cPanel is a very popular hosting framework which is often very difficult to avoid exposing to the internet. The exploit for this weakness gives the attacker root access to cPanel (and from there easy RCE on the system), and the exploit is reliable, well documented, and affects all versions of cPanel except the latest patch. There are well over a million hosts exposed, and though cPanel does have some automated self-upgrade functionality, it can be turned off, and the window before an upgrade (usually up to 24h) is long enough for attacker to have already exploited this weakness. cPanel have provided a script you can use to detect if compromise has already occurred, which can be found here.
Vulnerability intelligence
Updated 14 minutes ago
FeedsTrending now
CVEs trending on social media within the last 24 hours
Hypemeter
Current score
Tepid
1
CVE-2025-53892 Published Jul 16, 2025Hype score
33
medium 5.3
Vue I18nVue.jsCVE-2025-53892 describes a DOM-based Cross-Site Scripting (XSS) vulnerability found in Vue I18n, an internationalization plugin for Vue.js. The vulnerability arises because the `escapeParameterHtml: true` option, which is designed to prevent HTML/script injection by escaping interpolated parameters, fails to adequately sanitize specific tag-based payloads. This flaw allows for the execution of malicious JavaScript code if an interpolated value containing such a payload is inserted into an HTML context using `v-html`, even when the `escapeParameterHtml` setting is enabled.
2
CVE-2020-17103 Published Dec 10, 2020Hype score
14
high 7.0
WindowsCloud FilesCVE-2020-17103 is an Elevation of Privilege vulnerability found in the Windows Cloud Files Mini Filter Driver (cldflt.sys). This flaw allows a locally authenticated attacker with low privileges to escalate their access to SYSTEM-level permissions on a vulnerable system. The vulnerability was initially disclosed and patched by Microsoft as part of their December 2020 Patch Tuesday release cycle. However, it has recently resurfaced in discussions among threat actors and in public exploitation guidance forums, leading to renewed attention on potential exploitation attempts against unpatched Windows environments.
3
CVE-2026-40369 Published May 12, 2026Hype score
7
high 7.8
CVE-2026-40369 is identified as an untrusted pointer dereference vulnerability residing within the Windows Kernel. This flaw enables an authorized attacker to achieve local privilege escalation. The vulnerability allows an attacker, who already has authorized access to the system, to elevate their privileges. This issue was published on May 12, 2026, and is categorized as an Elevation of Privilege vulnerability.
Known exploited
Sourced from CISA's Known Exploited Vulnerability (KEV) catalog.
- CVE-2026-42897 Published May 14, 2026
Hype score
5
high 8.1
Exploit known
Microsoft Exchange ServerCVE-2026-42897 is a spoofing vulnerability impacting on-premises versions of Microsoft Exchange Server, including Exchange Server 2016, 2019, and Subscription Edition. This flaw, identified as an improper neutralization of input during web page generation (cross-site scripting or XSS), specifically affects Outlook Web Access (OWA). An attacker can exploit CVE-2026-42897 by sending a specially crafted email to a user. If the user opens this malicious email in Outlook Web Access, arbitrary JavaScript can be executed within the context of their browser, enabling spoofing over the network. Microsoft has confirmed that this vulnerability is under active exploitation.
- CVE-2026-42208 Published May 8, 2026
critical 9.3
Exploit known
OpenAIDatabaseServerSQL injectionLiteLLMZero-dayLiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.81.16 to before version 1.83.7, a database query used during proxy API key checks mixed the caller-supplied key value into the query text instead of passing it as a separate parameter. An unauthenticated attacker could send a specially crafted Authorization header to any LLM API route (for example POST /chat/completions) and reach this query through the proxy's error-handling path. An attacker could read data from the proxy's database and may be able to modify it, leading to unauthorised access to the proxy and the credentials it manages. This issue has been patched in version 1.83.7.
- CVE-2026-31431 Published Apr 22, 2026
Hype score
5
high 7.8
Exploit known
Tunneling protocolLinux Kernelalgif_aeadCloudUbuntuSSHPort (22)TlsAmazon RedshiftContainer SecurityServerZero-dayCVE-2026-31431, dubbed "Copy Fail," is a local privilege escalation (LPE) vulnerability found within the Linux kernel's cryptographic subsystem. Specifically, it stems from a logic flaw in the `algif_aead` module of the `AF_ALG` (userspace crypto API), which leads to improper memory handling during in-place operations. This flaw allows an unprivileged local user to perform a deterministic, controlled 4-byte write into the page cache of any readable file on the system, including setuid binaries. This vulnerability has been present in Linux kernels since 2017 and impacts a wide range of major distributions, including Red Hat, SUSE, Ubuntu, and Amazon Linux. Exploitation is described as reliable, not requiring race conditions or kernel-specific offsets, and can be achieved with a small Python script. The in-memory corruption means the file on disk remains unchanged, and typical on-disk checksums would not detect the modification.
Insights
See moreOur Security Team's most recent CVE analysis
- Link to CVE page
CVE-2026-41940
critical 9.3
Exploit known
Intruder Insights
Updated Apr 30, 2026
- Link to CVE page
CVE-2026-1340
critical 9.8
Exploit known
Intruder Insights
Updated Jan 30, 2026
This and the similar vulnerability CVE-2026-1281 allow an unauthenticated attacker to execute code remotely on unpatched Ivanti EPMM instances.
A patch is available from Ivanti here and should be installed immediately. There is a page for defenders who need to check if their instance has been compromised here, though this is a work in progress.
Note that this is a temporary patch which will be removed with further version updates. If you update the version of your EPMM instance after patching, you must apply the patch again. A fully patched version of EPMM will be available in future which will permanently fix the vulnerability.
This vulnerability was known to be used in the wild before being disclosed by the vendor. Proof of concept code is now available publicly, so increased attack activity is expected.
- Link to CVE page
CVE-2026-1281
critical 9.8
Exploit known
Intruder Insights
Updated Jan 30, 2026
This and the similar vulnerability CVE-2026-1340 allow an unauthenticated attacker to execute code remotely on unpatched Ivanti EPMM instances.
A patch is available from Ivanti here and should be installed immediately. There is a page for defenders who need to check if their instance has been compromised here, though this is a work in progress.
Note that this is a temporary patch which will be removed with further version updates. If you update the version of your EPMM instance after patching, you must apply the patch again. A fully patched version of EPMM will be available in future which will permanently fix the vulnerability.
This vulnerability was known to be used in the wild before being disclosed by the vendor. Proof of concept code is now available publicly, so increased attack activity is expected.