PatchNow - Analysis History

ℹ️ About this page: This page shows all 74 vulnerabilities analyzed by PatchNow since inception. The main page shows only HIGH_RISK vulnerabilities currently within the KEV timeline thresholds. This archive provides full historical context of all analyzed CVEs.
74
Total Analyzed
55
High Risk
4
Medium Risk
15
Low Risk
73
CISA KEV Listed
2025-03-11 to 2026-01-21
Date Range

Complete CVE Analysis Archive

CVE ID Published Risk Level CVSS Days to KEV Affected Products Summary
CVE-2026-20045 2026-01-21 πŸ”΄ HIGH RISK 8.2 0 days (same day) Cisco Unified Communications Manager, Cisco Unity Connection, Cisco Unified Communications Manager IM and Presence Service Critical remote code execution vulnerability in Cisco Unified Communications products allowing unauthenticated attackers to execute arbitrary commands via crafted HTTP requests to web management interfaces. Cisco confirms active exploitation attempts in the wild with potential for privilege escalation to root access.
CVE-2026-24061 2026-01-21 πŸ”΄ HIGH RISK 9.8 5 days GNU InetUtils telnetd Critical authentication bypass vulnerability in GNU InetUtils telnetd allows remote attackers to gain root access without credentials via malformed USER environment variable. Over 800,000 telnet servers are exposed on the internet with active exploitation observed in the wild.
CVE-2025-52691 2025-12-29 πŸ”΄ HIGH RISK 10.0 28 days SmarterMail Build 9406 and earlier Critical unauthenticated file upload vulnerability in SmarterMail email servers allowing arbitrary file upload to any server location, leading to remote code execution. Active exploitation is occurring in the wild against internet-facing mail servers.
CVE-2025-68645 2025-12-22 πŸ”΄ HIGH RISK 8.8 31 days Zimbra Collaboration Local File Inclusion vulnerability in Zimbra Collaboration webmail allows unauthenticated remote attackers to include arbitrary files via crafted requests to /h/rest endpoint. Zimbra is commonly deployed as internet-facing email server infrastructure.
CVE-2025-14847 2025-12-19 πŸ”΄ HIGH RISK 7.5 10 days MongoDB Server Critical memory disclosure vulnerability in MongoDB Server allowing unauthenticated remote attackers to read heap memory through malformed Zlib compressed protocol headers. CISA has added this to KEV catalog due to confirmed active exploitation in the wild.
CVE-2025-14733 2025-12-19 πŸ”΄ HIGH RISK 9.3 0 days (same day) WatchGuard Fireware OS Critical out-of-bounds write vulnerability in WatchGuard Fireware OS affecting IKEv2 VPN services. Remote unauthenticated attackers can execute arbitrary code on internet-facing firewall systems through direct network exploitation.
CVE-2025-40602 2025-12-18 πŸ”΄ HIGH RISK 6.6 -1 days SonicWall SMA1000 CVE-2025-40602 is a local privilege escalation vulnerability in SonicWall SMA1000 appliances that is being actively exploited in the wild when chained with CVE-2025-23006. CISA has added this to the KEV catalog due to confirmed exploitation.
CVE-2025-43529 2025-12-17 🟒 LOW RISK 9.8 -2 days Safari, iOS and iPadOS, macOS (+3 more) CVE-2025-43529 is a use-after-free vulnerability in WebKit that affects client applications (Safari browser, iOS/iPadOS, tvOS, visionOS) when processing malicious web content. While actively exploited and on CISA KEV, this requires user interaction to visit malicious websites rather than direct exploitation of internet-facing servers.
CVE-2025-20393 2025-12-17 πŸ”΄ HIGH RISK 10.0 0 days (same day) Cisco Secure Email Gateway, Cisco Secure Email and Web Manager Critical remote command execution vulnerability in Cisco Secure Email Gateway and Manager appliances with CVSS 10.0 score requiring no authentication or user interaction. CISA has added this to their KEV catalog due to active exploitation in the wild targeting these internet-facing email security appliances.
CVE-2025-59374 2025-12-17 🟒 LOW RISK 9.3 0 days (same day) ASUS Live Update CVE-2025-59374 affects ASUS Live Update, a client-side software utility that was compromised through a supply chain attack with embedded malicious code. While it has network attack vector and is in CISA KEV, it's a client application not typically internet-facing.
CVE-2025-37164 2025-12-16 πŸ”΄ HIGH RISK 10.0 22 days HPE OneView CVE-2025-37164 is a critical unauthenticated remote code execution vulnerability in HPE OneView with a perfect CVSS score of 10.0. CISA has added this to their KEV catalog due to active exploitation in the wild, and a Metasploit module exists for exploitation.
CVE-2025-14611 2025-12-12 πŸ”΄ HIGH RISK 7.1 3 days Gladinet CentreStack, Gladinet TrioFox Gladinet CentreStack and TrioFox use hardcoded AES keys enabling unauthenticated arbitrary local file inclusion on public-facing endpoints. This vulnerability is actively exploited and listed in CISA's KEV catalog.
CVE-2025-14174 2025-12-12 🟒 LOW RISK 8.8 0 days (same day) Chrome, Microsoft Edge CVE-2025-14174 is an out-of-bounds memory access vulnerability in Google Chrome that requires user interaction with a crafted HTML page. While actively exploited and in CISA KEV, it affects client-side browser software, not internet-facing servers.
CVE-2025-8110 2025-12-10 πŸ”΄ HIGH RISK 8.7 33 days Gogs versions Critical RCE vulnerability in Gogs Git service allows authenticated users to achieve remote code execution via symbolic link bypass in the PutContents API. Over 700 internet-facing instances have been compromised with active exploitation ongoing.
CVE-2025-59718 2025-12-09 πŸ”΄ HIGH RISK 9.1 7 days FortiOS, FortiProxy, FortiSwitchManager Critical SAML authentication bypass vulnerability in Fortinet FortiOS, FortiProxy, and FortiSwitchManager allowing unauthenticated attackers to bypass FortiCloud SSO login authentication via crafted SAML response messages. CISA has confirmed active exploitation of this vulnerability.
CVE-2025-66644 2025-12-05 πŸ”΄ HIGH RISK 7.2 3 days Array Networks ArrayOS AG Critical OS command injection vulnerability in Array Networks ArrayOS AG VPN appliances affecting versions before 9.4.5.9. Active exploitation confirmed in the wild from August-December 2025 with attackers deploying webshells for persistent access.
CVE-2025-55182 2025-12-03 πŸ”΄ HIGH RISK 10.0 2 days React Server Components, Next.js applications with App Router and Server Actions, react-server-dom-webpack (+2 more) Critical pre-authentication remote code execution vulnerability in React Server Components allowing arbitrary code execution through unsafe deserialization of HTTP requests. Multiple threat actors are actively exploiting this vulnerability against internet-facing React applications.
CVE-2025-58360 2025-11-25 πŸ”΄ HIGH RISK 8.2 16 days GeoServer GeoServer has an unauthenticated XML External Entity (XXE) vulnerability in the WMS GetMap feature that can be exploited directly over the network. CISA has confirmed active exploitation in the wild.
CVE-2025-58034 2025-11-18 πŸ”΄ HIGH RISK 6.7 0 days (same day) Fortinet FortiWeb OS command injection vulnerability in Fortinet FortiWeb allowing authenticated attackers to execute unauthorized code via crafted HTTP requests or CLI commands. FortiWeb is a web application firewall that is almost universally deployed as an internet-facing service to protect web applications.
CVE-2025-13223 2025-11-17 🟒 LOW RISK 8.8 2 days Chrome CVE-2025-13223 is a type confusion vulnerability in Chrome's V8 engine exploited via crafted HTML pages. While actively exploited in the wild, it requires user interaction to visit malicious websites, making it primarily a client-side phishing attack rather than direct server exploitation.
CVE-2025-64446 2025-11-14 πŸ”΄ HIGH RISK 9.1 0 days (same day) Fortinet FortiWeb Critical path traversal vulnerability in Fortinet FortiWeb web application firewalls allows remote execution of administrative commands via crafted HTTP/HTTPS requests. Active exploitation is occurring in the wild with attackers creating administrative accounts for persistent access.
CVE-2025-12480 2025-11-10 πŸ”΄ HIGH RISK 9.1 2 days TrioFox File Sharing Platform CVE-2025-12480 is a critical authentication bypass vulnerability in TrioFox file sharing platforms that allows unauthenticated attackers to access administrative setup pages. The vulnerability is being actively exploited in the wild and has been added to CISA's KEV catalog.
CVE-2025-61757 2025-10-21 πŸ”΄ HIGH RISK 9.8 31 days Oracle Identity Manager Critical pre-authentication remote code execution vulnerability in Oracle Identity Manager REST WebServices component. Allows complete system takeover via unauthenticated HTTP requests with CISA-confirmed active exploitation.
CVE-2025-61932 2025-10-20 🟑 MEDIUM RISK 9.8 2 days Motex Lanscope Endpoint Manager On-Premises v9.4.7.1 and earlier Critical vulnerability in Motex Lanscope Endpoint Manager allowing remote code execution through improper verification of incoming network requests. Active exploitation confirmed with CISA KEV listing.
CVE-2025-59287 2025-10-14 πŸ”΄ HIGH RISK 9.8 10 days Windows Server, Windows Server 2012 R2 Critical deserialization vulnerability in Windows Server Update Services (WSUS) allows unauthenticated remote code execution over the network. WSUS servers are commonly deployed as centralized internet-facing infrastructure for managing Windows updates in enterprise environments.
CVE-2025-61884 2025-10-12 πŸ”΄ HIGH RISK 7.5 8 days Oracle E-Business Suite Configurator CVE-2025-61884 is a high-severity vulnerability in Oracle E-Business Suite Configurator that allows unauthenticated remote attackers to access critical data via HTTP. The vulnerability has been actively exploited in the wild and added to CISA's KEV catalog.
CVE-2025-11371 2025-10-09 πŸ”΄ HIGH RISK 7.5 26 days CentreStack, TrioFox CVE-2025-11371 is an unauthenticated Local File Inclusion vulnerability in Gladinet CentreStack and TrioFox file-sharing platforms. This zero-day vulnerability has been actively exploited in the wild and allows attackers to access system files without authentication.
CVE-2025-61882 2025-10-05 πŸ”΄ HIGH RISK 9.8 1 day Oracle E-Business Suite Concurrent Processing Critical unauthenticated remote code execution vulnerability in Oracle E-Business Suite Concurrent Processing component accessible via HTTP. Actively exploited by Cl0p ransomware group for data theft attacks with complete system takeover potential.
CVE-2025-20362 2025-09-25 πŸ”΄ HIGH RISK 6.5 0 days (same day) Cisco ASA Software, Cisco Firepower Threat Defense Software CVE-2025-20362 is a missing authorization vulnerability in Cisco ASA and FTD VPN web servers that allows unauthenticated remote attackers to access restricted URL endpoints. The vulnerability is being actively exploited in the wild and affects internet-facing firewall appliances.
CVE-2025-20333 2025-09-25 πŸ”΄ HIGH RISK 9.9 0 days (same day) Cisco ASA Software, Cisco Firepower Threat Defense Software CVE-2025-20333 is a critical buffer overflow vulnerability in the VPN web server component of Cisco ASA and Firepower Threat Defense Software that allows authenticated remote attackers to execute arbitrary code as root. This vulnerability is actively being exploited in the wild and affects internet-facing VPN appliances that are commonly deployed with public internet access.
CVE-2025-20352 2025-09-24 πŸ”΄ HIGH RISK 7.7 5 days Cisco IOS, Cisco IOS XE, Cisco IOS XE Catalyst SD-WAN Critical SNMP stack overflow vulnerability in Cisco IOS/IOS XE that allows remote code execution with high privileges or denial of service with low privileges. Actively exploited in the wild against network infrastructure devices commonly exposed to the internet.
CVE-2025-10585 2025-09-24 🟒 LOW RISK Not provided in CIRCL data -1 days Chrome CVE-2025-10585 is a type confusion vulnerability in Chrome's V8 engine that allows remote code execution via crafted HTML pages. While actively exploited as a zero-day, it requires user interaction to visit malicious websites, making it a client-side attack rather than direct server exploitation.
CVE-2025-48703 2025-09-19 πŸ”΄ HIGH RISK 9.0 46 days CentOS Web Panel, Control Web Panel Critical unauthenticated remote code execution vulnerability in CentOS Web Panel through OS command injection in the filemanager module. Actively exploited in the wild with public PoC exploits and Metasploit modules available.
CVE-2025-59689 2025-09-19 πŸ”΄ HIGH RISK 6.1 10 days Libraesva Email Security Gateway 4.5 - 5.5.x Critical command injection vulnerability in Libraesva Email Security Gateway allowing remote code execution via malicious compressed email attachments. This vulnerability is actively exploited in the wild and affects internet-facing email security appliances.
CVE-2025-10035 2025-09-18 πŸ”΄ HIGH RISK 10.0 11 days Fortra GoAnywhere MFT versions <= CVE-2025-10035 is a critical deserialization vulnerability in Fortra GoAnywhere MFT's License Servlet that allows unauthenticated remote code execution. This vulnerability has been actively exploited as a zero-day and affects internet-facing managed file transfer servers.
CVE-2025-9242 2025-09-17 πŸ”΄ HIGH RISK 9.3 56 days WatchGuard Firewall/Fireware OS Critical out-of-bounds write vulnerability in WatchGuard Fireware OS affecting IKEv2 VPN services that allows unauthenticated remote code execution. This is actively exploited in the wild according to CISA KEV and affects security appliances that are inherently internet-facing by design.
CVE-2025-21043 2025-09-12 🟒 LOW RISK 8.8 20 days Samsung Android devices CVE-2025-21043 is an out-of-bounds write vulnerability in Samsung Android devices' image codec library that requires user interaction for exploitation. While actively exploited as a zero-day, it affects client devices rather than internet-facing servers.
CVE-2025-21042 2025-09-12 🟒 LOW RISK 8.8 59 days Samsung Galaxy Mobile Devices CVE-2025-21042 is an out-of-bounds write vulnerability in Samsung mobile devices' image processing library that requires user interaction with malicious DNG image files. While actively exploited via messaging apps like WhatsApp, it targets client devices rather than internet-facing servers.
CVE-2025-54236 2025-09-09 πŸ”΄ HIGH RISK 9.1 45 days Adobe Commerce 2.4.4-p15 and earlier, Magento Open Source CVE-2025-54236 is a critical improper input validation vulnerability in Adobe Commerce (Magento) that enables session takeover and potentially remote code execution without user interaction. This vulnerability is being actively exploited in the wild against internet-facing e-commerce platforms.
CVE-2025-53690 2025-09-03 πŸ”΄ HIGH RISK 9.0 1 day Sitecore Experience Manager to, Sitecore Experience Platform to Critical ViewState deserialization vulnerability in Sitecore Experience Manager/Platform allowing remote code execution. Actively exploited in the wild since December 2024, affecting internet-facing Sitecore deployments using default sample machine keys.
CVE-2025-9377 2025-08-29 πŸ”΄ HIGH RISK 8.6 5 days TP-Link Systems Inc. Archer C7 V2, TP-Link Systems Inc. TL-WR841N/ND V9 CVE-2025-9377 is an authenticated remote command execution vulnerability in TP-Link router web interfaces that allows network-based exploitation of internet-facing devices. CISA has confirmed active exploitation and added it to the KEV catalog.
CVE-2025-55177 2025-08-29 🟒 LOW RISK 5.4 4 days WhatsApp Desktop for Mac, WhatsApp Business for iOS, WhatsApp for iOS CVE-2025-55177 affects WhatsApp client applications on iOS and macOS, allowing unauthorized processing of content from arbitrary URLs through crafted synchronization messages. While it has network attack vector and active exploitation evidence, it targets client applications rather than internet-facing servers.
CVE-2025-57819 2025-08-28 πŸ”΄ HIGH RISK 10.0 1 day FreePBX security-reporting < FreePBX security-reporting module contains an authentication bypass vulnerability leading to SQL injection and RCE. This web-based PBX management interface is commonly exposed to the internet for remote administration and has been actively exploited since August 2025.
CVE-2025-7775 2025-08-26 πŸ”΄ HIGH RISK 9.2 0 days (same day) NetScaler ADC, NetScaler Gateway Critical memory overflow vulnerability in NetScaler ADC and Gateway allowing unauthenticated remote code execution. Active zero-day exploitation confirmed against internet-facing appliances with CISA KEV listing.
CVE-2025-43300 2025-08-21 🟒 LOW RISK 8.8 0 days (same day) Apple macOS, Apple iOS and iPadOS, Apple iPadOS CVE-2025-43300 is an out-of-bounds write vulnerability in Apple's Image I/O framework affecting macOS, iOS, and iPadOS that requires user interaction to process a malicious image file. While actively exploited as a zero-day, it primarily affects client-side operating systems rather than internet-facing server applications.
CVE-2025-8876 2025-08-14 πŸ”΄ HIGH RISK 9.4 -1 days N-able N-central before version CVE-2025-8876 is a critical OS command injection vulnerability in N-able N-central RMM platform that allows authenticated attackers to execute arbitrary commands. CISA has confirmed active exploitation in the wild, and the vulnerability affects internet-facing management platforms used by MSPs.
CVE-2025-8088 2025-08-08 🟒 LOW RISK 8.4 4 days win.rar GmbH WinRAR CVE-2025-8088 is a path traversal vulnerability in WinRAR that allows arbitrary code execution through malicious archive files. This requires user interaction to open/extract crafted archives and is not directly exploitable over the internet against public-facing services.
CVE-2025-54253 2025-08-05 πŸ”΄ HIGH RISK 10.0 71 days Adobe Experience Manager Forms on JEE versions 6.5.23 and earlier Critical misconfiguration vulnerability in Adobe Experience Manager Forms on JEE allowing pre-authentication remote code execution via OGNL injection. The vulnerability requires no user interaction and can be exploited directly over the network against internet-facing AEM instances.
CVE-2025-54948 2025-08-05 πŸ”΄ HIGH RISK 9.4 13 days Trend Micro Apex One 2019 versions < CVE-2025-54948 is a critical OS command injection vulnerability in Trend Micro Apex One on-premise management console that allows pre-authenticated remote attackers to upload malicious code and execute arbitrary commands. CISA has added this vulnerability to the KEV catalog due to active exploitation in the wild.
CVE-2025-6205 2025-08-04 πŸ”΄ HIGH RISK 9.1 85 days DELMIA Apriso Critical missing authorization vulnerability in DELMIA Apriso manufacturing execution system allows unauthenticated attackers to gain privileged access over the network. CISA coordinator notes active exploitation is occurring in the wild.
CVE-2025-6204 2025-08-04 🟑 MEDIUM RISK 8.0 85 days Dassault DELMIA Apriso Code injection vulnerability in Dassault Systèmes DELMIA Apriso manufacturing operations management platform allows arbitrary code execution. Requires high privileges but exploitable over network without user interaction.
CVE-2025-53770 2025-07-20 πŸ”΄ HIGH RISK 9.8 0 days (same day) Microsoft SharePoint Enterprise Server, Microsoft SharePoint Server, Microsoft SharePoint Server Subscription Edition Critical deserialization vulnerability in on-premises SharePoint Server allowing unauthenticated remote code execution over the network. Actively exploited in the wild with public exploits available.
CVE-2025-54309 2025-07-18 πŸ”΄ HIGH RISK 9.0 4 days CrushFTP CrushFTP versions 10 before, CrushFTP CrushFTP versions 11 before 11.3.4_23 Critical vulnerability in CrushFTP file transfer server allows remote attackers to obtain admin access via HTTPS through mishandled AS2 validation. Actively exploited in the wild with large numbers of internet-facing instances vulnerable.
CVE-2025-25257 2025-07-17 πŸ”΄ HIGH RISK 9.6 1 day Fortinet FortiWeb, FortiWeb Critical SQL injection vulnerability in Fortinet FortiWeb WAF allowing unauthenticated attackers to execute arbitrary SQL and code via crafted HTTP/HTTPS requests. CISA has confirmed active exploitation in the wild with public PoC available.
CVE-2025-20337 2025-07-16 πŸ”΄ HIGH RISK 10.0 12 days Cisco Identity Services Engine Software, Cisco ISE Passive Identity Connector Critical unauthenticated remote code execution vulnerability in Cisco ISE API that allows attackers to execute arbitrary code as root. The vulnerability is actively exploited in the wild and requires no authentication or user interaction.
CVE-2025-6558 2025-07-15 🟒 LOW RISK 8.8 7 days Google Chrome CVE-2025-6558 is a Google Chrome vulnerability allowing sandbox escape via crafted HTML pages. While actively exploited and on CISA KEV, it requires user interaction to visit malicious websites, making it unsuitable for T1190 direct network exploitation.
CVE-2025-47812 2025-07-10 πŸ”΄ HIGH RISK 10.0 4 days wftpserver Wing FTP Server versions before Critical RCE vulnerability in Wing FTP Server allowing arbitrary Lua code injection through null byte mishandling in web interfaces. Exploitable remotely without authentication, including via anonymous FTP accounts, leading to total server compromise.
CVE-2025-48384 2025-07-08 🟒 LOW RISK 8.1 48 days git git Git vulnerability allowing arbitrary code execution through malicious repositories with crafted submodule paths. Requires user interaction (git clone --recursive) and primarily affects client-side Git operations rather than internet-facing server applications.
CVE-2025-49706 2025-07-08 πŸ”΄ HIGH RISK 6.5 14 days Microsoft SharePoint Enterprise Server, Microsoft SharePoint Server, Microsoft SharePoint Server Subscription Edition CVE-2025-49706 is an improper authentication vulnerability in Microsoft SharePoint Server that allows network-based spoofing attacks without authentication. The vulnerability is actively exploited in the wild and enables attackers to bypass authentication by manipulating HTTP headers.
CVE-2025-49704 2025-07-08 πŸ”΄ HIGH RISK 8.8 14 days Microsoft SharePoint Enterprise Server, Microsoft SharePoint Server CVE-2025-49704 is a critical code injection vulnerability in Microsoft SharePoint that allows remote code execution over the network with only low-privilege authentication required. SharePoint servers are commonly deployed as internet-facing enterprise applications, making this vulnerability highly exploitable via T1190.
CVE-2025-6554 2025-06-30 🟒 LOW RISK 8.1 2 days Google Chrome CVE-2025-6554 is a type confusion vulnerability in Google Chrome's V8 JavaScript engine that allows arbitrary read/write via crafted HTML pages. While actively exploited and on CISA KEV, it requires user interaction and affects client-side browser software, not internet-facing server applications.
CVE-2025-20281 2025-06-25 πŸ”΄ HIGH RISK 10.0 33 days Cisco Identity Services Engine Software Critical unauthenticated remote code execution vulnerability in Cisco ISE API that allows attackers to execute arbitrary code as root via crafted API requests. Actively exploited in the wild with CVSS 10.0 severity.
CVE-2025-6543 2025-06-25 πŸ”΄ HIGH RISK 9.2 5 days NetScaler ADC, NetScaler Gateway Critical memory overflow vulnerability in NetScaler ADC and Gateway that allows remote network exploitation leading to denial of service and potential code execution. The vulnerability is actively exploited in the wild as a zero-day since May 2025.
CVE-2025-6264 2025-06-20 🟑 MEDIUM RISK 5.5 N/A Rapid7 Velociraptor < CVE-2025-6264 is a privilege escalation vulnerability in Rapid7 Velociraptor that allows users with COLLECT_CLIENT permissions to execute arbitrary commands and take over endpoints. The vulnerability has been actively exploited in ransomware attacks and affects internet-facing Velociraptor server deployments.
CVE-2025-5777 2025-06-17 πŸ”΄ HIGH RISK 9.3 23 days NetScaler ADC, NetScaler Gateway Critical memory overread vulnerability in NetScaler ADC/Gateway allowing unauthenticated remote attackers to read sensitive memory contents including session tokens. Actively exploited in the wild with CISA KEV listing.
CVE-2025-43200 2025-06-16 🟒 LOW RISK 4.8 0 days (same day) Apple iOS and iPadOS, Apple macOS, Apple iPadOS (+2 more) CVE-2025-43200 is a logic issue in Apple client operating systems (iOS, macOS, iPadOS, watchOS, visionOS) that processes malicious media shared via iCloud Links. While it has network attack vector and is actively exploited, it targets client devices rather than internet-facing server applications.
CVE-2025-33073 2025-06-10 🟒 LOW RISK 8.8 132 days Windows, Windows Server 2008 SP2, Windows Server 2008 R2 SP1 (+2 more) CVE-2025-33073 is an SMB client elevation of privilege vulnerability that allows authenticated attackers to perform NTLM reflection attacks. While it has a network attack vector, it targets SMB client functionality rather than internet-facing server services, making direct internet exploitation unlikely.
CVE-2025-33053 2025-06-10 🟑 MEDIUM RISK 8.8 0 days (same day) Microsoft Windows 10 Version, Microsoft Windows Server, Microsoft Windows 10 Version 21H2 (+1 more) CVE-2025-33053 is a remote code execution vulnerability in Windows Internet Shortcut Files that requires user interaction (clicking malicious WebDAV links). While it has CVSS attack vector NETWORK, it primarily relies on spearphishing rather than direct exploitation of internet-facing services.
CVE-2025-5086 2025-06-02 πŸ”΄ HIGH RISK 9.0 101 days DELMIA Apriso Release Critical deserialization vulnerability in DELMIA Apriso manufacturing execution system allowing remote code execution without authentication. Active exploitation observed in the wild targeting internet-facing instances.
CVE-2025-48927 2025-05-28 πŸ”΄ HIGH RISK 5.3 34 days TeleMessage service TeleMessage service exposes an unauthenticated Spring Boot Actuator /heapdump endpoint that allows attackers to extract sensitive credentials remotely. This vulnerability is actively exploited in the wild and affects internet-facing enterprise messaging systems.
CVE-2025-2776 2025-05-07 πŸ”΄ HIGH RISK 9.3 76 days SysAid On-Prem versions <= CVE-2025-2776 is an unauthenticated XML External Entity (XXE) vulnerability in SysAid On-Prem that allows remote attackers to achieve administrator account takeover and file read access without any authentication. This vulnerability is actively being exploited in the wild and has been added to CISA's Known Exploited Vulnerabilities catalog.
CVE-2025-2775 2025-05-07 πŸ”΄ HIGH RISK 9.3 76 days SysAid SysAid On-Prem versions <= SysAid On-Prem is vulnerable to an unauthenticated XML External Entity (XXE) vulnerability allowing administrator account takeover and file read primitives. This is a server-side application typically deployed with internet-facing interfaces for IT support services.
CVE-2025-32433 2025-04-16 πŸ”΄ HIGH RISK 10.0 54 days erlang otp CVE-2025-32433 is a critical pre-authentication remote code execution vulnerability in Erlang/OTP SSH servers with a CVSS score of 10.0. The vulnerability allows unauthenticated attackers to execute arbitrary commands by exploiting flaws in SSH protocol message handling, with active exploitation confirmed in the wild.
CVE-2024-54085 2025-03-11 πŸ”΄ HIGH RISK 10.0 106 days AMI MegaRAC-SPx versions 12.0 to <12.7 and 13.0 to <13.5 Critical authentication bypass vulnerability in AMI MegaRAC BMC software affecting server management interfaces. Allows remote unauthenticated attackers to bypass authentication through the Redfish Host Interface with no user interaction required.