Loading HuntDB...

Real-Time Vulnerability
Intelligence

Discover, track, and analyze security vulnerabilities before they impact your infrastructure.

Threat Intelligence

Loading...

Loading discussions...

Data Sources

Exploit Detection

180,000+ templates

Risk Assessment

270,000+ EPSS scores

KEV Monitoring

8,500+ KEV entries

CVE Database

0 CVEs tracked

Critical Threats

High-Impact Vulnerabilities

CRITICAL/HIGH

Incorrect Privilege Assignment vulnerability in Themewinter Eventin allows Privilege Escalation. This issue …

The Order Delivery Date WordPress plugin before 12.3.1 does not have authorization …

Active Exploits

EXPLOIT AVAILABLE

The Versa Concerto SD-WAN orchestration platform is vulnerable to an authentication bypass …

Incorrect Privilege Assignment vulnerability in Themewinter Eventin allows Privilege Escalation. This issue …

An issue was discovered in post.php in bootstrap-multiselect (aka Bootstrap Multiselect) 1.1.2. …

The Order Delivery Date WordPress plugin before 12.3.1 does not have authorization …

Security News

DSA-5958-1 jpeg-xl - security update

Multiple vulnerabilities are discovered in jpeg-xl, the JPEG XL ("JXL") image coding library, including out …

Debian.org • Jul 4
CVE-2025-53367: An exploitable out-of-bounds write in DjVuLibre

DjVuLibre has a vulnerability that could enable an attacker to gain code execution on a …

Github.blog • Jul 3
CVE-2025-53367: An exploitable OOB write in DjVuLibre

Posted by Kevin Backhouse on Jul 03DjVuLibre version 3.5.29 was released today. It fixes CVE-2025-53367 …

Seclists.org • Jul 3
CVE-2025-29306 – Unauthenticated Remote Code Execution in FoxCMS v1.2.5 via Unserialize Injection

Discover details about CVE-2025-29306, a critical RCE vulnerability in FoxCMS 1.2.5. Learn how unsafe use …

Offsec.com • Jul 3

Professional Vulnerability Intelligence

Access comprehensive vulnerability intelligence with real-time monitoring and analysis capabilities.

Stay Informed About Emerging Threats

Weekly intelligence briefings with vulnerability analysis and threat assessments.

Professional threat intelligence updates. Unsubscribe anytime.