KEV/ECV 2026 2025
DATE |
CVE | NAME | INFO | CATEG |
| 9.5.26 | CVE-2026-42208 | BerriAI LiteLLM SQL Injection Vulnerability | BerriAI LiteLLM SQL Injection Vulnerability | KEV |
| 9.5.26 | CVE-2026-6973 | Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability | Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability | KEV |
| 9.5.26 | CVE-2026-42208 | BerriAI | LiteLLM | BerriAI LiteLLM SQL Injection Vulnerability: BerriAI LiteLLM contains a SQL injection vulnerability that allows an attacker to read data from the proxy's database and potentially modify it, leading to unauthorised access to the proxy and the credentials it manages. | ECV |
| 9.5.26 | CVE-2026-6973 | Ivanti | Endpoint Manager Mobile (EPMM) | Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability: Ivanti Endpoint Manager Mobile (EPMM) contains an improper input validation vulnerability that allows a remotely authenticated user with administrative access to achieve remote code execution. | ECV |
| 9.5.26 | CVE-2026-0300 | Palo Alto Networks | PAN-OS | Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability: Palo Alto Networks PAN-OS contains an out-of-bounds write vulnerability in the User-ID Authentication Portal (aka Captive Portal) service that can allow an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. | ECV |
| 7.5.26 | CVE-2026-0300 | Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability | Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability | KEV |
| 3.5.26 | CVE-2026-31431 | Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability | Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability | KEV |
| 3.5.26 | CVE-2026-41940 | WebPros cPanel & WHM and WP2 (WordPress Squared) Missing Authentication for Critical Function Vulnerability | WebPros cPanel & WHM and WP2 (WordPress Squared) Missing Authentication for Critical Function Vulnerability | KEV |
| 3.5.26 | CVE-2024-1708 | ConnectWise ScreenConnect Path | ConnectWise ScreenConnect Path | KEV |
| 3.5.26 | CVE-2026-32202 | Microsoft Windows Protection Mechanism Failure Vulnerability | Microsoft Windows Protection Mechanism Failure Vulnerability | KEV |
| 3.5.26 | CVE-2024-7399 | Samsung MagicINFO 9 Server Path Traversal Vulnerability | Samsung MagicINFO 9 Server Path Traversal Vulnerability | KEV |
| 3.5.26 | CVE-2024-57726 | SimpleHelp Missing Authorization Vulnerability | SimpleHelp Missing Authorization Vulnerability | KEV |
| 3.5.26 | CVE-2024-57728 | SimpleHelp Path Traversal Vulnerability | SimpleHelp Path Traversal Vulnerability | KEV |
| 3.5.26 | CVE-2025-29635 | D-Link DIR-823X Command Injection Vulnerability | D-Link DIR-823X Command Injection Vulnerability | KEV |
| 3.5.26 | CVE-2026-39987 | Marimo Remote Code Execution Vulnerability | Marimo Remote Code Execution Vulnerability | KEV |
| 3.5.26 | CVE-2026-31431 | Linux | Kernel | Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability: Linux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation. | ECV |
| 3.5.26 | CVE-2026-41940 | WebPros | cPanel & WHM and WP2 (WordPress Squared) | WebPros cPanel & WHM and WP2 (WordPress Squared) Missing Authentication for Critical Function Vulnerability: WebPros cPanel & WHM (WebHost Manager) and WP2 (WordPress Squared) contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel. | ECV |
| 29.4.26 | CVE-2026-32202 | Microsoft | Windows | Microsoft Windows Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network. | ECV |
| 29.4.26 | CVE-2024-1708 | ConnectWise | ScreenConnect | ConnectWise ScreenConnect Path Traversal Vulnerability: ConnectWise ScreenConnect contains a path traversal vulnerability which could allow an attacker to execute remote code or directly impact confidential data and critical systems. | ECV |
| 27.4.26 | CVE-2024-57726 | SimpleHelp | SimpleHelp | SimpleHelp Missing Authorization Vulnerability: SimpleHelp contains a missing authorization vulnerability that could allow low-privileged technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role. | ECV |
| 27.4.26 | CVE-2024-57728 |
SimpleHelp | SimpleHelp |
SimpleHelp Path Traversal Vulnerability: SimpleHelp contains a path traversal vulnerability that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user. | ECV |
| 27.4.26 | CVE-2024-7399 | Samsung | MagicINFO 9 Serve | Samsung MagicINFO 9 Server Path Traversal Vulnerability: Samsung MagicINFO 9 Server contains a path traversal vulnerability that could allow an attacker to write arbitrary files as system authority. | ECV |
| 27.4.26 | CVE-2025-29635 | D-Link | DIR-823X | D-Link DIR-823X Command Injection Vulnerability: D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. | ECV |
| 27.4.26 | CVE-2026-39987 | Marimo | Marimo | Marimo Remote Code Execution Vulnerability: Marimo contains an pre-authorization remote code execution vulnerability, allowing an unauthenticated attacked to shell access and execute arbitrary system commands. | ECV |
| 27.4.26 | CVE-2026-33825 | Microsoft | Defender | Microsoft Defender Insufficient Granularity of Access Control Vulnerability: Microsoft Defender contains an insufficient granularity of access control vulnerability that could allow an authorized attacker to escalate privileges locally. | ECV |
| 21.4.26 | CVE-2024-27199 | JetBrains | TeamCity | JetBrains TeamCity Relative Path Traversal Vulnerability: JetBrains TeamCity contains a relative path traversal vulnerability that could allow limited admin actions to be performed. | ECV |
| 21.4.26 | CVE-2025-32975 | Quest | KACE Systems Management Appliance (SMA) | Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability: Quest KACE Systems Management Appliance (SMA) contains an improper authentication vulnerability that could allow attackers to impersonate legitimate users without valid credentials. | ECV |
| 21.4.26 | CVE-2026-20128 | Cisco | Catalyst SD-WAN Manager | Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability: Cisco Catalyst SD-WAN Manager contains a storing passwords in a recoverable format vulnerability that allows an authenticated, local attacker to gain DCA user privileges by accessing a credential file for the DCA user on the filesystem as a low-privileged user. | ECV |
| 21.4.26 | CVE-2025-48700 | Synacor | Zimbra Collaboration Suite (ZCS) | Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability: Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that could allow attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information. | ECV |
| 21.4.26 | CVE-2023-27351 | PaperCut | NG/MF | PaperCut NG/MF Improper Authentication Vulnerability: PaperCut NG/MF contains an improper authentication vulnerability that could allow remote attackers to bypass authentication on affected installations via the SecurityRequestFilter class. | ECV |
| 21.4.26 | CVE-2025-2749 | Kentico | Kentico Xperience | Kentico Xperience Path Traversal Vulnerability: Kentico Xperience contains a path traversal vulnerability that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations. | ECV |
| 21.4.26 | CVE-2026-20133 | Cisco | Catalyst SD-WAN Manger | Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability: Cisco Catalyst SD-WAN Manager contains an exposure of sensitive information to an unauthorized actor vulnerability that could allow remote attackers to view sensitive information on affected systems. | ECV |
| 21.4.26 | CVE-2026-20122 | Cisco | Catalyst SD-WAN Manger | Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability: Cisco Catalyst SD-WAN Manager contains an incorrect use of privileged APIs vulnerability due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges. | ECV |
| 20.4.26 | CVE-2026-34197 | Apache ActiveMQ Improper Input Validation Vulnerability | Apache ActiveMQ Improper Input Validation Vulnerability | KEV |
| 16.4.26 | CVE-2026-34197 | Apache | ActiveMQ | Apache ActiveMQ Improper Input Validation Vulnerability: Apache ActiveMQ contains an improper input validation vulnerability that allows for code injection. | ECV |
| 15.4.26 | CVE-2009-0238 | Microsoft Office Remote Code Execution Vulnerability | Microsoft Office Remote Code Execution Vulnerability | |
| 15.4.26 | CVE-2026-32201 | Microsoft SharePoint Server Improper Input Validation Vulnerability | Microsoft SharePoint Server Improper Input Validation Vulnerability | |
| 14.6.26 | CVE-2026-32201 | Microsoft | SharePoint Server | Microsoft SharePoint Server Improper Input Validation Vulnerability: Microsoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network. | ECV |
| 14.4.26 | CVE-2012-1854 | Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability | Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability | |
| 14.4.26 | CVE-2020-9715 | Adobe Acrobat Use-After-Free Vulnerability | Adobe Acrobat Use-After-Free Vulnerability | |
| 14.4.26 | CVE-2023-21529 | Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability | Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability | |
| 14.4.26 | CVE-2023-36424 |
Microsoft Windows Out-of-Bounds Read Vulnerability |
Microsoft Windows Out-of-Bounds Read Vulnerability |
|
| 14.4.26 | CVE-2025-60710 | Microsoft Windows Link Following Vulnerability | Microsoft Windows Link Following Vulnerability | |
| 14.4.26 | CVE-2026-21643 | Fortinet SQL Injection Vulnerability | Fortinet SQL Injection Vulnerability | |
| 14.4.26 | CVE-2026-34621 |
Adobe Acrobat and Reader Prototype Pollution Vulnerability |
Adobe Acrobat and Reader Prototype Pollution Vulnerability |
|
| 13.4.26 | CVE-2026-34621 |
Adobe | Acrobat and Reader |
Adobe Acrobat and Reader Prototype Pollution Vulnerability: Adobe Acrobat and Reader contain a prototype pollution vulnerability that allows for arbitrary code execution. | ECV |
| 13.4.26 | CVE-2026-21643 |
Fortinet | FortiClient EMS |
Fortinet FortiClient EMS SQL Injection Vulnerability: Fortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests. | ECV |
| 13.4.26 | CVE-2020-9715 |
Adobe | Acrobat |
Adobe Acrobat Use-After-Free Vulnerability: Adobe Acrobat contains a use-after-free vulnerability that allows for code execution | ECV |
| 13.4.26 | CVE-2023-36424 | Microsoft | Windows | Microsoft Windows Out-of-Bounds Read Vulnerability: Microsoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation | ECV |
| 13.4.26 | CVE-2023-21529 |
Microsoft | Exchange Server |
Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability: Microsoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution. | ECV |
| 13.4.26 | CVE-2025-60710 | Microsoft | Windows | Microsoft Windows Link Following Vulnerability: Microsoft Windows contains a link following vulnerability that allows for privilege escalation | ECV |
| 13.4.26 | CVE-2012-1854 | Microsoft | Visual Basic for Applications (VBA) | Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability: Microsoft Visual Basic for Applications (VBA) contains an insecure library loading vulnerability that could allow for remote code execution. | ECV |
|
8.4.26 |
CVE-2026-1340 | Ivanti | Endpoint Manager Mobile (EPMM) | Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability: Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution. | ECV |
|
8.4.26 |
Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability |
Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability |
||
| 6.4.26 | CVE-2026-35616 | Fortinet FortiClient EMS Improper Access Control Vulnerability | Fortinet FortiClient EMS Improper Access Control Vulnerability | |
| 2.4.26 | CVE-2026-3502 | TrueConf Client Download of Code Without Integrity Check Vulnerability | TrueConf Client Download of Code Without Integrity Check Vulnerability | |
| 2.4.26 | CVE-2026-35616 | Fortinet | FortiClient EMS | Fortinet FortiClient EMS Improper Access Control Vulnerability: Fortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests. | ECV |
| 2.4.26 | CVE-2026-3502 | TrueConf | Client | TrueConf Client Download of Code Without Integrity Check Vulnerability: TrueConf Client contains a download of code without integrity check vulnerability. | ECV |
| 1.4.26 | CVE-2026-5281 | Google | Dawn | Google Dawn Use-After-Free Vulnerability: Google Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. | ECV |
| 1.4.26 | CVE-2026-5281 | Google Dawn Use-After-Free Vulnerability |
VULNEREBILITY |
ECV |