<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:intruder="https://cvemon.intruder.io/rss">
    <channel>
        <title><![CDATA[cvemon | CVE Trends]]></title>
        <description><![CDATA[Get the latest rankings and info for CVEs currently trending on social media]]></description>
        <link>https://cvemon.intruder.io</link>
        <image>
            <url>https://cvemon.intruder.io/og.png</url>
            <title>cvemon | CVE Trends</title>
            <link>https://cvemon.intruder.io</link>
        </image>
        <generator>RSS for Node</generator>
        <lastBuildDate>Tue, 21 Apr 2026 16:00:10 GMT</lastBuildDate>
        <atom:link href="https://cvemon.intruder.io/rss/cvetrends/latest" rel="self" type="application/rss+xml"/>
        <pubDate>Tue, 21 Apr 2026 15:17:02 GMT</pubDate>
        <item>
            <title><![CDATA[CVE-2025-47985]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 10 - Untrusted pointer dereference in Windows Event Tracing allows an authorized attacker to elevate privileges locally.]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2025-47985</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2025-47985</guid>
            <pubDate>Tue, 21 Apr 2026 15:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>1</intruder:rank>
            <intruder:hypeScore>10</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2025-47985</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2025-57738]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 10 - Apache Syncope offers the ability to extend / customize the base behavior on every deployment by allowing to provide custom implementations of a few Java interfaces; such implementations can be provided either as Java or Groovy classes, with the latter being particularly ...]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2025-57738</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2025-57738</guid>
            <pubDate>Tue, 21 Apr 2026 15:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>2</intruder:rank>
            <intruder:hypeScore>10</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2025-57738</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2024-3721]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 6 - A vulnerability was found in TBK DVR-4104 and DVR-4216 up to 20240412 and classified as critical. This issue affects some unknown processing of the file /device.rsp?opt=sys&cmd=___S_O_S_T_R_E_A_MAX___. The manipulation of the argument mdb/mdc leads to os command injection. The ...]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2024-3721</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2024-3721</guid>
            <pubDate>Tue, 21 Apr 2026 15:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>3</intruder:rank>
            <intruder:hypeScore>6</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2024-3721</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2025-48757]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 3 - An insufficient database Row-Level Security policy in Lovable through 2025-04-15 allows remote unauthenticated attackers to read or write to arbitrary database tables of generated sites. NOTE: this is disputed by the Supplier because each individual customer of the Lovable ...]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2025-48757</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2025-48757</guid>
            <pubDate>Tue, 21 Apr 2026 15:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>4</intruder:rank>
            <intruder:hypeScore>3</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2025-48757</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2023-33538]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 3 - TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm .]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2023-33538</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2023-33538</guid>
            <pubDate>Tue, 21 Apr 2026 15:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>5</intruder:rank>
            <intruder:hypeScore>3</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2023-33538</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2025-0520]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 2 - An unrestricted file upload vulnerability in ShowDoc caused by improper validation of file extension allows execution of arbitrary PHP, leading to remote code execution.This issue affects ShowDoc: before 2.8.7.]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2025-0520</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2025-0520</guid>
            <pubDate>Tue, 21 Apr 2026 15:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>6</intruder:rank>
            <intruder:hypeScore>2</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2025-0520</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2025-27363]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 2 - An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned ...]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2025-27363</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2025-27363</guid>
            <pubDate>Tue, 21 Apr 2026 15:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>7</intruder:rank>
            <intruder:hypeScore>2</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2025-27363</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2024-27199]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 2 - In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions  was possible]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2024-27199</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2024-27199</guid>
            <pubDate>Tue, 21 Apr 2026 15:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>8</intruder:rank>
            <intruder:hypeScore>2</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2024-27199</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2025-2749]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 2 - An authenticated remote code execution in Kentico Xperience allows authenticated users Staging Sync Server to upload arbitrary data to path relative locations. This results in path traversal and arbitrary file upload, including content that can be executed server side leading to ...]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2025-2749</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2025-2749</guid>
            <pubDate>Tue, 21 Apr 2026 15:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>9</intruder:rank>
            <intruder:hypeScore>2</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2025-2749</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2025-15611]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 2 - The Popup Box  WordPress plugin before 5.5.0 does not properly validate nonces in the add_or_edit_popupbox() function before saving popup data, allowing unauthenticated attackers to perform Cross-Site Request Forgery attacks. When an authenticated admin visits a malicious page, ...]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2025-15611</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2025-15611</guid>
            <pubDate>Tue, 21 Apr 2026 15:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>10</intruder:rank>
            <intruder:hypeScore>2</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2025-15611</intruder:cveUrl>
        </item>
    </channel>
</rss>