Trending now
Top 10 CVEs trending on social media within the last 24 hours.
Updated an hour ago
FeedsHypemeter
Current score
Not much to see here
Trending
Hype score
Published
Description
Last 24 hours
- show more detail1CVE-2025-59718
critical 9.8
Exploit known
23
Dec 9, 2025
CVE-2025-59718 is a vulnerability affecting Fortinet's FortiOS, FortiProxy, and FortiSwitchManager. It stems from an improper verification of cryptographic signatures, which could allow an unauthenticated attacker to bypass FortiCloud Single Sign-On (SSO) login authentication. This bypass is possible through a crafted Security Assertion Markup Language (SAML) message, but only if the FortiCloud SSO login feature is enabled on the device. The FortiCloud SSO login feature is not enabled by default in factory settings. However, it becomes enabled when an administrator registers the device with FortiCare via the GUI, unless the administrator specifically disables the "Allow administrative login using FortiCloud SSO" option during registration.
Fortinet FortiOS - show more detail2CVE-2025-34165
high 8.8
15
Aug 30, 2025
CVE-2025-34165 describes a stack-based buffer overflow vulnerability found in NetSupport Manager versions prior to 14.12.0000. This flaw allows a remote and unauthenticated attacker to trigger a denial of service (DoS) condition. Additionally, the vulnerability could potentially lead to the leakage of a limited amount of memory from the affected system.
- show more detail4
14
Dec 3, 2025
CVE-2025-55182 is a critical unauthenticated remote code execution (RCE) vulnerability found in React Server Components (RSC) versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0. This vulnerability affects packages including `react-server-dom-parcel`, `react-server-dom-turbopack`, and `react-server-dom-webpack`. The flaw stems from insecure deserialization in the RSC payload handling logic, allowing attacker-controlled data to influence server-side execution. Exploitation requires only a crafted HTTP request. Patches are available for React and Next.js. It is recommended to upgrade to patched React versions such as 19.0.1, 19.1.2, or 19.2.1, and to update frameworks like Next.js to their corresponding patched versions.
Reactreact2shell - show more detail5CVE-2025-33073
high 8.8
Exploit known
14
Jun 10, 2025
CVE-2025-33073 is an elevation of privilege vulnerability affecting the Windows Server Message Block (SMB) client. It stems from improper access control within Windows SMB, potentially allowing an authorized attacker to elevate privileges over a network. To exploit this vulnerability, an attacker could execute a specially crafted script. This script would coerce the victim machine to connect back to the attacker's system using SMB and authenticate, potentially resulting in the attacker gaining SYSTEM privileges.
Windows SMB Client - show more detail6CVE-2025-54918
high 8.8
14
Sep 9, 2025
CVE-2025-54918 is an improper authentication vulnerability found within the Windows NTLM (NT LAN Manager) protocol. This flaw allows an authorized attacker, who already possesses low-level privileges, to elevate their access over a network. The vulnerability can lead to unauthorized access to sensitive resources, potential execution of arbitrary code with higher privileges, manipulation of system configurations, or disruption of system availability. This vulnerability impacts various versions of Microsoft Windows, including Windows 10, Windows 11, and several Windows Server editions (2008, 2012, 2016, 2019, 2022, and 2025). Specifically, it can affect domain controllers running LDAP or LDAPS services, enabling an attacker to escalate privileges from a standard domain user to SYSTEM level access, potentially compromising entire Active Directory environments. Publicly available proof-of-concept exploits exist for this vulnerability.
- show more detail7CVE-2025-13878
high 7.5
13
Jan 21, 2026
CVE-2025-13878 is a vulnerability affecting BIND 9, a widely used DNS server software. The flaw allows remote attackers to crash DNS servers by sending specially crafted, malformed DNS records. Specifically, the vulnerability stems from improper handling of malformed BRID (Breadth-first Record ID) and HHIT (Host Hash Information Table) records within BIND 9's `named` daemon. When a vulnerable BIND 9 server processes these malicious records, the `named` daemon terminates unexpectedly, leading to a complete service outage. This denial-of-service (DoS) condition impacts both authoritative nameservers and DNS resolvers. The vulnerability affects various BIND 9 versions, including 9.18.40 through 9.18.43, 9.20.13 through 9.20.17, and 9.21.12 through 9.21.16, as well as corresponding BIND SPE (Preview) versions.
- show more detail8CVE-2025-2294
critical 9.8
12
Mar 28, 2025
CVE-2025-2294 is a Local File Inclusion (LFI) vulnerability found in the Kubio AI Page Builder plugin for WordPress, affecting versions up to and including 2.5.1. The vulnerability exists within the `kubio_hybrid_theme_load_template` function. This flaw allows unauthenticated attackers to include and execute arbitrary files on the server. By exploiting this, attackers can execute PHP code, bypass access controls, and potentially obtain sensitive data. In scenarios where attackers can upload files, such as images, they can include and execute them to run malicious PHP code.
WordPressKubio AI - show more detail9CVE-2024-23265
high 7.8
12
Mar 8, 2024
CVE-2024-23265 is a memory corruption vulnerability that was addressed by improving locking mechanisms. This vulnerability affects multiple Apple operating systems, including macOS Monterey, macOS Ventura, macOS Sonoma, visionOS, iOS, iPadOS, watchOS, and tvOS. Successful exploitation of this vulnerability could allow an application to cause unexpected system termination or enable the writing of arbitrary kernel memory. It was addressed by adding locking and guards, which prevents the return of a potentially poisoned or invalid pointer.
macOSApple - show more detail10CVE-2025-38352
high 7.4
Exploit known
12
Jul 22, 2025
CVE-2025-38352 is a vulnerability that exists in the Linux kernel, specifically within the handling of POSIX CPU timers. The vulnerability stems from a race condition between `handle_posix_cpu_timers()` and `posix_cpu_timer_del()`. This race condition can occur when a non-autoreaping task that is exiting has already passed `exit_notify()` and calls `handle_posix_cpu_timers()` from an interrupt request (IRQ). If a concurrent `posix_cpu_timer_del()` runs at the same time, it might not detect that `timer->it.cpu.firing != 0`, which can cause `cpu_timer_task_rcu()` and/or `lock_task_sighand()` to fail. This vulnerability can be exploited to gain elevated privileges on Android devices.
Linux Kernel