Vulnerability intelligence

Updated 12 minutes ago

Feeds

Trending now

CVEs trending on social media within the last 24 hours

Hypemeter

250100

Current score

These are not the 0days you are looking for

  1. 1

    CVE-2023-41991 Published Sep 21, 2023

    Hype score

    25

    medium 5.5

    Exploit known

    AppleiPadOSiOSmacOS

    CVE-2023-41991 is a certificate validation vulnerability that affects macOS, iOS, and iPadOS. A malicious application could exploit this vulnerability to bypass signature validation. Apple has addressed this issue in macOS Ventura 13.6, iOS 16.7, and iPadOS 16.7. Apple is aware of reports indicating that this vulnerability may have been actively exploited against versions of iOS before 16.7. It was observed being exploited in an exploit chain, along with CVE-2023-41992 and CVE-2023-41993, to deploy Predator spyware on a target's mobile device.

  2. 2

    CVE-2025-31200 Published Apr 16, 2025

    Hype score

    18

    medium 6.8

    Exploit known

    CoreAudioApple

    CVE-2025-31200 is a memory corruption vulnerability that exists in Apple's CoreAudio framework. This vulnerability can be triggered when processing an audio stream within a maliciously crafted media file. Successful exploitation of this vulnerability could allow for arbitrary code execution on the affected device. Apple has addressed this issue with improved bounds checking in tvOS 18.4.1, visionOS 2.4.1, iOS and iPadOS 18.4.1, and macOS Sequoia 15.4.1. It was reported that this vulnerability may have been exploited in targeted attacks against specific individuals.

  3. 3

    CVE-2025-30401 Published Apr 5, 2025

    Hype score

    16

    medium 6.7

    CVE-2025-30401 is a spoofing vulnerability that affects WhatsApp for Windows versions prior to 2.2450.6. The vulnerability lies in how WhatsApp handles file attachments. The application displays attachments according to their MIME type but selects the file opening handler based on the attachment's filename extension. This discrepancy could allow attackers to craft malicious files that appear harmless but, when manually opened by the user, could execute arbitrary code. A maliciously crafted attachment with a misleading filename and MIME type could trick the user into opening a file that contains arbitrary code.

See more

Known exploited

Sourced from CISA's Known Exploited Vulnerability (KEV) catalog.

  1. CVE-2023-0386 Published Mar 22, 2023

    high 7.8

    Exploit known

    Linux Kernel

    CVE-2023-0386 is a flaw found in the Linux kernel's OverlayFS subsystem. It involves unauthorized access to the execution of a setuid file with capabilities. Specifically, the vulnerability lies in how a user copies a capable file from a nosuid mount into another mount. This "uid mapping bug" allows a local user to escalate their privileges on the system. The kernel fails to check if the user/group owning a file copied from the overlay file system to the 'upper' directory is mapped in the current user namespace. This can be exploited to create a SUID binary owned by root, allowing an unprivileged user to gain elevated privileges.

  2. CVE-2023-33538 Published Jun 7, 2023

    high 8.8

    Exploit known

    TP-Link

    CVE-2023-33538 is a command injection vulnerability found in TP-Link routers, specifically the TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 models. The vulnerability exists within the `/userRpm/WlanNetworkRpm` component. This vulnerability allows an attacker to inject arbitrary commands into the system by manipulating an unknown input. Successful exploitation could lead to a compromise of confidentiality, integrity, and availability of the affected device. CISA has added this vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, indicating active exploitation in the wild.

  3. CVE-2025-43200 Published Jun 16, 2025

    medium 4.8

    Exploit known

    AppleiCloud

    CVE-2025-43200 is a vulnerability related to how Apple devices process maliciously crafted photos or videos shared via iCloud Link. A logic issue existed that could be exploited through a zero-click attack, meaning it could be triggered without any user interaction. Apple has acknowledged that this vulnerability may have been used in targeted attacks against specific individuals. The vulnerability was addressed with improved checks in iOS 18.3.1, iPadOS 18.3.1, iPadOS 17.7.5, macOS Sequoia 15.3.1, macOS Sonoma 14.7.4, macOS Ventura 13.7.4, watchOS 11.3.1, and visionOS 2.3.1, released on February 10, 2025. Citizen Lab has found forensic evidence that this vulnerability was leveraged to deploy Paragon's Graphite spyware against journalists.

See more

Insights

See more

Our Security Team's most recent CVE analysis

  1. CVE-2025-4428

    high 7.2

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated May 19, 2025

    This CVE references a Java Expression Language injection vulnerability in Ivanti EPMM, which allows a user with access to a particular API to execute arbitrary code.

    In conjunction with CVE-2025-4427 - an auth bypass vulnerability which gives access to the API in question - this can be used by an unauthenticated attacker.

    More information on exact vulnerable versions can be found here - you should patch immediately if vulnerable. Note that in the recommended deployment of EPMM, where the API is not accessible to the internet, the impact is reduced.

    Remote Code Execution in API component in Ivanti Endpoint Manager Mobile 12.5.0.0 and prior on unspecified platforms allows authenticated attackers to execute arbitrary code via crafted API requests.

  2. Link to CVE page

    Intruder Insights

    Updated Apr 28, 2025

    If caching is in use on this application, it is likely this can be used to poison the cache, causing the modified data to be shown to other users.

    There is also potential to then use this for cross-site scripting, although, this would depend on how the data is processed by the client, and will not be the case for all applications.

    In order for this application to be vulnerable, React Router must be used in Framework mode.

    React Router is a router for React. In versions on the 7.0 branch prior to version 7.5.2, it's possible to modify pre-rendered data by adding a header to the request. This allows to completely spoof its contents and modify all the values ​​of the data object passed to the HTML. This issue has been patched in version 7.5.2.

  3. CVE-2025-30406

    critical 9.0

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated Apr 14, 2025

    This vulnerability is caused by the installer for the application using a hardcoded value for the validation and decryption key (sometimes known as the machine keys). These values are the same for all instances created by the vulnerable installer, and so an attacker can find these keys for your instance very easily.

    If an attacker possesses these keys, they can execute code of their choice on the server remotely using well-known methods.

    Updating to the latest version will cause the keys to be regenerated to secret values.

    Gladinet CentreStack through 16.1.10296.56315 (fixed in 16.4.10315.56368) has a deserialization vulnerability due to the CentreStack portal's hardcoded machineKey use, as exploited in the wild in March 2025. This enables threat actors (who know the machineKey) to serialize a payload for server-side deserialization to achieve remote code execution. NOTE: a CentreStack admin can manually delete the machineKey defined in portal\web.config.