Loading HuntDB...

Real-Time Vulnerability
Intelligence

Discover, track, and analyze security vulnerabilities before they impact your infrastructure.

Threat Intelligence

Loading...

Loading discussions...

Data Sources

Exploit Detection

180,000+ templates

Risk Assessment

270,000+ EPSS scores

KEV Monitoring

8,500+ KEV entries

CVE Database

0 CVEs tracked

Critical Threats

High-Impact Vulnerabilities

CRITICAL/HIGH

Incorrect Privilege Assignment vulnerability in Themewinter Eventin allows Privilege Escalation. This issue …

The Order Delivery Date WordPress plugin before 12.3.1 does not have authorization …

Active Exploits

EXPLOIT AVAILABLE

The Versa Concerto SD-WAN orchestration platform is vulnerable to an authentication bypass …

Incorrect Privilege Assignment vulnerability in Themewinter Eventin allows Privilege Escalation. This issue …

An issue was discovered in post.php in bootstrap-multiselect (aka Bootstrap Multiselect) 1.1.2. …

The Order Delivery Date WordPress plugin before 12.3.1 does not have authorization …

Security News

Apple addressed the seventh actively exploited zero-day

Apple addressed a vulnerability impacting iOS, iPadOS, and macOS that it is under active exploitation …

Securityaffairs.com • Aug 21
Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks

Commvault has released updates to address four security gaps that could be exploited to achieve …

Internet • Aug 21
Hackers deploy DripDropper via Apache ActiveMQ flaw, patch systems to evade detection

Hackers exploit Apache ActiveMQ flaw to install DripDropper on Linux, then patch it to block …

Securityaffairs.com • Aug 21
Russian threat actors using old Cisco bug to target critical infrastructure orgs

A threat group linked to the Russian Federal Security Service’s (FSB) Center 16 unit has …

Help Net Security • Aug 21

Professional Vulnerability Intelligence

Access comprehensive vulnerability intelligence with real-time monitoring and analysis capabilities.

Stay Informed About Emerging Threats

Weekly intelligence briefings with vulnerability analysis and threat assessments.

Professional threat intelligence updates. Unsubscribe anytime.