cPanel is a very popular hosting framework which is often very difficult to avoid exposing to the internet. The exploit for this weakness gives the attacker root access to cPanel (and from there easy RCE on the system), and the exploit is reliable, well documented, and affects all versions of cPanel except the latest patch. There are well over a million hosts exposed, and though cPanel does have some automated self-upgrade functionality, it can be turned off, and the window before an upgrade (usually up to 24h) is long enough for attacker to have already exploited this weakness. cPanel have provided a script you can use to detect if compromise has already occurred, which can be found here.
Vulnerability intelligence
Updated 11 minutes ago
FeedsTrending now
CVEs trending on social media within the last 24 hours
Hypemeter
Current score
Tepid
1
CVE-2026-41091 Published May 20, 2026Hype score
30
high 7.8
Exploit known
Microsoft DefenderCVE-2026-41091 is a privilege escalation vulnerability found in Microsoft Defender. The flaw stems from improper link resolution before file access, often referred to as 'link following', within the Microsoft Malware Protection Engine (version 1.1.26030.3008 and earlier). This vulnerability allows an authorized attacker to locally elevate their privileges on an affected system. The issue arises from how Defender processes symbolic links and hard links, enabling attackers to manipulate file system traversal and gain higher-level access. Reports indicate that this vulnerability is already being exploited in the wild.
2
CVE-2026-45498 Published May 20, 2026Hype score
30
medium 4.0
Exploit known
Microsoft DefenderCVE-2026-45498 is identified as a denial-of-service (DoS) vulnerability affecting the Microsoft Defender Antimalware Platform. This flaw can be exploited to prevent Microsoft Defender from functioning as intended, potentially disrupting its protective capabilities on unpatched Windows devices. Microsoft has acknowledged that this vulnerability has been exploited in the wild, and security patches have been released to address it. The affected versions include Microsoft Defender Antimalware Platform 4.18.26030.3011 and earlier.
3
CVE-2026-43284 Published May 8, 2026Hype score
26
high 8.8
Dirty FragContainer SecurityServerUbuntuESPCVE-2026-43284, also known as part of the "Dirty Frag" vulnerability, is a flaw identified in the Linux kernel's xfrm-ESP subsystem. This vulnerability arises from an issue where the kernel performs in-place decryption on shared `skb` (socket buffer) fragments. Specifically, when `MSG_SPLICE_PAGES` attaches pages from a pipe directly to an `skb`, the IPv4/IPv6 datagram append paths failed to mark these `skbs` with `SKBFL_SHARED_FRAG` when splicing pages into UDP `skbs`. This oversight causes the ESP input path to decrypt data in place over buffers that are not privately owned by the `skb`, allowing unprivileged processes to retain references to the resulting plaintext. This mechanism effectively provides a write primitive into the page cache. The vulnerability was introduced in January 2017 and is related to a fast path for IPsec ESP receive. It is often discussed in conjunction with CVE-2026-43500, as the combination of these two flaws can be leveraged for local privilege escalation by manipulating the page cache to corrupt privileged files.
Known exploited
Sourced from CISA's Known Exploited Vulnerability (KEV) catalog.
- CVE-2010-0249 Published Jan 15, 2010
high 8.8
Exploit known
Microsoft Internet ExplorerWindowsUse-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 on Windows 2000 SP4; Windows XP SP2 and SP3; Windows Server 2003 SP2; Windows Vista Gold, SP1, and SP2; Windows Server 2008 Gold, SP2, and R2; and Windows 7 allows remote attackers to execute arbitrary code by accessing a pointer associated with a deleted object, related to incorrectly initialized memory and improper handling of objects in memory, as exploited in the wild in December 2009 and January 2010 during Operation Aurora, aka "HTML Object Memory Corruption Vulnerability."
- CVE-2026-9082 Published May 20, 2026
medium 6.5
DrupalDrupal CoreCVE-2026-9082 is a SQL injection vulnerability found within the database abstraction API of Drupal core. This flaw specifically impacts Drupal websites that utilize PostgreSQL databases. An attacker can exploit this vulnerability by sending specially crafted requests, which can lead to arbitrary SQL injection. Successful exploitation of CVE-2026-9082 can result in information disclosure, and in some cases, privilege escalation or remote code execution. This vulnerability can be exploited by anonymous users. The security updates released for this issue also include fixes for upstream dependencies like Symfony and Twig.
- CVE-2026-34926 Published May 21, 2026
medium 6.7
Exploit known
Apex OneApex One (on-premise)CVE-2026-34926 is a directory traversal vulnerability found in the on-premise version of Trend Micro Apex One. This flaw enables a pre-authenticated local attacker to alter a key table on the server. By modifying this table, an attacker can inject malicious code, which is subsequently deployed to agents on affected installations. Exploitation of this vulnerability requires the attacker to have local access to the Apex One Server and already possess administrative credentials for that server. Trend Micro has noted instances of attempted exploitation of this vulnerability in real-world scenarios, leading to its inclusion in CISA's Known Exploited Vulnerabilities catalog.
Insights
See moreOur Security Team's most recent CVE analysis
- Link to CVE page
CVE-2026-41940
critical 9.3
Exploit known
Intruder Insights
Updated Apr 30, 2026
- Link to CVE page
CVE-2026-1340
critical 9.8
Exploit known
Intruder Insights
Updated Jan 30, 2026
This and the similar vulnerability CVE-2026-1281 allow an unauthenticated attacker to execute code remotely on unpatched Ivanti EPMM instances.
A patch is available from Ivanti here and should be installed immediately. There is a page for defenders who need to check if their instance has been compromised here, though this is a work in progress.
Note that this is a temporary patch which will be removed with further version updates. If you update the version of your EPMM instance after patching, you must apply the patch again. A fully patched version of EPMM will be available in future which will permanently fix the vulnerability.
This vulnerability was known to be used in the wild before being disclosed by the vendor. Proof of concept code is now available publicly, so increased attack activity is expected.
- Link to CVE page
CVE-2026-1281
critical 9.8
Exploit known
Intruder Insights
Updated Jan 30, 2026
This and the similar vulnerability CVE-2026-1340 allow an unauthenticated attacker to execute code remotely on unpatched Ivanti EPMM instances.
A patch is available from Ivanti here and should be installed immediately. There is a page for defenders who need to check if their instance has been compromised here, though this is a work in progress.
Note that this is a temporary patch which will be removed with further version updates. If you update the version of your EPMM instance after patching, you must apply the patch again. A fully patched version of EPMM will be available in future which will permanently fix the vulnerability.
This vulnerability was known to be used in the wild before being disclosed by the vendor. Proof of concept code is now available publicly, so increased attack activity is expected.