Vulnerability intelligence

Updated 25 minutes ago

Feeds

Trending now

CVEs trending on social media within the last 24 hours

Hypemeter

570100

Current score

Soft-boiled

  1. 1

    CVE-2025-32463 Published Jun 30, 2025

    Hype score

    57

    critical 9.3

    Exploit known

    sudochwoot

    CVE-2025-32463 is a vulnerability that affects Sudo versions 1.9.14 to 1.9.17 inclusive. It allows a local user to gain root access. This is possible because the `/etc/nsswitch.conf` file from a user-controlled directory is used with the `--chroot` option. An attacker can exploit this vulnerability by using Sudo's `-R` or `--chroot` option to execute arbitrary commands as root, even if they are not listed in the `sudoers` file. The vulnerability was fixed in Sudo version 1.9.17p1.

  2. 2

    CVE-2025-41244 Published Sep 29, 2025

    Hype score

    43

    high 7.8

    VMware Tools

    CVE-2025-41244 is a local privilege escalation vulnerability affecting VMware Tools and VMware Aria Operations. It stems from overly broad regular expression patterns in the `get-versions.sh` component used by both VMware Tools and Aria Operations' Service Discovery Management Pack (SDMP). The `get_version()` function in this script scans for listening sockets and then executes matched binaries to retrieve version information. However, the use of the non-whitespace shorthand `\S` unintentionally includes user-writable directories such as `/tmp/httpd`. Attackers can exploit this by staging malicious binaries in these user-writable locations. The privileged VMware context then executes these binaries, leading to a local privilege escalation. By mimicking system binaries in writable paths, CVE-2025-41244 violates CWE-426: Untrusted Search Path, offering trivial local privilege escalation opportunities.

  3. 3

    CVE-2022-41352 Published Sep 26, 2022

    Hype score

    37

    critical 9.8

    Exploit known

    Zimbra ZCS

    CVE-2022-41352 is a vulnerability in Zimbra Collaboration Suite (ZCS) versions 8.8.15 and 9.0. It stems from how the Amavis content filter, which is part of Zimbra, uses the cpio utility to unpack archives. An attacker can exploit this by crafting a malicious archive (e.g., a .tar file) containing a web-shell and sending it to a vulnerable Zimbra server. When the Amavis filter scans the archive, it uses cpio to extract the contents, including the malicious web-shell, to a public directory. This allows the attacker to then execute arbitrary commands on the compromised server via the web-shell. The vulnerability exists because cpio lacks a secure mode for handling untrusted files, potentially allowing writes to any path accessible to the Zimbra user.

See more

Known exploited

Sourced from CISA's Known Exploited Vulnerability (KEV) catalog.

  1. CVE-2025-59689 Published Sep 19, 2025

    medium 6.1

    Exploit known

    Libraesva Email Security Gateway

    CVE-2025-59689 is a command injection vulnerability affecting Libraesva Email Security Gateway (ESG) versions 4.5 through 5.5.x before 5.5.7. It stems from improper sanitization when the software removes active code from files within certain compressed archive formats. Attackers can exploit this vulnerability by sending emails containing specially crafted compressed attachments. The payload files are designed to manipulate the application's sanitization logic, allowing the execution of arbitrary shell commands under a non-privileged user account. Fixes have been released for ESG versions 5.0, 5.1, 5.2, 5.4, and 5.5.

  2. CVE-2025-32463 Published Jun 30, 2025

    Hype score

    57

    critical 9.3

    Exploit known

    sudochwoot

    CVE-2025-32463 is a vulnerability that affects Sudo versions 1.9.14 to 1.9.17 inclusive. It allows a local user to gain root access. This is possible because the `/etc/nsswitch.conf` file from a user-controlled directory is used with the `--chroot` option. An attacker can exploit this vulnerability by using Sudo's `-R` or `--chroot` option to execute arbitrary commands as root, even if they are not listed in the `sudoers` file. The vulnerability was fixed in Sudo version 1.9.17p1.

  3. CVE-2025-20352 Published Sep 24, 2025

    high 7.7

    Exploit known

    SNMP

    CVE-2025-20352 is a vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software. It stems from a stack overflow condition. An attacker can exploit this vulnerability by sending a crafted SNMP packet to an affected device over IPv4 or IPv6 networks. Cisco confirmed that the vulnerability is being actively exploited in the wild. The vulnerability allows for two distinct attack scenarios based on the attacker's privilege level. A low-privileged, authenticated, remote attacker with an SNMPv2c read-only community string or valid SNMPv3 user credentials can cause a denial-of-service (DoS) condition on an affected device. A high-privileged attacker with SNMPv1 or v2c read-only community strings combined with administrative credentials can execute code as the root user, gaining full control of the affected system.

See more

Insights

See more

Our Security Team's most recent CVE analysis

  1. CVE-2025-7775

    critical 9.2

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated Aug 28, 2025

    As this vulnerability is known to have been exploited by real attackers, the patch should be applied immediately.

    If you have a vulnerable device connected to the internet, as well as patching, it is important to check that the device was not already compromised.

    NCSC-NL, the Dutch National Cybersecurity Centre, have produced a tool available here which can help with this. Note that despite being marked as for an older CVE, this script is also receiving updates to check for issues relating to CVE-2025-7775.

    Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with IPv6 services or servicegroups bound with IPv6 servers (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with DBS IPv6 services or servicegroups bound with IPv6 DBS servers (OR) CR virtual server with type HDX

  2. CVE-2025-43300

    high 8.8

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated Aug 26, 2025

    Researchers have been analysing the patch and have been able to trigger the crash within the iOS JPEG lossless decompression within RawCamera.bundle. Some git repositories with the results of their analysis have been made public here and here.

    According to Apple, this issue has been "exploited in an extremely sophisticated attack against specific targeted individuals". A vulnerability of this nature takes significant resources to develop. As such, this is extremely valuable to threat actors where some vulnerability brokers would pay up to $15 million for a working proof-of-concept for this type of attack. Therefore we can assume widespread exploitation has not happened, but with the progress researchers have been making it will only be a matter of time before that happens. Patches should be applied immediately.

    An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.

  3. CVE-2025-54418

    critical 9.8

    Link to CVE page

    Intruder Insights

    Updated Jul 31, 2025

    For this vulnerability to be exploitable, the ImageMagick image processing library needs to be used to resize or add a text watermark to a user-uploaded file which was saved using a user-provided filename, or where the parameters for adding a watermark are user-controlled. File upload implementations that use a randomly generated filename before image resizing are not vulnerable.

    This vulnerability is simple to exploit and we expect to see active exploitation soon. However, attackers will need to locate file upload functionality within your applications first which will be difficult to fully automate at scale, so mass exploitation is unlikely.

    CodeIgniter is a PHP full-stack web framework. A command injection vulnerability present in versions prior to 4.6.2 affects applications that use the ImageMagick handler for image processing (`imagick` as the image library) and either allow file uploads with user-controlled filenames and process uploaded images using the `resize()` method or use the `text()` method with user-controlled text content or options. An attacker can upload a file with a malicious filename containing shell metacharacters that get executed when the image is processed or provide malicious text content or options that get executed when adding text to images Users should upgrade to v4.6.2 or later to receive a patch. As a workaround, switch to the GD image handler (`gd`, the default handler), which is not affected by either vulnerability. For file upload scenarios, instead of using user-provided filenames, generate random names to eliminate the attack vector with `getRandomName()` when using the `move()` method, or use the `store()` method, which automatically generates safe filenames. For text operations, if one must use ImageMagick with user-controlled text, sanitize the input to only allow safe characters and validate/restrict text options.