cPanel is a very popular hosting framework which is often very difficult to avoid exposing to the internet. The exploit for this weakness gives the attacker root access to cPanel (and from there easy RCE on the system), and the exploit is reliable, well documented, and affects all versions of cPanel except the latest patch. There are well over a million hosts exposed, and though cPanel does have some automated self-upgrade functionality, it can be turned off, and the window before an upgrade (usually up to 24h) is long enough for attacker to have already exploited this weakness. cPanel have provided a script you can use to detect if compromise has already occurred, which can be found here.
Vulnerability intelligence
Updated 16 minutes ago
FeedsTrending now
CVEs trending on social media within the last 24 hours
Hypemeter
Current score
Cold bath
1
CVE-2024-32002 Published May 14, 2024Hype score
12
critical 9.0
GitCVE-2024-32002 is a vulnerability that affects Git, a widely used revision control system. It exists in versions prior to 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. The vulnerability involves how Git handles submodules, which can be exploited to write files into the `.git/` directory instead of the intended submodule's worktree. This flaw allows an attacker to craft repositories that, when cloned, can execute a malicious hook during the cloning operation. This occurs because the attacker can write a hook script into the `.git/` directory that will run while the clone operation is still in progress, preventing the user from inspecting the code being executed.
2
CVE-2026-45829 Published May 18, 2026Hype score
11
critical 10.0
CVE-2026-45829 describes a pre-authentication code injection vulnerability found in version 1.0.0 and later of the ChromaDB Python project. This flaw allows an unauthenticated attacker to execute arbitrary code on the server. The vulnerability is exploited by sending a specially crafted malicious model repository with the `trust_remote_code` parameter set to true to the `/api/v2/tenants/{tenant}/databases/{db}/collections` endpoint. This can lead to the server loading and running the attacker's arbitrary code.
3
CVE-2026-31694 Published May 1, 2026Hype score
11
high 7.8
CVE-2026-31694 is identified as a buffer overflow vulnerability within the Linux Kernel's Filesystem in Userspace (FUSE) subsystem. The flaw specifically resides in the `fuse_add_dirent_to_cache()` function. This function is responsible for constructing and copying serialized directory entries into a page-cache page. The vulnerability occurs because `fuse_add_dirent_to_cache()` does not adequately validate that a serialized directory entry will fit entirely within a single page-cache page before performing the copy operation. A malicious FUSE server can exploit this by providing an oversized directory entry, such as one with `namelen=4095`, which results in a 4120-byte record. On systems utilizing 4 KiB pages, this oversized record can cause a 24-byte overflow into the adjacent kernel page. This issue impacts various Linux kernel versions, including 7.1-rc1 and 7.1-rc2.
Known exploited
Sourced from CISA's Known Exploited Vulnerability (KEV) catalog.
- CVE-2010-0249 Published Jan 15, 2010
high 8.8
Exploit known
Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 on Windows 2000 SP4; Windows XP SP2 and SP3; Windows Server 2003 SP2; Windows Vista Gold, SP1, and SP2; Windows Server 2008 Gold, SP2, and R2; and Windows 7 allows remote attackers to execute arbitrary code by accessing a pointer associated with a deleted object, related to incorrectly initialized memory and improper handling of objects in memory, as exploited in the wild in December 2009 and January 2010 during Operation Aurora, aka "HTML Object Memory Corruption Vulnerability."
- CVE-2026-45498 Published May 20, 2026
medium 4.0
Exploit known
Microsoft Defender Denial of Service Vulnerability
- CVE-2026-41091 Published May 20, 2026
high 7.8
Exploit known
Improper link resolution before file access ('link following') in Microsoft Defender allows an authorized attacker to elevate privileges locally.
Insights
See moreOur Security Team's most recent CVE analysis
- Link to CVE page
CVE-2026-41940
critical 9.3
Exploit known
Intruder Insights
Updated Apr 30, 2026
- Link to CVE page
CVE-2026-1340
critical 9.8
Exploit known
Intruder Insights
Updated Jan 30, 2026
This and the similar vulnerability CVE-2026-1281 allow an unauthenticated attacker to execute code remotely on unpatched Ivanti EPMM instances.
A patch is available from Ivanti here and should be installed immediately. There is a page for defenders who need to check if their instance has been compromised here, though this is a work in progress.
Note that this is a temporary patch which will be removed with further version updates. If you update the version of your EPMM instance after patching, you must apply the patch again. A fully patched version of EPMM will be available in future which will permanently fix the vulnerability.
This vulnerability was known to be used in the wild before being disclosed by the vendor. Proof of concept code is now available publicly, so increased attack activity is expected.
- Link to CVE page
CVE-2026-1281
critical 9.8
Exploit known
Intruder Insights
Updated Jan 30, 2026
This and the similar vulnerability CVE-2026-1340 allow an unauthenticated attacker to execute code remotely on unpatched Ivanti EPMM instances.
A patch is available from Ivanti here and should be installed immediately. There is a page for defenders who need to check if their instance has been compromised here, though this is a work in progress.
Note that this is a temporary patch which will be removed with further version updates. If you update the version of your EPMM instance after patching, you must apply the patch again. A fully patched version of EPMM will be available in future which will permanently fix the vulnerability.
This vulnerability was known to be used in the wild before being disclosed by the vendor. Proof of concept code is now available publicly, so increased attack activity is expected.