Trending now
Top 10 CVEs trending on social media within the last 24 hours.
Updated an hour ago
FeedsHypemeter
Current score
Pretty quiet out there
Trending
Hype score
Published
Description
Last 24 hours
- show more detail1CVE-2024-3721
medium 6.3
21
Apr 13, 2024
CVE-2024-3721 is a command injection vulnerability affecting TBK DVR-4104 and DVR-4216 devices up to version 20240412. The vulnerability exists in the processing of the `/device.rsp` file, where manipulation of the `mdb/mdc` argument allows for remote attackers to execute arbitrary operating system commands. The vulnerability is triggered by constructing an OS command using externally influenced input without proper neutralization of special elements. An attacker can exploit this vulnerability remotely, meaning they don't need physical access to the device.
IoTTBK DVR - show more detail2CVE-2025-47985
high 7.8
6
Jul 8, 2025
CVE-2025-47985 is a vulnerability identified as an untrusted pointer dereference within Windows Event Tracing. This flaw allows an authorized attacker to elevate their privileges locally on an affected system. The vulnerability is rooted in CWE-822 and can be exploited by crafting malicious local procedure call (LPC) messages containing unvalidated pointers. When processed, these pointers enable arbitrary read/write operations in kernel memory space, facilitating privilege escalation from a standard user context to SYSTEM-level authority.
- show more detail3CVE-2025-0520
critical 9.4
5
Apr 29, 2025
CVE-2025-0520 describes an unrestricted file upload vulnerability found in ShowDoc, an open-source documentation tool. This flaw stems from inadequate validation of file extensions during the upload process. The vulnerability, categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type), allows an attacker to upload and execute arbitrary PHP files on the server. This can lead to remote code execution (RCE) on the affected system. ShowDoc versions prior to 2.8.7 are impacted by this issue.
ShowDoc - show more detail4CVE-2023-33538
high 8.8
Exploit known
4
Jun 7, 2023
CVE-2023-33538 is a command injection vulnerability found in TP-Link routers, specifically the TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 models. The vulnerability exists within the `/userRpm/WlanNetworkRpm` component. This vulnerability allows an attacker to inject arbitrary commands into the system by manipulating an unknown input. Successful exploitation could lead to a compromise of confidentiality, integrity, and availability of the affected device. CISA has added this vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, indicating active exploitation in the wild.
TP-Link - show more detail5CVE-2017-17215
high 8.8
3
Mar 20, 2018
CVE-2017-17215 is a remote code execution vulnerability affecting specific customized versions of Huawei HG532 home routers. An authenticated attacker can exploit this flaw by sending specially crafted malicious packets to port 37215. This vulnerability stems from the exposure of the TR-064 technical report standard, typically used for local network configuration, to the Wide Area Network (WAN) through port 37215. Attackers can inject shell meta-characters into the `NewStatusURL` and `NewDownloadURL` parameters during a firmware upgrade action, leading to the execution of arbitrary code on the device. This vulnerability has been actively exploited in the wild, notably to spread variants of the Mirai botnet, such as OKIRU/SATORI. Researchers observed numerous attack attempts targeting Huawei HG532 devices across various countries, including the USA, Italy, Germany, and Egypt. The successful exploitation allows attackers to gain control of the router and incorporate it into a botnet, which can then be used to launch Distributed Denial of Service (DDoS) attacks.
- show more detail6
1
Dec 3, 2025
CVE-2025-55182 is a critical unauthenticated remote code execution (RCE) vulnerability found in React Server Components (RSC) versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0. This vulnerability affects packages including `react-server-dom-parcel`, `react-server-dom-turbopack`, and `react-server-dom-webpack`. The flaw stems from insecure deserialization in the RSC payload handling logic, allowing attacker-controlled data to influence server-side execution. Exploitation requires only a crafted HTTP request. Patches are available for React and Next.js. It is recommended to upgrade to patched React versions such as 19.0.1, 19.1.2, or 19.2.1, and to update frameworks like Next.js to their corresponding patched versions.
OTnpm - show more detail7CVE-2025-66570
critical 10.0
1
Dec 5, 2025
CVE-2025-66570 describes an authentication bypass vulnerability found in `cpp-httplib`, a C++11 single-file header-only HTTP/HTTPS library, affecting versions prior to 0.27.0. The flaw stems from the library's improper handling of specific attacker-controlled HTTP headers, including `REMOTE_ADDR`, `REMOTE_PORT`, `LOCAL_ADDR`, and `LOCAL_PORT`. These headers are parsed into a multimap, and due to the `Request::get_header_value` function returning the first entry for a given header key, client-supplied values can override legitimate server-generated metadata. This "header shadowing" technique allows attackers to inject malicious HTTP headers that can influence server-visible metadata, logging, and authorization decisions. Consequently, this can lead to outcomes such as IP spoofing, log poisoning, and the bypassing of authorization controls.
- show more detail8CVE-2025-61260
critical 9.8
1
Apr 14, 2026
CVE-2025-61260 is a command injection vulnerability affecting OpenAI Codex CLI versions 0.23.0 and earlier. This flaw allows for arbitrary code execution on a developer's machine. The vulnerability stems from the Codex CLI's automatic loading and processing of project-local `.env` and `.codex/config.toml` files without requiring user confirmation. An attacker can exploit this by embedding malicious commands within Model Context Protocol (MCP) configuration files. When a user executes the `codex` command within a repository containing these specially crafted files, the embedded commands are automatically run, enabling the attacker to execute arbitrary code on the developer's workstation. This mechanism presents a supply chain security risk, potentially leading to unauthorized actions such as credential theft or the installation of backdoors.
- show more detail9CVE-2025-60710
high 7.8
Exploit known
1
Nov 11, 2025
CVE-2025-60710 is an elevation-of-privilege vulnerability affecting the Host Process for Windows Tasks. The vulnerability stems from improper link resolution before file access, also known as a "link following" issue. An authorized attacker with local access could exploit this vulnerability to gain elevated privileges. Specifically, a low-privileged user could manipulate file system reparse points (like symbolic links) to cause the Host Process for Windows Tasks to operate on attacker-controlled file system targets, potentially achieving SYSTEM-level effects. A patch has been released by Microsoft for Windows 11 versions 2H2 and 25H2.
Windows TasksServer - show more detail10CVE-2025-15621
medium 5.7
1
Apr 16, 2026
CVE-2025-15621 describes a vulnerability found in Sparx Systems Sparx Enterprise Architect, specifically concerning "Insufficiently Protected Credentials". The core issue lies in the client's failure to verify the intended receiver of OAuth2 credentials during the OpenID authentication process. This flaw means that the client does not confirm that the OAuth2 credentials are being sent to the legitimate recipient, potentially allowing them to be directed to an unauthorized entity. This could result in unauthorized access to user accounts and systems that rely on these compromised credentials.