validation vulnerability that allows for code injection.  CWE-20| CWE-94
14.6.26

CVE-2026-32201

Microsoft | SharePoint Server Microsoft SharePoint Server Improper Input Validation Vulnerability: Microsoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network. CWE-20
13.4.26

CVE-2026-34621


Adobe | Acrobat and Reader
Adobe Acrobat and Reader Prototype Pollution Vulnerability: Adobe Acrobat and Reader contain a prototype pollution vulnerability that allows for arbitrary code execution. CWE-94
13.4.26

CVE-2026-21643


Fortinet | FortiClient EMS
Fortinet FortiClient EMS SQL Injection Vulnerability: Fortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests. CWE-89
13.4.26

CVE-2020-9715


Adobe | Acrobat
Adobe Acrobat Use-After-Free Vulnerability: Adobe Acrobat contains a use-after-free vulnerability that allows for code execution CWE-416
13.4.26

CVE-2023-36424

Microsoft | Windows Microsoft Windows Out-of-Bounds Read Vulnerability: Microsoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation CWE-125
13.4.26

CVE-2023-21529

Microsoft | Exchange Server
 
Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability: Microsoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution. CWE-502
13.4.26

CVE-2025-60710

Microsoft | Windows Microsoft Windows Link Following Vulnerability: Microsoft Windows contains a link following vulnerability that allows for privilege escalation CWE-59
13.4.26

CVE-2012-1854 

Microsoft | Visual Basic for Applications (VBA) Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability: Microsoft Visual Basic for Applications (VBA) contains an insecure library loading vulnerability that could allow for remote code execution. CWE-426
8.4.26 CVE-2026-1340 Ivanti | Endpoint Manager Mobile (EPMM) Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability: Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution. CWE-94
6.4.26 CVE-2026-35616 Fortinet | FortiClient EMS Fortinet FortiClient EMS Improper Access Control Vulnerability: Fortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests. CWE-284
2.4.26 CVE-2026-3502 TrueConf | Client TrueConf Client Download of Code Without Integrity Check Vulnerability: TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user. CWE-494
1.4.26 CVE-2026-5281 Google | Dawn Google Dawn Use-After-Free Vulnerability: Google Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google Chrome, Microsoft Edge, and Opera. CWE-416
30.3.26 CVE-2026-3055 Citrix | NetScaler Citrix NetScaler Out-of-Bounds Read Vulnerability: Citrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread. CWE-125
27.3.26 CVE-2025-53521 F5 | BIG-IP F5 BIG-IP Unspecified Vulnerability: F5 BIG-IP AMP contains an unspecified vulnerability that could allow a threat actor to achieve remote code execution.
26.3.26 CVE-2026-33634 Aquasecurity | Trivy Aquasecurity Trivy Embedded Malicious Code Vulnerability: Aquasecurity Trivy contains an embedded malicious code vulnerability that could allow an attacker to gain access to everything in the CI/CD environment, including all tokens, SSH keys, cloud credentials, database passwords, and any sensitive configuration in memory. CWE-506
25.3.26 CVE-2026-33017 Langflow | Langflow Langflow Code Injection Vulnerability: Langflow contains a code injection vulnerability that could allow building public flows without requiring authentication.  CWE-94| CWE-95| CWE-306
20.3.26 CVE-2025-54068 Laravel | Livewire Laravel Livewire Code Injection Vulnerability: Laravel Livewire contain a code injection vulnerability that could allow unauthenticated attackers to achieve remote command execution in specific scenarios. CWE-94
20.3.26 CVE-2025-32432 Craft CMS | Craft CMS Craft CMS Code Injection Vulnerability: Craft CMS contains a code injection vulnerability that allows a remote attacker to execute arbitrary code. CWE-94
19.3.26 CVE-2026-20131 Cisco | Secure Firewall Management Center (FMC) Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability: Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in the web-based management interface that could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. CWE-502
18.3.26 CVE-2026-20963 Microsoft | SharePoint Microsoft SharePoint Deserialization of Untrusted Data Vulnerability: Microsoft SharePoint contains a deserialization of untrusted data vulnerability that allows an unauthorized attacker to execute code over a network. CWE-502
18.3.26 CVE-2025-66376 Synacor | Zimbra Collaboration Suite (ZCS) Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability: Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability in the Classic UI where attackers could abuse Cascading Style Sheets (CSS) @import directives in email HTML. CWE-79
16.3.26 CVE-2025-47813 Wing FTP Server | Wing FTP Server Wing FTP Server Information Disclosure Vulnerability: Wing FTP Server contains a generation of error message containing sensitive information vulnerability when using a long value in the UID cookie. CWE-209
13.3.26 CVE-2026-3909 Google | Skia Google Skia Out-of-Bounds Write Vulnerability: Google Skia contains an out-of-bounds write vulnerability that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products. CWE-787
13.3.26 CVE-2026-3910 Google | Chromium V8 Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability: Google Chromium V8 contains an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. CWE-119
11.3.26 CVE-2025-68613 n8n | n8n n8n Improper Control of Dynamically-Managed Code Resources Vulnerability: n8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for remote code execution. CWE-913
9.3.26 CVE-2026-1603 Ivanti | Endpoint Manager (EPM) Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability: Ivanti Endpoint Manager (EPM) contains an authentication bypass using an alternate path or channel vulnerability that could allow a remote unauthenticated attacker to leak specific stored credential data. CWE-288
9.3.26 CVE-2025-26399 SolarWinds | Web Help Desk SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability: SolarWinds Web Help Desk contain a deserialization of untrusted data vulnerability in AjaxProxy that could allow an attacker to run commands on the host machine. CWE-502
9.3.26 CVE-2021-22054 Omnissa | Workspace One UEM Omnissa Workspace ONE Server-Side Request Forgery: Omnissa Workspace One UEM formerly known as VMware Workspace One UEM contains a server-side request forgery (SSRF) vulnerability that could allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information. CWE-918
5.3.26 CVE-2023-41974 Apple | iOS and iPadOS Apple iOS and iPadOS Use-After-Free Vulnerability: Apple iOS and iPadOS contain a use-after-free vulnerability. An app may be able to execute arbitrary code with kernel privileges. CWE-416
5.3.26 CVE-2021-30952 Apple | Multiple Products Apple Multiple Products Integer Overflow or Wraparound Vulnerability: Apple tvOS, macOS, Safari, iPadOS and watchOS contain an integer overflow or wraparound vulnerability due to the processing of maliciously crafted web content that may lead to arbitrary code execution. CWE-190
5.3.26 CVE-2023-43000 Apple | Multiple Products Apple Multiple products Use-After-Free Vulnerability: Apple macOS, iOS, iPadOS, and Safari 16.6 contain a use-after-free vulnerability due to the processing of maliciously crafted web content that may lead to memory corruption. CWE-416
5.3.26 CVE-2021-22681 Rockwell | Multiple Products Rockwell Multiple Products Insufficient Protected Credentials Vulnerability: Multiple Rockwell products contain an insufficient protected credentials vulnerability. Studio 5000 Logix Designer software may allow a key to be discovered. This key is used to verify Logix controllers are communicating with Rockwell Automation design software. If successfully exploited, this vulnerability could allow an unauthorized application to connect with Logix controllers. To leverage this vulnerability, an unauthorized user would require network access to the controller. CWE-522
5.3.26 CVE-2017-7921 Hikvision | Multiple Products Hikvision Multiple Products Improper Authentication Vulnerability: Multiple Hikvision products contain an improper authentication vulnerability that could allow a malicious user to escalate privileges on the system and gain access to sensitive information. CWE-287
3.3.26 CVE-2026-21385 Qualcomm | Multiple Chipsets Qualcomm Multiple Chipsets Memory Corruption Vulnerability: Multiple Qualcomm chipsets contain a memory corruption vulnerability while using alignments for memory allocation. CWE-190
3.3.26 CVE-2026-22719 Broadcom | VMware Aria Operations Broadcom VMware Aria Operations Command Injection Vulnerability: Broadcom VMware Aria Operations formerly known as vRealize Operations (vROps) contains a command injection vulnerability that allows an unauthenticated attacker to execute arbitrary commands, potentially leading to remote code execution during support‑assisted product migration. CWE-77
25.2.26 CVE-2026-20127 Cisco | Catalyst SD-WAN Controller and Manager Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability: Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, contain an authentication bypass vulnerability could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric. CWE-287
25.2.26 CVE-2022-20775 Cisco | SD-WAN Cisco SD-WAN Path Traversal Vulnerability: Cisco SD-WAN CLI contains a path traversal vulnerability that could allow an authenticated local attacker to gain elevated privileges via improper access controls on commands within the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. CWE-25| CWE-282
24.2.26 CVE-2026-25108 Soliton Systems K.K | FileZen Soliton Systems K.K FileZen OS Command Injection Vulnerability: Soliton Systems K.K FileZen contains an OS command injection vulnerability when an user logs-in to the affected product and sends a specially crafted HTTP request. CWE-78
20.2.26 CVE-2025-68461 Roundcube | Webmail RoundCube Webmail Cross-site Scripting Vulnerability: RoundCube Webmail contains a cross-site scripting vulnerability via the animate tag in an SVG document. CWE-79
20.2.26 CVE-2025-49113 Roundcube | Webmail RoundCube Webmail Deserialization of Untrusted Data Vulnerability: RoundCube Webmail contains a deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php. CWE-502
18.2.26 CVE-2026-22769 Dell | RecoverPoint for Virtual Machines (RP4VMs) Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability: Dell RecoverPoint for Virtual Machines (RP4VMs) contains an use of hard-coded credentials vulnerability that could allow an unauthenticated remote attacker to gain unauthorized access to the underlying operating system and root-level persistence. CWE-798
18.2.26 CVE-2021-22175 GitLab | GitLab GitLab Server-Side Request Forgery (SSRF) Vulnerability: GitLab contains a server-side request forgery (SSRF) vulnerability when requests to the internal network for webhooks are enabled. CWE-918
17.2.26 CVE-2026-2441 Google | Chromium Google Chromium CSS Use-After-Free Vulnerability: Google Chromium CSS contains a use-after-free vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. CWE-416
17.2.26 CVE-2008-0015 Microsoft | Windows Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability: Microsoft Windows Video ActiveX Control contains a remote code execution vulnerability. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.
17.2.26 CVE-2024-7694 TeamT5 | ThreatSonar Anti-Ransomware TeamT5 ThreatSonar Anti-Ransomware Unrestricted Upload of File with Dangerous Type Vulnerability: TeamT5 ThreatSonar Anti-Ransomware contains an unrestricted upload of file with dangerous type vulnerability. ThreatSonar Anti-Ransomware does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system commands on the server. CWE-434
17.2.26 CVE-2020-7796 Synacor | Zimbra Collaboration Suite Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery Vulnerability: Synacor Zimbra Collaboration Suite (ZCS) contains a server-side request forgery vulnerability if WebEx zimlet installed and zimlet JSP is enabled. CWE-918
13.2.26 CVE-2026-1731 BeyondTrust | Remote Support (RS) and Privileged Remote Access (PRA) BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability: BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)contain an OS command injection vulnerability. Successful exploitation could allow an unauthenticated remote attacker to execute operating system commands in the context of the site user. Successful exploitation requires no authentication or user interaction and may lead to system compromise, including unauthorized access, data exfiltration, and service disruption. CWE-78
12.2.26 CVE-2025-40536 SolarWinds | Web Help Desk SolarWinds Web Help Desk Security Control Bypass Vulnerability: SolarWinds Web Help Desk contains a security control bypass vulnerability that could allow an unauthenticated attacker to gain access to certain restricted functionality. CWE-693
12.2.26 CVE-2025-15556 Notepad++ | Notepad++ Notepad++ Download of Code Without Integrity Check Vulnerability: Notepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an attacker-controlled installer. This could lead to arbitrary code execution with the privileges of the user. CWE-494
12.2.26 CVE-2024-43468 Microsoft | Configuration Manager Microsoft Configuration Manager SQL Injection Vulnerability: Microsoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database. CWE-89
12.2.26 CVE-2026-20700 Apple | Multiple Products Apple Multiple Buffer Overflow Vulnerability: Apple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code. CWE-119
10.2.26 CVE-2026-21514 Microsoft | Windows Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability: Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally. CWE-807
10.2.26 CVE-2026-21519 Microsoft | Windows Microsoft Windows Type Confusion Vulnerability: Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally. CWE-843
10.2.26 CVE-2026-21533 Microsoft | Windows Microsoft Windows Improper Privilege Management Vulnerability: Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally. CWE-269
10.2.26 CVE-2026-21510 Microsoft | Windows Microsoft Windows Shell Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network. CWE-693
10.2.26 CVE-2026-21525 Microsoft | Windows Microsoft Windows NULL Pointer Dereference Vulnerability: Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally. CWE-476
10.2.26 CVE-2026-21513 Microsoft | Windows Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability: Microsoft MSHTML Framework contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network. CWE-693
5.2.26 CVE-2026-24423  SmarterTools | SmarterMail SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability: SmarterTools SmarterMail contains a missing authentication for critical function vulnerability in the ConnectToHub API method. This could allow the attacker to point the SmarterMail instance to a malicious HTTP server which serves the malicious OS command and could lead to command execution. CWE-306
5.2.26 CVE-2025-11953 React Native Community | CLI React Native Community CLI OS Command Injection Vulnerability: React Native Community CLI contains an OS command injection vulnerability which could allow unauthenticated network attackers to send POST requests to the Metro Development Server and run arbitrary executables via a vulnerable endpoint exposed by the server. On Windows, attackers can also execute arbitrary shell commands with fully controlled arguments. CWE-78
3.2.26 CVE-2025-40551 SolarWinds | Web Help Desk SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability: SolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication. CWE-502
3.2.26 CVE-2019-19006 Sangoma | FreePBX Sangoma FreePBX Improper Authentication Vulnerability: Sangoma FreePBX contains an improper authentication vulnerability that potentially allows unauthorized users to bypass password authentication and access services provided by the FreePBX admin. CWE-287
3.2.26 CVE-2025-64328 Sangoma | FreePBX Sangoma FreePBX OS Command Injection Vulnerability: Sangoma FreePBX Endpoint Manager contains an OS command injection vulnerability that could allow for a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to potentially obtain remote access to the system as an asterisk user. CWE-78
3.2.26 CVE-2021-39935 GitLab | Community and Enterprise Editions GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability: GitLab Community and Enterprise Editions contain a server-side request forgery vulnerability which could allow unauthorized external users to perform Server Side Requests via the CI Lint API.  CWE-918
29.1.26 CVE-2026-1281 Ivanti | Endpoint Manager Mobile (EPMM) Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability: Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.  CWE-94
27.1.26 CVE-2026-24858 Fortinet | Multiple Products Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability: Fortinet FortiAnalyzer, FortiManager, FortiOS, and FortiProxy contain an authentication bypass using an alternate path or channel that could allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices. CWE-288
26.1.26 CVE-2026-21509 Microsoft | Office Microsoft Office Security Feature Bypass Vulnerability: Microsoft Office contains a security feature bypass vulnerability in which reliance on untrusted inputs in a security decision in Microsoft Office could allow an unauthorized attacker to bypass a security feature locally. CWE-807
26.1.26 CVE-2026-24061 GNU | InetUtils GNU InetUtils Argument Injection Vulnerability: GNU InetUtils contains an argument injection vulnerability in telnetd that could allow for remote authentication bypass via a "-f root" value for the USER environment variable. CWE-88
26.1.26 CVE-2026-23760 SmarterTools | SmarterMail SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability: SmarterTools SmarterMail contains an authentication bypass using an alternate path or channel vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. This could allow an unauthenticated attacker to supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. CWE-288
26.1.26 CVE-2025-52691 SmarterTools | SmarterMail SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability: SmarterTools SmarterMail contains an unrestricted upload of file with dangerous type vulnerability that could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution. CWE-434
26.1.26 CVE-2018-14634 Linux | Kernal Linux Kernel Integer Overflow Vulnerability: Linux Kernel contains an integer overflow vulnerability in the create_elf_tables() function which could allow an unprivileged local user with access to SUID (or otherwise privileged) binary to escalate their privileges on the system. CWE-190
23.1.26 CVE-2024-37079 Broadcom | VMware vCenter Server Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability: Broadcom VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. This could allow a malicious actor with network access to vCenter Server to send specially crafted network packets, potentially leading to remote code execution. CWE-787
22.1.26 CVE-2025-54313 Prettier | eslint-config-prettier Prettier eslint-config-prettier Embedded Malicious Code Vulnerability: Prettier eslint-config-prettier contains an embedded malicious code vulnerability. Installing an affected package executes an install.js file that launches the node-gyp.dll malware on Windows. CWE-506
22.1.26 CVE-2025-31125  Vite | Vitejs Vite Vitejs Improper Access Control Vulnerability: Vite Vitejs contains an improper access control vulnerability that exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected.  CWE-200| CWE-284
22.1.26 CVE-2025-34026 Versa | Concerto
 
Versa Concerto Improper Authentication Vulnerability: Versa Concerto SD-WAN orchestration platform contains an improper authentication vulnerability in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The internal Actuator endpoint can be leveraged for access to heap dumps and trace logs. CWE-288
22.1.26 CVE-2025-68645 Synacor | Zimbra Collaboration Suite (ZCS) Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability: Synacor Zimbra Collaboration Suite (ZCS) contains a PHP remote file inclusion vulnerability that could allow for remote attackers to craft requests to the /h/rest endpoint to influence internal request dispatching, allowing inclusion of arbitrary files from the WebRoot directory. CWE-98
21.1.26 CVE-2026-20045 Cisco | Unified Communications Manager Cisco Unified Communications Products Code Injection Vulnerability: Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance contain a code injection vulnerability that could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root. CWE-94
13.1.26 CVE-2026-20805 Microsoft | Windows Microsoft Windows Information Disclosure Vulnerability: Microsoft Windows Desktop Windows Manager contains an information disclosure vulnerability that allows an authorized attacker to disclose information locally. CWE-200
12.1.26 CVE-2025-8110 Gogs | Gogs Gogs Path Traversal Vulnerability: Gogs contains a path traversal vulnerability affecting improper Symbolic link handling in the PutContents API that could allow for code execution. CWE-22
12.1.26 CVE-2025-37164 Hewlett Packard Enterprise (HPE) | OneView Hewlett Packard Enterprise (HPE) OneView Code Injection Vulnerability: Hewlett Packard Enterprise (HPE) OneView contains a code injection vulnerability that allows a remote unauthenticated user to perform remote code execution. CWE-94
7.1.26 Microsoft | Office Microsoft Office PowerPoint Code Injection Vulnerability: Microsoft Office PowerPoint contains a code injection vulnerability that allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an invalid index value that triggers memory corruption. CWE-94