// CVE Tracker

Critical vulnerabilities currently doing the rounds โ€” sorted by CVSS score.

2

CRITICAL

2

HIGH

4

TOTAL ACTIVE

4

PATCHED

CVSS Scale: 9.0โ€“10.0 CRITICAL ยท 7.0โ€“8.9 HIGH ยท 4.0โ€“6.9 MEDIUM ยท 0.1โ€“3.9 LOW
9.1
CVSS

CVE-2026-2699

Progress ShareFile Storage Zones Controller Authentication Bypass

CRITICAL โœ“ Patch Available

A critical authentication bypass vulnerability in Progress ShareFile Storage Zones Controller (SZC) arises from improper handling of execution-after-redirect behaviour in the /ConfigService/Admin.aspx administrative endpoint. An unauthenticated remote attacker can exploit the redirect logic to gain access to restricted administrative functions without supplying valid credentials. When chained with CVE-2026-2701 (arbitrary file upload), this vulnerability enables fully unauthenticated remote code execution. Progress released a fix in SZC version 5.12.4 on 10 March 2026; watchTowr Labs published full technical details on 2 April, significantly lowering the exploitation barrier. Approximately 30,000 SZC instances are internet-exposed.

Progress ShareFile Storage Zones Controller 5.12.3 and earlier
9.1
CVSS

CVE-2026-35616

Fortinet FortiClient EMS Pre-Authentication API Bypass and Privilege Escalation

CRITICAL โœ“ Patch Available

A critical improper access control vulnerability (CWE-284) in Fortinet FortiClient Endpoint Management Server allows an unauthenticated remote attacker to bypass API authentication and execute arbitrary code or commands on the server via crafted HTTP requests. Carrying a CVSS score of 9.1, this flaw affects the management plane responsible for deploying and enforcing endpoint security policy, ZTNA, and VPN access controls across managed fleets. Active exploitation was confirmed by multiple researchers beginning 31 March 2026, and CISA added CVE-2026-35616 to its KEV catalogue on 6 April with a federal remediation deadline of 9 April โ€” one of the shortest timelines CISA issues.

Fortinet FortiClient EMS 7.4.5 Fortinet FortiClient EMS 7.4.6
8.8
CVSS

CVE-2026-2701

Progress ShareFile Storage Zones Controller Arbitrary File Upload to Webroot

HIGH โœ“ Patch Available

An arbitrary file upload vulnerability in Progress ShareFile Storage Zones Controller allows an attacker with administrative session access to upload and extract archive content into the IIS web root, enabling placement of malicious ASPX webshells that execute with the web server's privileges. When chained with the authentication bypass in CVE-2026-2699, this vulnerability can be exploited without any authentication, yielding full remote code execution on the server. The full attack chain was publicly documented by watchTowr Labs on 2 April 2026 following coordinated disclosure, and Progress has issued a fix in version 5.12.4.

Progress ShareFile Storage Zones Controller 5.12.3 and earlier
8.8
CVSS

CVE-2026-5281

Google Chrome Dawn Use-After-Free (WebGPU) Under Active Exploitation

HIGH โœ“ Patch Available

A high-severity use-after-free vulnerability in Dawn, Chromium's open-source WebGPU implementation, allows a remote attacker who has already compromised the renderer process to escalate to arbitrary code execution via a crafted HTML page. Google confirmed active exploitation in the wild. CISA added CVE-2026-5281 to its Known Exploited Vulnerabilities catalogue on 1 April 2026, requiring federal agencies to patch by 15 April. This is the fifth Chrome zero-day exploited in attacks in 2026, following a sustained research focus on Chrome's graphics stack.

Google Chrome before 146.0.7680.177 (Linux) Google Chrome before 146.0.7680.177/178 (Windows/macOS) Microsoft Edge (Chromium-based) on equivalent unpatched V8/Dawn versions +1 more

Note: CVE data is curated manually from NVD, vendor advisories, and security research. CVSS scores reflect NVD base scores at time of entry. Always verify with official vendor advisories before actioning.