Vulnerability intelligence

Updated a few seconds ago

Feeds

Trending now

CVEs trending on social media within the last 24 hours

Hypemeter

440100

Current score

It's warming up

  1. 1

    CVE-2025-55182 Published Dec 3, 2025

    Hype score

    44

    critical 10.0

    Exploit known

    Reactreact2shell

    CVE-2025-55182 is a critical unauthenticated remote code execution (RCE) vulnerability found in React Server Components (RSC) versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0. This vulnerability affects packages including `react-server-dom-parcel`, `react-server-dom-turbopack`, and `react-server-dom-webpack`. The flaw stems from insecure deserialization in the RSC payload handling logic, allowing attacker-controlled data to influence server-side execution. Exploitation requires only a crafted HTTP request. Patches are available for React and Next.js. It is recommended to upgrade to patched React versions such as 19.0.1, 19.1.2, or 19.2.1, and to update frameworks like Next.js to their corresponding patched versions.

  2. 2

    CVE-2025-14174 Published Dec 12, 2025

    Hype score

    26

    high 8.8

    CVE-2025-14174 is an out-of-bounds memory access vulnerability found in ANGLE, a component of Google Chrome. The vulnerability could allow a remote attacker to perform out-of-bounds memory access via a crafted HTML page. Google is aware that an exploit for this vulnerability exists in the wild. Apple also addressed CVE-2025-14174, describing it as a memory corruption flaw in WebKit that could lead to memory corruption. Apple indicated that this vulnerability may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26.

  3. 3

    CVE-2025-46279

    Hype score

    21

    CVE-2025-46279 is a vulnerability that affects Apple products. Specifically, it is a permissions issue in the Kernel that was addressed with additional restrictions. It impacts devices including iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later. Duy Trần (@khanhduytran0) is credited with reporting this vulnerability. Successful exploitation of CVE-2025-46279 could allow an app to elevate privileges or gain root privileges. The vulnerability is addressed in macOS Tahoe 26.2, as well as iOS and iPadOS 26.2.

See more

Known exploited

Sourced from CISA's Known Exploited Vulnerability (KEV) catalog.

  1. CVE-2018-4063 Published May 6, 2019

    high 8.8

    An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability.

  2. CVE-2025-14174 Published Dec 12, 2025

    Hype score

    26

    high 8.8

    CVE-2025-14174 is an out-of-bounds memory access vulnerability found in ANGLE, a component of Google Chrome. The vulnerability could allow a remote attacker to perform out-of-bounds memory access via a crafted HTML page. Google is aware that an exploit for this vulnerability exists in the wild. Apple also addressed CVE-2025-14174, describing it as a memory corruption flaw in WebKit that could lead to memory corruption. Apple indicated that this vulnerability may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26.

  3. CVE-2025-58360 Published Nov 25, 2025

    high 8.2

    Exploit known

    GeoServer

    CVE-2025-58360 is an XML External Entity (XXE) vulnerability found in GeoServer. The application improperly sanitizes XML input at the `/geoserver/wms` endpoint, specifically within the `GetMap` operation. This allows an attacker to define external entities within an XML request. By exploiting this vulnerability, an attacker can read arbitrary files from the server's file system and conduct Server-Side Request Forgery (SSRF) to interact with internal systems. GeoServer versions before 2.25.6, versions 2.26.0 to before 2.26.3, and versions before 2.27.0 are affected. Users are advised to update to GeoServer 2.25.6, 2.26.3, or 2.27.0 to remediate the vulnerability.

See more

Insights

See more

Our Security Team's most recent CVE analysis

  1. Link to CVE page

    Intruder Insights

    Updated Dec 9, 2025

    This vulnerability allows for code execution via a deserialisation vulnerability within the react-server-dom packages. This will affect React, NextJS and downstream projects who utilise these frameworks.

    AssetNote released a technical research post and detection technique which is effective at identifying unpatches instances, where as full RCE chains may fail due to WAF's fingerprinting those payloads and bypasses heavily. Vercel's CEO released a simple breakdown of the issue and how it works.

    We have witnessed widespread exploitation activity for this vulnerability, especially exploiting this to deploy an in-memory webshell. There has been some community efforts to detect exploitation activity, however exploiting this vulnerability usually leaves little to no trace which is difficult for defenders.

    Patching immediately is the only effective strategy for dealing with this vulnerability.

    Rejected reason: This CVE is a duplicate of CVE-2025-55182.

  2. CVE-2025-55182

    critical 10.0

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated Dec 9, 2025

    This vulnerability allows for code execution via a deserialisation vulnerability within the react-server-dom packages. This will affect React, NextJS and downstream projects who utilise these frameworks.

    AssetNote released a technical research post and detection technique which is effective at identifying unpatches instances, where as full RCE chains may fail due to WAF's fingerprinting those payloads and bypasses heavily. Vercel's CEO released a simple breakdown of the issue and how it works.

    We have witnessed widespread exploitation activity for this vulnerability, especially exploiting this to deploy an in-memory webshell. There has been some community efforts to detect exploitation activity, however exploiting this vulnerability usually leaves little to no trace which is difficult for defenders.

    Patching immediately is the only effective strategy for dealing with this vulnerability.

    A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

  3. CVE-2025-64446

    critical 9.8

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated Nov 16, 2025

    This exploit was picked up by Defused as early as October 2nd where it was thought to be a variant of CVE-2022-40684. However, Fortinet have confirmed that this is a new vulnerability and have assigned this CVE to the vulnerability. This vulnerability takes advantage of both a path traversal (/api/v2.0/cmdb/system/admin%3f/../../../../../cgi-bin/fwbcgi) and an auth bypass via the cookie CGIINFO.

    Fortinet offer little information within their disclosure, and until today there was no patching information as mentioned within watchTowr's article. The infosec community has collated some IOC's which can be found here. This vulnerability has been actively exploited to create a new administrative user, any instances of Fortiweb that have exposed the web GUI to the internet should be considered compromised.

    A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.