<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:intruder="https://cvemon.intruder.io/rss">
    <channel>
        <title><![CDATA[cvemon | CVE Trends]]></title>
        <description><![CDATA[Get the latest rankings and info for CVEs currently trending on social media]]></description>
        <link>https://cvemon.intruder.io</link>
        <image>
            <url>https://cvemon.intruder.io/og.png</url>
            <title>cvemon | CVE Trends</title>
            <link>https://cvemon.intruder.io</link>
        </image>
        <generator>RSS for Node</generator>
        <lastBuildDate>Tue, 21 Apr 2026 02:53:42 GMT</lastBuildDate>
        <atom:link href="https://cvemon.intruder.io/rss/cvetrends/latest" rel="self" type="application/rss+xml"/>
        <pubDate>Tue, 21 Apr 2026 02:17:02 GMT</pubDate>
        <item>
            <title><![CDATA[CVE-2025-47985]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 10 - Untrusted pointer dereference in Windows Event Tracing allows an authorized attacker to elevate privileges locally.]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2025-47985</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2025-47985</guid>
            <pubDate>Tue, 21 Apr 2026 02:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>1</intruder:rank>
            <intruder:hypeScore>10</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2025-47985</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2025-57738]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 8 - Apache Syncope offers the ability to extend / customize the base behavior on every deployment by allowing to provide custom implementations of a few Java interfaces; such implementations can be provided either as Java or Groovy classes, with the latter being particularly ...]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2025-57738</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2025-57738</guid>
            <pubDate>Tue, 21 Apr 2026 02:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>2</intruder:rank>
            <intruder:hypeScore>8</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2025-57738</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2024-3721]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 7 - A vulnerability was found in TBK DVR-4104 and DVR-4216 up to 20240412 and classified as critical. This issue affects some unknown processing of the file /device.rsp?opt=sys&cmd=___S_O_S_T_R_E_A_MAX___. The manipulation of the argument mdb/mdc leads to os command injection. The ...]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2024-3721</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2024-3721</guid>
            <pubDate>Tue, 21 Apr 2026 02:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>3</intruder:rank>
            <intruder:hypeScore>7</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2024-3721</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2025-0520]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 2 - An unrestricted file upload vulnerability in ShowDoc caused by improper validation of file extension allows execution of arbitrary PHP, leading to remote code execution.This issue affects ShowDoc: before 2.8.7.]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2025-0520</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2025-0520</guid>
            <pubDate>Tue, 21 Apr 2026 02:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>4</intruder:rank>
            <intruder:hypeScore>2</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2025-0520</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2025-48757]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 2 - An insufficient database Row-Level Security policy in Lovable through 2025-04-15 allows remote unauthenticated attackers to read or write to arbitrary database tables of generated sites. NOTE: this is disputed by the Supplier because each individual customer of the Lovable ...]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2025-48757</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2025-48757</guid>
            <pubDate>Tue, 21 Apr 2026 02:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>5</intruder:rank>
            <intruder:hypeScore>2</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2025-48757</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2023-33538]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 2 - TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm .]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2023-33538</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2023-33538</guid>
            <pubDate>Tue, 21 Apr 2026 02:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>6</intruder:rank>
            <intruder:hypeScore>2</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2023-33538</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2025-27363]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 2 - An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned ...]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2025-27363</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2025-27363</guid>
            <pubDate>Tue, 21 Apr 2026 02:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>7</intruder:rank>
            <intruder:hypeScore>2</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2025-27363</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2025-15611]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 2 - The Popup Box  WordPress plugin before 5.5.0 does not properly validate nonces in the add_or_edit_popupbox() function before saving popup data, allowing unauthenticated attackers to perform Cross-Site Request Forgery attacks. When an authenticated admin visits a malicious page, ...]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2025-15611</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2025-15611</guid>
            <pubDate>Tue, 21 Apr 2026 02:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>8</intruder:rank>
            <intruder:hypeScore>2</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2025-15611</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2025-61260]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 1 - A vulnerability was identified in OpenAI Codex CLI v0.23.0 and before that enables code execution through malicious MCP (Model Context Protocol) configuration files. The attack is triggered when a user runs the codex command inside a malicious or compromised repository. Codex ...]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2025-61260</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2025-61260</guid>
            <pubDate>Tue, 21 Apr 2026 02:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>9</intruder:rank>
            <intruder:hypeScore>1</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2025-61260</intruder:cveUrl>
        </item>
        <item>
            <title><![CDATA[CVE-2017-17215]]></title>
            <description><![CDATA[Currently trending CVE - Hype Score: 1 - Huawei HG532 with some customized versions has a remote code execution vulnerability. An authenticated attacker could send malicious packets to port 37215 to launch attacks. Successful exploit could lead to the remote execution of arbitrary code.]]></description>
            <link>https://cvemon.intruder.io/cves/CVE-2017-17215</link>
            <guid isPermaLink="true">https://cvemon.intruder.io/cves/CVE-2017-17215</guid>
            <pubDate>Tue, 21 Apr 2026 02:17:02 GMT</pubDate>
            <enclosure url="https://cvemon.intruder.io/og.png" length="0" type="image/png"/>
            <intruder:rank>10</intruder:rank>
            <intruder:hypeScore>1</intruder:hypeScore>
            <intruder:cveUrl>https://cvemon.intruder.io/cves/CVE-2017-17215</intruder:cveUrl>
        </item>
    </channel>
</rss>