Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.8

    HIGH
    CVE-2022-32829

    This issue was addressed with improved checks. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges.... Read more

    Affected Products : macos iphone_os ipados
    • Published: Sep. 23, 2022
    • Modified: May. 22, 2025
  • 7.8

    HIGH
    CVE-2022-32826

    An authorization issue was addressed with improved state management. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to gain root pri... Read more

    Affected Products : macos mac_os_x iphone_os tvos watchos ipados
    • Published: Sep. 23, 2022
    • Modified: May. 22, 2025
  • 7.8

    HIGH
    CVE-2022-32798

    An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.5. An app may be able to gain elevated privileges.... Read more

    Affected Products : macos
    • Published: Sep. 23, 2022
    • Modified: May. 22, 2025
  • 4.4

    MEDIUM
    CVE-2022-32782

    This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Monterey 12.4. An app with root privileges may be able to access private information.... Read more

    Affected Products : macos
    • Published: Sep. 23, 2022
    • Modified: May. 22, 2025
  • 4.4

    MEDIUM
    CVE-2022-32781

    This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5, Security Update 2022-005 Catalina, macOS Big Sur 11.6.8. An app with root privileges may be able to access private information.... Read more

    Affected Products : macos mac_os_x iphone_os ipados
    • Published: Sep. 23, 2022
    • Modified: May. 22, 2025
  • 5.5

    MEDIUM
    CVE-2022-26707

    An issue in the handling of environment variables was addressed with improved validation. This issue is fixed in macOS Monterey 12.4. A user may be able to view sensitive user information.... Read more

    Affected Products : macos
    • Published: Sep. 23, 2022
    • Modified: May. 22, 2025
  • 8.8

    HIGH
    CVE-2022-22637

    A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. A malicious website may cause unexpected cross-origin behavior.... Read more

    • Published: Sep. 23, 2022
    • Modified: May. 22, 2025
  • 8.8

    HIGH
    CVE-2022-22628

    A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code executio... Read more

    • Published: Sep. 23, 2022
    • Modified: May. 22, 2025
  • 7.1

    HIGH
    CVE-2020-36521

    An out-of-bounds read was addressed with improved input validation. This issue is fixed in iCloud for Windows 11.4, iOS 14.0 and iPadOS 14.0, watchOS 7.0, tvOS 14.0, iCloud for Windows 7.21, iTunes for Windows 12.10.9. Processing a maliciously crafted tif... Read more

    • Published: Sep. 23, 2022
    • Modified: May. 22, 2025
  • 4.4

    MEDIUM
    CVE-2018-10626

    Medtronic MyCareLink Patient Monitor’s update service does not sufficiently verify the authenticity of the data uploaded. An attacker who obtains per-product credentials from the monitor and paired implantable cardiac device information can potentially up... Read more

    • Published: Aug. 10, 2018
    • Modified: May. 22, 2025
  • 7.1

    HIGH
    CVE-2018-10622

    Medtronic MyCareLink Patient Monitor uses per-product credentials that are stored in a recoverable format. An attacker can use these credentials for network authentication and encryption of local data at rest.... Read more

    • Published: Aug. 10, 2018
    • Modified: May. 22, 2025
  • 6.5

    MEDIUM
    CVE-2025-27980

    cashbook v4.0.3 has an arbitrary file read vulnerability in /api/entry/flow/invoice/show?invoice=.... Read more

    Affected Products : cashbook cashbook
    • Published: Apr. 15, 2025
    • Modified: May. 22, 2025
    • Vuln Type: Information Disclosure
  • 9.1

    CRITICAL
    CVE-2025-24977

    OpenCTI is an open cyber threat intelligence (CTI) platform. Prior to version 6.4.11 any user with the capability `manage customizations` can execute commands on the underlying infrastructure where OpenCTI is hosted and can access internal server side sec... Read more

    Affected Products : opencti
    • Published: May. 05, 2025
    • Modified: May. 22, 2025
  • 4.3

    MEDIUM
    CVE-2024-45805

    OpenCTI is an open-source cyber threat intelligence platform. Before 6.3.0, general users can access information that can only be accessed by users with access privileges to admin and support information (SETTINGS_SUPPORT). This is due to inadequate acces... Read more

    Affected Products : opencti
    • Published: Dec. 26, 2024
    • Modified: May. 22, 2025
  • 8.2

    HIGH
    CVE-2024-37155

    OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. Prior to version 6.1.9, the regex validation used to prevent Introspection queries can be bypassed by removing the extra whitesp... Read more

    Affected Products : opencti
    • Published: Nov. 18, 2024
    • Modified: May. 22, 2025
  • 6.3

    MEDIUM
    CVE-2025-44854

    TOTOLINK CP900 V6.3c.1144_B20190715 was found to contain a command injection vulnerability in the setUpgradeUboot function via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.... Read more

    Affected Products : cp900_firmware cp900
    • Published: May. 01, 2025
    • Modified: May. 22, 2025
    • Vuln Type: Injection
  • 6.3

    MEDIUM
    CVE-2025-44847

    TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the setWebWlanIdx function via the webWlanIdx parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.... Read more

    Affected Products : ca600-poe_firmware ca600-poe
    • Published: May. 01, 2025
    • Modified: May. 22, 2025
    • Vuln Type: Injection
  • 6.3

    MEDIUM
    CVE-2025-44846

    TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the recvUpgradeNewFw function via the fwUrl parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.... Read more

    Affected Products : ca600-poe_firmware ca600-poe
    • Published: May. 01, 2025
    • Modified: May. 22, 2025
    • Vuln Type: Injection
  • 6.5

    MEDIUM
    CVE-2025-44845

    TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the NTPSyncWithHost function via the hostTime parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.... Read more

    Affected Products : ca600-poe_firmware ca600-poe
    • Published: May. 01, 2025
    • Modified: May. 22, 2025
    • Vuln Type: Injection
  • 6.5

    MEDIUM
    CVE-2025-44844

    TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the setUpgradeFW function via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.... Read more

    Affected Products : ca600-poe_firmware ca600-poe
    • Published: May. 01, 2025
    • Modified: May. 22, 2025
    • Vuln Type: Injection
Showing 20 of 293289 Results