Vulnerability intelligence

Updated 16 minutes ago

Feeds

Trending now

CVEs trending on social media within the last 24 hours

Hypemeter

120100

Current score

Cold bath

  1. 1

    CVE-2024-32002 Published May 14, 2024

    Hype score

    12

    critical 9.0

    Git

    CVE-2024-32002 is a vulnerability that affects Git, a widely used revision control system. It exists in versions prior to 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. The vulnerability involves how Git handles submodules, which can be exploited to write files into the `.git/` directory instead of the intended submodule's worktree. This flaw allows an attacker to craft repositories that, when cloned, can execute a malicious hook during the cloning operation. This occurs because the attacker can write a hook script into the `.git/` directory that will run while the clone operation is still in progress, preventing the user from inspecting the code being executed.

  2. 2

    CVE-2026-45829 Published May 18, 2026

    Hype score

    11

    critical 10.0

    CVE-2026-45829 describes a pre-authentication code injection vulnerability found in version 1.0.0 and later of the ChromaDB Python project. This flaw allows an unauthenticated attacker to execute arbitrary code on the server. The vulnerability is exploited by sending a specially crafted malicious model repository with the `trust_remote_code` parameter set to true to the `/api/v2/tenants/{tenant}/databases/{db}/collections` endpoint. This can lead to the server loading and running the attacker's arbitrary code.

  3. 3

    CVE-2026-31694 Published May 1, 2026

    Hype score

    11

    high 7.8

    CVE-2026-31694 is identified as a buffer overflow vulnerability within the Linux Kernel's Filesystem in Userspace (FUSE) subsystem. The flaw specifically resides in the `fuse_add_dirent_to_cache()` function. This function is responsible for constructing and copying serialized directory entries into a page-cache page. The vulnerability occurs because `fuse_add_dirent_to_cache()` does not adequately validate that a serialized directory entry will fit entirely within a single page-cache page before performing the copy operation. A malicious FUSE server can exploit this by providing an oversized directory entry, such as one with `namelen=4095`, which results in a 4120-byte record. On systems utilizing 4 KiB pages, this oversized record can cause a 24-byte overflow into the adjacent kernel page. This issue impacts various Linux kernel versions, including 7.1-rc1 and 7.1-rc2.

See more

Insights

See more

Our Security Team's most recent CVE analysis

  1. CVE-2026-41940

    critical 9.3

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated Apr 30, 2026

    cPanel is a very popular hosting framework which is often very difficult to avoid exposing to the internet. The exploit for this weakness gives the attacker root access to cPanel (and from there easy RCE on the system), and the exploit is reliable, well documented, and affects all versions of cPanel except the latest patch. There are well over a million hosts exposed, and though cPanel does have some automated self-upgrade functionality, it can be turned off, and the window before an upgrade (usually up to 24h) is long enough for attacker to have already exploited this weakness. cPanel have provided a script you can use to detect if compromise has already occurred, which can be found here.

    cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

  2. CVE-2026-1340

    critical 9.8

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated Jan 30, 2026

    This and the similar vulnerability CVE-2026-1281 allow an unauthenticated attacker to execute code remotely on unpatched Ivanti EPMM instances.

    A patch is available from Ivanti here and should be installed immediately. There is a page for defenders who need to check if their instance has been compromised here, though this is a work in progress.

    Note that this is a temporary patch which will be removed with further version updates. If you update the version of your EPMM instance after patching, you must apply the patch again. A fully patched version of EPMM will be available in future which will permanently fix the vulnerability.

    This vulnerability was known to be used in the wild before being disclosed by the vendor. Proof of concept code is now available publicly, so increased attack activity is expected.

    A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

  3. CVE-2026-1281

    critical 9.8

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated Jan 30, 2026

    This and the similar vulnerability CVE-2026-1340 allow an unauthenticated attacker to execute code remotely on unpatched Ivanti EPMM instances.

    A patch is available from Ivanti here and should be installed immediately. There is a page for defenders who need to check if their instance has been compromised here, though this is a work in progress.

    Note that this is a temporary patch which will be removed with further version updates. If you update the version of your EPMM instance after patching, you must apply the patch again. A fully patched version of EPMM will be available in future which will permanently fix the vulnerability.

    This vulnerability was known to be used in the wild before being disclosed by the vendor. Proof of concept code is now available publicly, so increased attack activity is expected.

    A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.