Welcome To CVE Radar
Discover trending vulnerabilities, explore attack vectors, exploits, and security details
CVE-2025-24201
8.8/ 10
CVSS Score
77/ 100
SVRS Score
9.76M
Audience
85
Social Media
0
News
0
Repos
An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.).
CVE-2025-26633
Microsoft
7.0/ 10
CVSS Score
48/ 100
SVRS Score
4.44M
Audience
105
Social Media
0
News
0
Repos
Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.
CVE-2025-27840
Espressif
6.8/ 10
CVSS Score
66/ 100
SVRS Score
3.33M
Audience
39
Social Media
8
News
2
Repos
Espressif ESP32 chips allow 29 hidden HCI commands, such as 0xFC02 (Write memory).
CVE-2025-0401
5.3/ 10
CVSS Score
60/ 100
SVRS Score
3.13M
Audience
11
Social Media
0
News
1
Repos
A vulnerability classified as critical has been found in 1902756969 reggie 1.0. Affected is the function download of the file src/main/java/com/itheima/reggie/controller/CommonController.java. The manipulation of the argument name leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-2894
6.6/ 10
CVSS Score
66/ 100
SVRS Score
3.01M
Audience
3
Social Media
6
News
0
Repos
The Go1 also known as "The World's First Intelligence Bionic Quadruped Robot Companion of Consumer Level," contains an undocumented backdoor that can enable the manufacturer, and anyone in possession of the correct API key, complete remote control over the affected robotic device using the CloudSail remote access service.
CVE-2025-20014
NA/ 10
CVSS Score
44/ 100
SVRS Score
2.7M
Audience
9
Social Media
2
News
0
Repos
mySCADA myPRO does not properly neutralize POST requests sent to a specific port with version information. This vulnerability could be exploited by an attacker to execute arbitrary commands on the affected system.
Extended Threat Intelligence
Free Trial

Stay ahead with proactive cyber threat warnings

Discover how SOCRadar's all-in-one platform can help protect your digital assets with extended threat intelligence, digital risk protection, and attack surface management.

CVE-2025-31160
2.9/ 10
CVSS Score
35/ 100
SVRS Score
2.63M
Audience
9
Social Media
4
News
0
Repos
atop through 2.11.0 allows local users to cause a denial of service (e.g., assertion failure and application exit) or possibly have unspecified other impact by running certain types of unprivileged processes while a different user runs atop.
CVE-2025-26512
9.9/ 10
CVSS Score
89/ 100
SVRS Score
2.34M
Audience
12
Social Media
6
News
0
Repos
SnapCenter versions prior to 6.0.1P1 and 6.1P1 are susceptible to a vulnerability which may allow an authenticated SnapCenter Server user to become an admin user on a remote system where a SnapCenter plug-in has been installed.
CVE-2024-47575
Fortinet
9.8/ 10
CVSS Score
94/ 100
SVRS Score
2.14M
Audience
4
Social Media
2
News
0
Repos
A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests.
CVE-2021-35587
Oracle
9.8/ 10
CVSS Score
94/ 100
SVRS Score
2.11M
Audience
24
Social Media
11
News
0
Repos
Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: OpenSSO Agent). Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in takeover of Oracle Access Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CVE-2025-27407
NA/ 10
CVSS Score
30/ 100
SVRS Score
1.95M
Audience
7
Social Media
5
News
0
Repos
graphql-ruby is a Ruby implementation of GraphQL. Starting in version 1.11.5 and prior to versions 1.11.8, 1.12.25, 1.13.24, 2.0.32, 2.1.14, 2.2.17, and 2.3.21, loading a malicious schema definition in `GraphQL::Schema.from_introspection` (or `GraphQL::Schema::Loader.load`) can result in remote code execution. Any system which loads a schema by JSON from an untrusted source is vulnerable, including those that use GraphQL::Client to load external schemas via GraphQL introspection. Versions 1.11.8, 1.12.25, 1.13.24, 2.0.32, 2.1.14, 2.2.17, and 2.3.21 contain a patch for the issue.
CVE-2024-20439
9.8/ 10
CVSS Score
95/ 100
SVRS Score
1.79M
Audience
51
Social Media
22
News
0
Repos
A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to login to the affected system. A successful exploit could allow the attacker to login to the affected system with administrative rights over the CSLU application API.
CVE-2025-23120
9.9/ 10
CVSS Score
87/ 100
SVRS Score
1.75M
Audience
68
Social Media
25
News
0
Repos
A vulnerability allowing remote code execution (RCE) for domain users.
CVE-2025-23242
NA/ 10
CVSS Score
30/ 100
SVRS Score
1.72M
Audience
5
Social Media
3
News
0
Repos
NVIDIA Riva contains a vulnerability where a user could cause an improper access control issue. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, denial of service, or information disclosure.
CVE-2025-23243
NA/ 10
CVSS Score
30/ 100
SVRS Score
1.71M
Audience
4
Social Media
3
News
0
Repos
NVIDIA Riva contains a vulnerability where a user could cause an improper access control issue. A successful exploit of this vulnerability might lead to data tampering or denial of service.
CVE-2025-22457
9.0/ 10
CVSS Score
91/ 100
SVRS Score
1.71M
Audience
86
Social Media
31
News
0
Repos
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.
CVE-2025-1316
Edimax
9.8/ 10
CVSS Score
89/ 100
SVRS Score
1.46M
Audience
44
Social Media
15
News
0
Repos
Edimax IC-7100 does not properly neutralize requests. An attacker can create specially crafted requests to achieve remote code execution on the device
CVE-2024-48248
8.6/ 10
CVSS Score
80/ 100
SVRS Score
1.42M
Audience
26
Social Media
14
News
0
Repos
NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials).
CVE-2025-27607
NA/ 10
CVSS Score
44/ 100
SVRS Score
1.35M
Audience
16
Social Media
5
News
0
Repos
Python JSON Logger is a JSON Formatter for Python Logging. Between 30 December 2024 and 4 March 2025 Python JSON Logger was vulnerable to RCE through a missing dependency. This occurred because msgspec-python313-pre was deleted by the owner leaving the name open to being claimed by a third party. If the package was claimed, it would allow them RCE on any Python JSON Logger user who installed the development dependencies on Python 3.13 (e.g. pip install python-json-logger[dev]). This issue has been resolved with 3.3.0.
CVE-2024-4577
Php
9.8/ 10
CVSS Score
99/ 100
SVRS Score
1.29M
Audience
48
Social Media
30
News
0
Repos
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence