Latest Cyber Threat Data

CISA Known Exploited Vulnerabilities (Top 10)

CVE-2018-4063

Vendor: Sierra Wireless

Sierra Wireless AirLink ALEOS contains an unrestricted upload of file with dangerous type vulnerability. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

Details

CVE-2025-14174

Vendor: Google

Google Chromium contains an out of bounds memory access vulnerability in ANGLE that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Details

CVE-2025-58360

Vendor: OSGeo

OSGeo GeoServer contains an improper restriction of XML external entity reference vulnerability that occurs when the application accepts XML input through a specific endpoint /geoserver/wms operation GetMap and could allow an attacker to define external entities within the XML request.

Details

CVE-2025-6218

Vendor: RARLAB

RARLAB WinRAR contains a path traversal vulnerability allowing an attacker to execute code in the context of the current user.

Details

CVE-2025-62221

Vendor: Microsoft

Microsoft Windows Cloud Files Mini Filter Driver contains a use after free vulnerability that can allow an authorized attacker to elevate privileges locally.

Details

CVE-2022-37055

Vendor: D-Link

D-Link Routers contains a buffer overflow vulnerability that has a high impact on confidentiality, integrity, and availability. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

Details

CVE-2025-66644

Vendor: Array Networks

Array Networks ArrayOS AG contains an OS command injection vulnerability that could allow an attacker to execute arbitrary commands.

Details

CVE-2025-55182

Vendor: Meta

Meta React Server Components contains a remote code execution vulnerability that could allow unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Server Function endpoints. Please note CVE-2025-66478 has been rejected, but it is associated with CVE-2025- 55182.

Details

CVE-2021-26828

Vendor: OpenPLC

OpenPLC ScadaBR contains an unrestricted upload of file with dangerous type vulnerability that allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm.

Details

CVE-2025-48633

Vendor: Android

Android Framework contains an unspecified vulnerability that allows for information disclosure.

Details

MITRE ATT&CK Techniques (Top 10)

Last updated: Dec. 14, 2025, 12:26 a.m.