Vulnerability intelligence

Updated an hour ago

Feeds

Trending now

CVEs trending on social media within the last 24 hours

Hypemeter

150100

Current score

Pretty quiet out there

  1. 1

    CVE-2024-30088 Published Jun 11, 2024

    Hype score

    15

    high 7.0

    Exploit known

    CVE-2024-30088 is an elevation of privilege vulnerability in the Windows Kernel. It is a Time-Of-Check Time-Of-Use (TOCTOU) race condition, meaning that the state of a resource can change between when it is checked and when it is used, which can lead to unexpected actions. An attacker can exploit this vulnerability to run code with elevated privileges on a vulnerable system. This vulnerability has been actively exploited in the wild, including by the OilRig APT group, which is known for cyber espionage. Successful exploitation could allow an attacker to gain complete control over the affected system. It is listed in the CISA Known Exploited Vulnerabilities (KEV) catalog, which requires timely patching.

  2. 2

    CVE-2025-42957 Published Aug 12, 2025

    Hype score

    8

    critical 9.9

    CVE-2025-42957 is a code injection vulnerability affecting SAP S/4HANA, specifically its function module exposed via RFC. It allows an attacker with user privileges to inject arbitrary ABAP code into the system, bypassing authorization checks. This vulnerability can be exploited by an authenticated attacker with valid SAP credentials and S_RFC authorizations by invoking a vulnerable function module and supplying crafted input that is directly used in dynamic ABAP code execution constructs. Successful exploitation of CVE-2025-42957 can lead to a complete system compromise, undermining the confidentiality, integrity, and availability of the system. This includes the potential to modify the SAP database, create superuser accounts, download password hashes, and alter business processes. SecurityBridge has verified that the exploit is being used in the wild.

  3. 3

    CVE-2025-52856 Published Aug 29, 2025

    Hype score

    8

    critical 9.3

    CVE-2025-52856 is an improper authentication vulnerability affecting VioStor. A remote attacker can exploit this vulnerability to compromise the security of the system. Successful exploitation allows an attacker to gain unauthorized access to an application, service, or device. No privileges or user interaction are required for exploitation. The vulnerability has been fixed in VioStor version 5.1.6 build 20250621 and later.

See more

Known exploited

Sourced from CISA's Known Exploited Vulnerability (KEV) catalog.

  1. CVE-2025-53690 Published Sep 3, 2025

    Hype score

    2

    critical 9.0

    Exploit known

    SitecoreSitecore XMSitecore XP

    CVE-2025-53690 is a ViewState deserialization vulnerability affecting Sitecore Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud. The vulnerability stems from the reuse of a sample ASP.NET machine key that was included in official Sitecore deployment guides prior to 2017 and, in some instances, mistakenly implemented in production environments. Attackers who possess this key can create malicious __VIEWSTATE payloads, bypassing validation and enabling code execution on the targeted server. This turns a misconfiguration into a Remote Code Execution (RCE) vector. The initial compromise can grant attackers access under the NETWORK SERVICE account. The WEEPSTEEL malware may be deployed to gather system, network, and user information.

  2. CVE-2025-48543 Published Sep 4, 2025

    high 8.8

    Exploit known

    Android Runtime

    CVE-2025-48543 is a vulnerability affecting the Android Runtime (ART), which is responsible for running applications on Android devices. This vulnerability could allow a local attacker to gain elevated privileges without requiring user interaction. Exploitation attempts of CVE-2025-48543 have been observed. The vulnerability stems from a use-after-free issue that could allow an attacker to escape the Chrome sandbox and attack the Android system server. Google has released security updates for Android-powered devices, including fixes for CVE-2025-48543.

  3. CVE-2025-38352 Published Jul 22, 2025

    high 7.4

    Exploit known

    Linux Kernel

    CVE-2025-38352 is a vulnerability that exists in the Linux kernel, specifically within the handling of POSIX CPU timers. The vulnerability stems from a race condition between `handle_posix_cpu_timers()` and `posix_cpu_timer_del()`. This race condition can occur when a non-autoreaping task that is exiting has already passed `exit_notify()` and calls `handle_posix_cpu_timers()` from an interrupt request (IRQ). If a concurrent `posix_cpu_timer_del()` runs at the same time, it might not detect that `timer->it.cpu.firing != 0`, which can cause `cpu_timer_task_rcu()` and/or `lock_task_sighand()` to fail. This vulnerability can be exploited to gain elevated privileges on Android devices.

See more

Insights

See more

Our Security Team's most recent CVE analysis

  1. CVE-2025-7775

    critical 9.2

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated Aug 28, 2025

    As this vulnerability is known to have been exploited by real attackers, the patch should be applied immediately.

    If you have a vulnerable device connected to the internet, as well as patching, it is important to check that the device was not already compromised.

    NCSC-NL, the Dutch National Cybersecurity Centre, have produced a tool available here which can help with this. Note that despite being marked as for an older CVE, this script is also receiving updates to check for issues relating to CVE-2025-7775.

    Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with IPv6 services or servicegroups bound with IPv6 servers (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with DBS IPv6 services or servicegroups bound with IPv6 DBS servers (OR) CR virtual server with type HDX

  2. CVE-2025-43300

    high 8.8

    Exploit known

    Link to CVE page

    Intruder Insights

    Updated Aug 26, 2025

    Researchers have been analysing the patch and have been able to trigger the crash within the iOS JPEG lossless decompression within RawCamera.bundle. Some git repositories with the results of their analysis have been made public here and here.

    According to Apple, this issue has been "exploited in an extremely sophisticated attack against specific targeted individuals". A vulnerability of this nature takes significant resources to develop. As such, this is extremely valuable to threat actors where some vulnerability brokers would pay up to $15 million for a working proof-of-concept for this type of attack. Therefore we can assume widespread exploitation has not happened, but with the progress researchers have been making it will only be a matter of time before that happens. Patches should be applied immediately.

    An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Sonoma 14.7.8, macOS Ventura 13.7.8, iPadOS 17.7.10, macOS Sequoia 15.6.1, iOS 18.6.2 and iPadOS 18.6.2. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.

  3. CVE-2025-54418

    critical 9.8

    Link to CVE page

    Intruder Insights

    Updated Jul 31, 2025

    For this vulnerability to be exploitable, the ImageMagick image processing library needs to be used to resize or add a text watermark to a user-uploaded file which was saved using a user-provided filename, or where the parameters for adding a watermark are user-controlled. File upload implementations that use a randomly generated filename before image resizing are not vulnerable.

    This vulnerability is simple to exploit and we expect to see active exploitation soon. However, attackers will need to locate file upload functionality within your applications first which will be difficult to fully automate at scale, so mass exploitation is unlikely.

    CodeIgniter is a PHP full-stack web framework. A command injection vulnerability present in versions prior to 4.6.2 affects applications that use the ImageMagick handler for image processing (`imagick` as the image library) and either allow file uploads with user-controlled filenames and process uploaded images using the `resize()` method or use the `text()` method with user-controlled text content or options. An attacker can upload a file with a malicious filename containing shell metacharacters that get executed when the image is processed or provide malicious text content or options that get executed when adding text to images Users should upgrade to v4.6.2 or later to receive a patch. As a workaround, switch to the GD image handler (`gd`, the default handler), which is not affected by either vulnerability. For file upload scenarios, instead of using user-provided filenames, generate random names to eliminate the attack vector with `getRandomName()` when using the `move()` method, or use the `store()` method, which automatically generates safe filenames. For text operations, if one must use ImageMagick with user-controlled text, sanitize the input to only allow safe characters and validate/restrict text options.