Vulnerability intelligence

Updated 32 minutes ago

Feeds

Trending now

CVEs trending on social media within the last 24 hours

Hypemeter

350100

Current score

Soft-boiled

  1. 1

    CVE-2025-15467 Published Jan 27, 2026

    Hype score

    35

    OpenSSLCMS AuthEnvelopedData

    CVE-2025-15467 is a stack buffer overflow vulnerability found in OpenSSL, specifically within its parsing of CMS AuthEnvelopedData. This flaw arises when OpenSSL processes Cryptographic Message Syntax (CMS) structures that utilize Authenticated Encryption with Associated Data (AEAD) ciphers, such as AES-GCM. The library fails to adequately verify that the length of the Initialization Vector (IV) fits into a fixed-size stack buffer. An attacker can exploit this vulnerability by sending a specially crafted CMS message containing an oversized IV. This can lead to a crash, resulting in a Denial of Service (DoS), or potentially enable remote code execution. The overflow occurs prior to any authentication or tag verification, meaning that no valid key material is required to trigger the issue. This vulnerability impacts OpenSSL versions 3.0 through 3.6.

  2. 2

    CVE-2025-8088 Published Aug 8, 2025

    Hype score

    31

    high 8.4

    Exploit known

    WinRAR

    CVE-2025-8088 is a path traversal vulnerability affecting the Windows version of WinRAR. It allows attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild. It was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET. The vulnerability was exploited in phishing attacks to deliver RomCom malware. The attackers can trick the program into saving a file in a different location than the user intended, such as the computer's Startup folder. This allows the attackers to execute their own code. WinRAR patched the vulnerability in version 7.13.

  3. 3

    CVE-2025-40551 Published Jan 28, 2026

    Hype score

    19

    critical 9.8

    CVE-2025-40551 is a remote code execution (RCE) vulnerability identified in SolarWinds Web Help Desk (WHD) software. This flaw originates from an untrusted data deserialization weakness, which allows an attacker to execute commands on the host machine. Exploitation of CVE-2025-40551 can occur without requiring authentication. This vulnerability is often discussed alongside other related issues in SolarWinds WHD, forming potential attack chains.

See more

Insights

See more

Our Security Team's most recent CVE analysis

  1. CVE-2025-14847

    high 8.7

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated Dec 29, 2025

    This is a serious vulnerability which allows an unauthenticated remote attacker to retrieve information from MongoDB's memory. A proof-of-concept is available to the public.

    Similar to other heap disclosure vulnerabilities such as Heartbleed, the impact of exploitation will vary depending on the information an attacker is able to obtain from the heap. However, it is quite likely that the leaked memory will contain credentials or other sensitive information, especially as attackers learn more about the vulnerability and use it more effectively.

    Regardless of patch status, MongoDB should not be exposed to the internet and access should be restricted by a firewall or similar controls. You should also apply the patch as soon as possible, to avoid the vulnerability being exploited internally.

    Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0.

  2. Link to CVE page

    Intruder Insights

    Updated Dec 9, 2025

    This vulnerability allows for code execution via a deserialisation vulnerability within the react-server-dom packages. This will affect React, NextJS and downstream projects who utilise these frameworks.

    AssetNote released a technical research post and detection technique which is effective at identifying unpatches instances, where as full RCE chains may fail due to WAF's fingerprinting those payloads and bypasses heavily. Vercel's CEO released a simple breakdown of the issue and how it works.

    We have witnessed widespread exploitation activity for this vulnerability, especially exploiting this to deploy an in-memory webshell. There has been some community efforts to detect exploitation activity, however exploiting this vulnerability usually leaves little to no trace which is difficult for defenders.

    Patching immediately is the only effective strategy for dealing with this vulnerability.

    Rejected reason: This CVE is a duplicate of CVE-2025-55182.

  3. CVE-2025-55182

    critical 10.0

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated Dec 9, 2025

    This vulnerability allows for code execution via a deserialisation vulnerability within the react-server-dom packages. This will affect React, NextJS and downstream projects who utilise these frameworks.

    AssetNote released a technical research post and detection technique which is effective at identifying unpatches instances, where as full RCE chains may fail due to WAF's fingerprinting those payloads and bypasses heavily. Vercel's CEO released a simple breakdown of the issue and how it works.

    We have witnessed widespread exploitation activity for this vulnerability, especially exploiting this to deploy an in-memory webshell. There has been some community efforts to detect exploitation activity, however exploiting this vulnerability usually leaves little to no trace which is difficult for defenders.

    Patching immediately is the only effective strategy for dealing with this vulnerability.

    A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.