Latest CVE Feed
-
5.5
MEDIUMCVE-2022-26707
An issue in the handling of environment variables was addressed with improved validation. This issue is fixed in macOS Monterey 12.4. A user may be able to view sensitive user information.... Read more
Affected Products : macos- Published: Sep. 23, 2022
- Modified: May. 22, 2025
-
8.8
HIGHCVE-2022-22637
A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. A malicious website may cause unexpected cross-origin behavior.... Read more
- Published: Sep. 23, 2022
- Modified: May. 22, 2025
-
8.8
HIGHCVE-2022-22628
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code executio... Read more
- Published: Sep. 23, 2022
- Modified: May. 22, 2025
-
7.1
HIGHCVE-2020-36521
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iCloud for Windows 11.4, iOS 14.0 and iPadOS 14.0, watchOS 7.0, tvOS 14.0, iCloud for Windows 7.21, iTunes for Windows 12.10.9. Processing a maliciously crafted tif... Read more
- Published: Sep. 23, 2022
- Modified: May. 22, 2025
-
4.4
MEDIUMCVE-2018-10626
Medtronic MyCareLink Patient Monitor’s update service does not sufficiently verify the authenticity of the data uploaded. An attacker who obtains per-product credentials from the monitor and paired implantable cardiac device information can potentially up... Read more
- Published: Aug. 10, 2018
- Modified: May. 22, 2025
-
7.1
HIGHCVE-2018-10622
Medtronic MyCareLink Patient Monitor uses per-product credentials that are stored in a recoverable format. An attacker can use these credentials for network authentication and encryption of local data at rest.... Read more
- Published: Aug. 10, 2018
- Modified: May. 22, 2025
-
6.5
MEDIUMCVE-2025-27980
cashbook v4.0.3 has an arbitrary file read vulnerability in /api/entry/flow/invoice/show?invoice=.... Read more
- Published: Apr. 15, 2025
- Modified: May. 22, 2025
- Vuln Type: Information Disclosure
-
9.1
CRITICALCVE-2025-24977
OpenCTI is an open cyber threat intelligence (CTI) platform. Prior to version 6.4.11 any user with the capability `manage customizations` can execute commands on the underlying infrastructure where OpenCTI is hosted and can access internal server side sec... Read more
Affected Products : opencti- Published: May. 05, 2025
- Modified: May. 22, 2025
-
4.3
MEDIUMCVE-2024-45805
OpenCTI is an open-source cyber threat intelligence platform. Before 6.3.0, general users can access information that can only be accessed by users with access privileges to admin and support information (SETTINGS_SUPPORT). This is due to inadequate acces... Read more
Affected Products : opencti- Published: Dec. 26, 2024
- Modified: May. 22, 2025
-
8.2
HIGHCVE-2024-37155
OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. Prior to version 6.1.9, the regex validation used to prevent Introspection queries can be bypassed by removing the extra whitesp... Read more
Affected Products : opencti- Published: Nov. 18, 2024
- Modified: May. 22, 2025
-
6.3
MEDIUMCVE-2025-44854
TOTOLINK CP900 V6.3c.1144_B20190715 was found to contain a command injection vulnerability in the setUpgradeUboot function via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.... Read more
- Published: May. 01, 2025
- Modified: May. 22, 2025
- Vuln Type: Injection
-
6.3
MEDIUMCVE-2025-44847
TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the setWebWlanIdx function via the webWlanIdx parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.... Read more
- Published: May. 01, 2025
- Modified: May. 22, 2025
- Vuln Type: Injection
-
6.3
MEDIUMCVE-2025-44846
TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the recvUpgradeNewFw function via the fwUrl parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.... Read more
- Published: May. 01, 2025
- Modified: May. 22, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-44845
TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the NTPSyncWithHost function via the hostTime parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.... Read more
- Published: May. 01, 2025
- Modified: May. 22, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-44844
TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the setUpgradeFW function via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.... Read more
- Published: May. 01, 2025
- Modified: May. 22, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-44843
TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the CloudSrvUserdataVersionCheck function via the url parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.... Read more
- Published: May. 01, 2025
- Modified: May. 22, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-44842
TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the msg_process function via the Port parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.... Read more
- Published: May. 01, 2025
- Modified: May. 22, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-44841
TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the CloudSrvUserdataVersionCheck function via the version parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.... Read more
- Published: May. 01, 2025
- Modified: May. 22, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-44840
TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the CloudSrvUserdataVersionCheck function via the svn parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.... Read more
- Published: May. 01, 2025
- Modified: May. 22, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-44839
TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the CloudSrvUserdataVersionCheck function via the magicid parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.... Read more
- Published: May. 01, 2025
- Modified: May. 22, 2025
- Vuln Type: Injection