Vulnerability intelligence

Updated an hour ago

Feeds

Trending now

CVEs trending on social media within the last 24 hours

Hypemeter

120100

Current score

Cold bath

  1. 1

    CVE-2025-20333 Published Sep 25, 2025

    Hype score

    12

    critical 9.9

    Exploit known

    Cisco ASAOTCisco FTD

    CVE-2025-20333 is a vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software. It stems from improper validation of user-supplied input in HTTP(S) requests. An authenticated, remote attacker with valid VPN user credentials could exploit this vulnerability by sending crafted HTTP requests to an affected device. Successful exploitation could allow the attacker to execute arbitrary code as root, potentially leading to complete compromise of the device. Cisco has released software updates to address this vulnerability.

  2. 2

    CVE-2025-53521 Published Oct 15, 2025

    Hype score

    8

    critical 9.3

    Exploit known

    Supply chainBIG-IP APMBIG-IPOTIoT

    CVE-2025-53521 is a vulnerability affecting F5 BIG-IP Access Policy Manager (APM) systems when an access policy is configured on a virtual server. The flaw, categorized as CWE-770 (Allocation of Resources Without Limits or Throttling), allows undisclosed or specially crafted traffic to cause the Traffic Management Microkernel (TMM) process to terminate. This termination of the TMM process results in a disruption of all traffic handled by the BIG-IP device until the process restarts. The vulnerability can be exploited remotely by an unauthenticated attacker, leading to a denial-of-service condition on the BIG-IP APM system.

  3. 3

    CVE-2025-20362 Published Sep 25, 2025

    Hype score

    8

    medium 6.5

    Exploit known

    Cisco FTDCisco ASAOT

    CVE-2025-20362 is a vulnerability found in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software. It could allow an unauthenticated, remote attacker to access restricted URL endpoints that should normally require authentication. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit it by sending crafted HTTP requests to a targeted web server, potentially gaining access to restricted URLs without proper authentication. Cisco has released software updates to address this vulnerability.

See more

Known exploited

Sourced from CISA's Known Exploited Vulnerability (KEV) catalog.

  1. CVE-2025-29635 Published Mar 25, 2025

    Hype score

    1

    high 7.2

    Exploit known

    D-Link DIR-823X

    CVE-2025-29635 describes a command injection vulnerability found in specific firmware versions (240126 and 240802) of D-Link DIR-823X routers. This flaw allows an authorized attacker to execute arbitrary commands on affected remote devices. The vulnerability is triggered by sending a specially crafted POST request to the `/goform/set_prohibiting` function, which can lead to remote command execution. Reports indicate that this vulnerability has been exploited by the Mirai botnet.

  2. CVE-2024-7399 Published Aug 12, 2024

    Hype score

    7

    high 8.8

    Exploit known

    Samsung MagicINFO 9 ServerMagicINFO Server

    CVE-2024-7399 is a path traversal vulnerability affecting Samsung MagicINFO 9 Server versions 21.1050 and earlier. This flaw stems from improper input verification, allowing unauthenticated attackers to upload arbitrary files, such as JavaServer Pages (JSP) files, to the server. By exploiting this, threat actors can execute arbitrary code with system authority on vulnerable servers. Although Samsung released a patch for this vulnerability in August 2024, active exploitation in the wild was observed starting in April 2025, shortly after a proof-of-concept (PoC) exploit was made public. Attackers have been leveraging CVE-2024-7399 to infect compromised MagicINFO servers with Mirai botnet malware.

  3. CVE-2024-57728 Published Jan 15, 2025

    Hype score

    1

    high 7.2

    Exploit known

    CVE-2024-57728 is a path traversal vulnerability affecting SimpleHelp remote support software versions 5.5.7 and earlier. This flaw enables authenticated administrative users to upload arbitrary files to any location on the file system by exploiting a "zip slip" technique with a specially crafted zip file. Successful exploitation of this vulnerability can lead to the execution of arbitrary code on the host system, operating within the security context of the SimpleHelp server user. This CVE has been observed as part of a chain of vulnerabilities that could be exploited by attackers.

See more

Insights

See more

Our Security Team's most recent CVE analysis

  1. CVE-2026-1340

    critical 9.8

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated Jan 30, 2026

    This and the similar vulnerability CVE-2026-1281 allow an unauthenticated attacker to execute code remotely on unpatched Ivanti EPMM instances.

    A patch is available from Ivanti here and should be installed immediately. There is a page for defenders who need to check if their instance has been compromised here, though this is a work in progress.

    Note that this is a temporary patch which will be removed with further version updates. If you update the version of your EPMM instance after patching, you must apply the patch again. A fully patched version of EPMM will be available in future which will permanently fix the vulnerability.

    This vulnerability was known to be used in the wild before being disclosed by the vendor. Proof of concept code is now available publicly, so increased attack activity is expected.

    A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

  2. CVE-2026-1281

    critical 9.8

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated Jan 30, 2026

    This and the similar vulnerability CVE-2026-1340 allow an unauthenticated attacker to execute code remotely on unpatched Ivanti EPMM instances.

    A patch is available from Ivanti here and should be installed immediately. There is a page for defenders who need to check if their instance has been compromised here, though this is a work in progress.

    Note that this is a temporary patch which will be removed with further version updates. If you update the version of your EPMM instance after patching, you must apply the patch again. A fully patched version of EPMM will be available in future which will permanently fix the vulnerability.

    This vulnerability was known to be used in the wild before being disclosed by the vendor. Proof of concept code is now available publicly, so increased attack activity is expected.

    A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

  3. CVE-2025-14847

    high 8.7

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated Dec 29, 2025

    This is a serious vulnerability which allows an unauthenticated remote attacker to retrieve information from MongoDB's memory. A proof-of-concept is available to the public.

    Similar to other heap disclosure vulnerabilities such as Heartbleed, the impact of exploitation will vary depending on the information an attacker is able to obtain from the heap. However, it is quite likely that the leaked memory will contain credentials or other sensitive information, especially as attackers learn more about the vulnerability and use it more effectively.

    Regardless of patch status, MongoDB should not be exposed to the internet and access should be restricted by a firewall or similar controls. You should also apply the patch as soon as possible, to avoid the vulnerability being exploited internally.

    Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0.