Trending now
Top 10 CVEs trending on social media within the last 24 hours.
Updated an hour ago
FeedsHypemeter
Current score
Getting lively
Trending
Hype score
Published
Description
Last 24 hours
- show more detail1CVE-2025-60703
high 7.8
60
Nov 11, 2025
CVE-2025-60703 is a vulnerability in Windows Remote Desktop Services (RDS). It involves an untrusted pointer dereference, which could allow an authorized attacker to elevate their privileges locally on a system. Successful exploitation of CVE-2025-60703 could allow an attacker with local code execution to escalate their privileges to SYSTEM, potentially enabling them to pivot laterally within a network or bypass endpoint isolation controls. Microsoft has assigned a confidence metric to this vulnerability, reflecting their certainty regarding its existence and the credibility of the technical details.
Windows RDS - show more detail2CVE-2025-33053
high 8.8
Exploit known
48
Jun 10, 2025
CVE-2025-33053 is a remote code execution vulnerability affecting the WebDAV client in Microsoft Windows. It stems from insufficient input validation in WebDAV file path handling, allowing an attacker to execute arbitrary code over a network. Successful exploitation requires a user to click on a specially crafted WebDAV URL, potentially leading to unauthorized access to sensitive system resources, compromise of system integrity and confidentiality, or even full control of the affected system. This vulnerability has been actively exploited in the wild.
Windows WebDAV Client - show more detail3
35
Nov 14, 2025
CVE-2025-64446 is a relative path traversal vulnerability affecting Fortinet FortiWeb versions 8.0.0 through 8.0.1, 7.6.0 through 7.6.4, 7.4.0 through 7.4.9, 7.2.0 through 7.2.11, and 7.0.0 through 7.0.11. It can be exploited by sending crafted HTTP or HTTPS requests. This vulnerability allows remote, unauthenticated attackers to gain administrative access to the web application firewall appliances. Specifically, the vulnerability can be exploited by sending an HTTP POST request to `/api/v2.0/cmdb/system/admin%3f/../../../../../cgi-bin/fwbcgi` with a payload designed to create an administrative account. Successful exploitation allows an attacker with no prior access to gain administrator-level access to the FortiWeb Manager panel and websocket command-line interface.
FortinetFortiWeb - show more detail4CVE-2025-20337
critical 10.0
Exploit known
26
Jul 16, 2025
CVE-2025-20337 is a vulnerability in a specific API of Cisco ISE (Identity Services Engine) and Cisco ISE-PIC (ISE Passive Identity Connector). It could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker doesn't need any valid credentials to exploit this vulnerability. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit it by submitting a crafted API request. Successful exploitation could allow the attacker to obtain root privileges on an affected device. This affects Cisco ISE and ISE-PIC releases 3.3 and 3.4, regardless of device configuration.
Cisco ISECisco ISE-PIC - show more detail5CVE-2025-26686
high 7.5
25
Apr 8, 2025
CVE-2025-26686 is a vulnerability in the Windows TCP/IP component related to sensitive data storage in improperly locked memory. This vulnerability could allow an unauthorized attacker to execute code over a network. The vulnerability exists because of how Windows TCP/IP handles memory locking. Exploitation involves an attacker waiting for a user to initiate a connection and send a DHCPv6 request, then replying with a DHCPv6 response containing a fake IPv6 address. Successful exploitation requires the attacker to win a race condition and make several preparations in the target environment beforehand. A security update was released by Microsoft in April 2025 to address this vulnerability.
Windows TCP/IP - show more detail6
24
Oct 5, 2025
CVE-2025-61882 is a vulnerability in the Oracle E-Business Suite, specifically within the Oracle Concurrent Processing component. It can be exploited remotely without authentication, meaning an attacker doesn't need a username or password to exploit it. The vulnerability affects versions 12.2.3 through 12.2.14 of the Oracle E-Business Suite. Successful exploitation of CVE-2025-61882 can lead to remote code execution. Oracle recommends applying the updates provided in the security alert as soon as possible and emphasizes the importance of maintaining actively supported versions and installing all critical security patches promptly. Applying the October 2023 Critical Patch Update is a prerequisite for implementing the fixes.
Oracle Concurrent Processing - show more detail7CVE-2025-64500
high 7.3
9
Nov 12, 2025
CVE-2025-64500 refers to an issue in Symfony's Request class related to the parsing of PATH_INFO. The class improperly interprets certain PATH_INFO, leading to URLs being represented with a path that doesn't start with a forward slash ("/"). This can allow attackers to bypass access control rules that rely on this "/"-prefix assumption. The vulnerability is addressed by ensuring that URL paths always begin with a "/". A patch is available for the 5.4 branch of Symfony. Drupal also included the fix as a hardening measure in their 11.2.8 release, although Drupal itself does not directly expose the vulnerability.
Symfony - show more detail8CVE-2025-62215
high 7.0
Exploit known
5
Nov 11, 2025
CVE-2025-62215 is an elevation-of-privilege vulnerability affecting the Windows Kernel. It stems from a race condition due to improper synchronization when multiple processes concurrently access shared resources. An attacker with local access and some level of system access can exploit this flaw to execute code with elevated privileges, potentially gaining SYSTEM-level access. The vulnerability is triggered by exploiting a race condition in the Windows Kernel's memory management subsystem. By carefully timing multiple threads or processes, an attacker can manipulate shared kernel resources to cause a double-free condition, potentially leading to memory corruption. This allows the attacker to execute arbitrary code in the kernel's context.
Windows Kernel - show more detail9CVE-2025-10230
critical 10.0
3
Nov 7, 2025
CVE-2025-10230 is a command injection vulnerability found in Samba's WINS server hook script. The vulnerability exists when Samba is running as an Active Directory Domain Controller with WINS support enabled and the 'wins hook' parameter is configured in the smb.conf file. This flaw allows unauthenticated attackers to execute arbitrary commands on affected domain controllers. The vulnerability occurs because the WINS server does not properly validate NetBIOS names passed to the wins hook program, passing them directly into a string run by a shell. By sending a specially crafted NetBIOS name containing shell metacharacters, a malicious client can inject commands that will be executed on the server with system-level privileges.
Samba WINS - show more detail10CVE-2025-9242
critical 9.3
Exploit known
2
Sep 17, 2025
CVE-2025-9242 is an out-of-bounds write vulnerability found in WatchGuard Fireware OS. The vulnerability resides in the *iked* process. This flaw makes it possible for an unauthenticated, remote attacker to execute arbitrary code on affected systems. The vulnerability impacts both Mobile User VPN with IKEv2 and Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.
WatchGuard Fireware OS