Vulnerability intelligence

Updated 12 minutes ago

Feeds

Trending now

CVEs trending on social media within the last 24 hours

Hypemeter

110100

Current score

Pretty quiet out there

  1. 1

    CVE-2026-20127 Published Feb 25, 2026

    Hype score

    11

    critical 10.0

    Exploit known

    Zero-dayFirmwareAPIBgp

    CVE-2026-20127 is an authentication bypass vulnerability affecting Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart) and Cisco Catalyst SD-WAN Manager (formerly SD-WAN vManage). This flaw resides within the peering authentication mechanism, which is responsible for establishing trust relationships between SD-WAN components. An unauthenticated, remote attacker can exploit this vulnerability by sending specially crafted requests to an affected system, thereby bypassing the authentication process. Successful exploitation allows the attacker to gain administrative privileges on the affected system, enabling them to log in as a high-privileged, non-root user. From there, the attacker can access NETCONF, which permits the manipulation of network configurations for the entire SD-WAN fabric. This vulnerability has been actively exploited in the wild by sophisticated threat actors, with evidence of malicious activity dating back to 2023.

  2. 2

    CVE-2024-23222 Published Jan 23, 2024

    Hype score

    11

    high 8.8

    Exploit known

    CVE-2024-23222 is a type confusion vulnerability found within WebKit, the browser engine that powers Apple's Safari and all web browsers on iOS and iPadOS. This flaw allows for arbitrary code execution if a user processes maliciously crafted web content. Apple has acknowledged reports indicating that this issue may have been actively exploited. The vulnerability was addressed by Apple with improved checks and was fixed in various operating system updates, including iOS 17.3, iPadOS 17.3, macOS Sonoma 14.3, and tvOS 17.3. It has also been noted as part of the "Coruna" exploit kit, which targeted iOS devices.

  3. 3

    CVE-2023-41993 Published Sep 21, 2023

    Hype score

    10

    high 8.8

    Exploit known

    CVE-2023-41993 is a vulnerability found within WebKit, the browser engine powering Safari and other web-browsing functions across Apple's ecosystem. This flaw allows for arbitrary code execution when processing maliciously crafted web content. An attacker could exploit this by tricking a user into visiting a specially designed malicious webpage. Apple disclosed this vulnerability on September 21, 2023, and confirmed that it was actively exploited in the wild against versions of iOS prior to 16.7. The issue was addressed with improved checks and fixed in updates for iOS, iPadOS, macOS, and Safari.

See more

Known exploited

Sourced from CISA's Known Exploited Vulnerability (KEV) catalog.

  1. CVE-2025-68613 Published Dec 19, 2025

    Hype score

    5

    critical 9.9

    Exploit known

    n8n

    CVE-2025-68613 is a Remote Code Execution (RCE) vulnerability found in n8n, an open-source workflow automation platform. The vulnerability exists in versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0. It stems from the workflow expression evaluation system, where expressions supplied by authenticated users during workflow configuration might be evaluated in an execution context lacking sufficient isolation from the underlying runtime. An authenticated attacker could exploit this vulnerability to execute arbitrary code with the privileges of the n8n process. Successful exploitation could lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. The issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0.

  2. CVE-2026-1603 Published Feb 10, 2026

    high 8.6

    Exploit known

    web applicationZero-dayServerIvanti Endpoint Manager

    CVE-2026-1603 is an authentication bypass vulnerability found in Ivanti Endpoint Manager (EPM) that allows a remote, unauthenticated attacker to extract specific stored credential data. This flaw arises from improper authentication mechanisms within the software, specifically through an alternate path or channel that fails to adequately enforce authentication requirements. Attackers can exploit this vulnerability to bypass standard authentication controls and gain unauthorized access to sensitive credential information stored within the Ivanti Endpoint Manager system. The vulnerability affects Ivanti Endpoint Manager versions prior to 2024 SU5.

  3. CVE-2021-22054 Published Dec 17, 2021

    high 7.5

    Exploit known

    web applicationVMware Workspace ONE UEM consoleVMware Workspace ONEUEM

    CVE-2021-22054 is a Server-Side Request Forgery (SSRF) vulnerability found in various versions of the VMware Workspace ONE UEM console. This flaw allows a malicious actor with network access to the UEM console to send unauthenticated requests. Exploitation of this vulnerability could enable an attacker to gain access to sensitive information. Affected versions include VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37.

See more

Insights

See more

Our Security Team's most recent CVE analysis

  1. CVE-2026-1340

    critical 9.8

    Link to CVE page

    Intruder Insights

    Updated Jan 30, 2026

    This and the similar vulnerability CVE-2026-1281 allow an unauthenticated attacker to execute code remotely on unpatched Ivanti EPMM instances.

    A patch is available from Ivanti here and should be installed immediately. There is a page for defenders who need to check if their instance has been compromised here, though this is a work in progress.

    Note that this is a temporary patch which will be removed with further version updates. If you update the version of your EPMM instance after patching, you must apply the patch again. A fully patched version of EPMM will be available in future which will permanently fix the vulnerability.

    This vulnerability was known to be used in the wild before being disclosed by the vendor. Proof of concept code is now available publicly, so increased attack activity is expected.

    A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

  2. CVE-2026-1281

    critical 9.8

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated Jan 30, 2026

    This and the similar vulnerability CVE-2026-1340 allow an unauthenticated attacker to execute code remotely on unpatched Ivanti EPMM instances.

    A patch is available from Ivanti here and should be installed immediately. There is a page for defenders who need to check if their instance has been compromised here, though this is a work in progress.

    Note that this is a temporary patch which will be removed with further version updates. If you update the version of your EPMM instance after patching, you must apply the patch again. A fully patched version of EPMM will be available in future which will permanently fix the vulnerability.

    This vulnerability was known to be used in the wild before being disclosed by the vendor. Proof of concept code is now available publicly, so increased attack activity is expected.

    A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

  3. CVE-2025-14847

    high 8.7

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated Dec 29, 2025

    This is a serious vulnerability which allows an unauthenticated remote attacker to retrieve information from MongoDB's memory. A proof-of-concept is available to the public.

    Similar to other heap disclosure vulnerabilities such as Heartbleed, the impact of exploitation will vary depending on the information an attacker is able to obtain from the heap. However, it is quite likely that the leaked memory will contain credentials or other sensitive information, especially as attackers learn more about the vulnerability and use it more effectively.

    Regardless of patch status, MongoDB should not be exposed to the internet and access should be restricted by a firewall or similar controls. You should also apply the patch as soon as possible, to avoid the vulnerability being exploited internally.

    Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0.