Search

Search Results (346927 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-32644 2026-04-27 9.8 Critical
Specific firmware versions of Milesight AIOT cameras use SSL certificates with default private keys.
CVE-2026-27785 2026-04-27 8.8 High
Specific firmware versions of Milesight AIOT camera firmware contain hard-coded credentials.
CVE-2026-40976 2026-04-27 9.1 Critical
In certain circumstances, Spring Boot's default web security is ineffective allowing unauthorized access to all endpoints. For an application to be vulnerable, it must: be a servlet-based web application; have no Spring Security configuration of its own and rely on the default web security filter chain; depend on spring-boot-actuator-autoconfigure; not depend on spring-boot-health. If any of the above does not apply, the application is not vulnerable. Affected: Spring Boot 4.0.0–4.0.5; upgrade to 4.0.6 or later per vendor advisory.
CVE-2025-43408 1 Apple 3 Macos, Macos Sequoia, Macos Sonoma 2026-04-27 2.4 Low
This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1. An attacker with physical access may be able to access contacts from the lock screen.
CVE-2025-43449 1 Apple 3 Ios, Ipados, Iphone Os 2026-04-27 7.5 High
The issue was addressed with improved handling of caches. This issue is fixed in iOS 26.1 and iPadOS 26.1. A malicious app may be able to track users between installs.
CVE-2025-43478 1 Apple 3 Macos, Macos Sequoia, Macos Sonoma 2026-04-27 5.5 Medium
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1. An app may be able to cause unexpected system termination.
CVE-2025-43439 1 Apple 5 Ios, Ipad Os, Ipados and 2 more 2026-04-27 5.5 Medium
A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, visionOS 26.1. An app may be able to fingerprint the user.
CVE-2025-43442 1 Apple 4 Ios, Ipad Os, Ipados and 1 more 2026-04-27 3.3 Low
A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1. An app may be able to identify what other apps a user has installed.
CVE-2025-43507 1 Apple 5 Ios, Ipados, Iphone Os and 2 more 2026-04-27 6.5 Medium
A privacy issue was addressed by moving sensitive data. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, visionOS 26.1, watchOS 26.1. An app may be able to fingerprint the user.
CVE-2025-43435 1 Apple 10 Ios, Ipad Os, Ipados and 7 more 2026-04-27 4.3 Medium
The issue was addressed with improved memory handling. This issue is fixed in Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2025-43360 1 Apple 4 Ios, Ipad Os, Ipados and 1 more 2026-04-27 5.5 Medium
The issue was addressed with improved UI. This issue is fixed in iOS 26 and iPadOS 26. Password fields may be unintentionally revealed.
CVE-2025-43399 1 Apple 2 Macos, Macos Sequoia 2026-04-27 7.5 High
This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, macOS Sequoia 15.7.2, macOS Tahoe 26.1. An app may be able to access protected user data.
CVE-2025-43376 1 Apple 7 Ios, Ipados, Iphone Os and 4 more 2026-04-27 7.5 High
A logic issue was addressed with improved state management. This issue is fixed in Safari 26, iOS 18.7.7 and iPadOS 18.7.7, iOS 26 and iPadOS 26, macOS Tahoe 26, tvOS 26, visionOS 26, watchOS 26. A remote attacker may be able to view leaked DNS queries with Private Relay turned on.
CVE-2025-43394 1 Apple 3 Macos, Macos Sequoia, Macos Sonoma 2026-04-27 5.5 Medium
This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1. An app may be able to access protected user data.
CVE-2025-43455 1 Apple 5 Ios, Ipados, Iphone Os and 2 more 2026-04-27 5.5 Medium
A privacy issue was addressed with improved checks. This issue is fixed in iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, visionOS 26.1, watchOS 26.1. A malicious app may be able to take a screenshot of sensitive information in embedded views.
CVE-2025-43382 1 Apple 3 Macos, Macos Sequoia, Macos Sonoma 2026-04-27 5.5 Medium
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1. An app may be able to access sensitive user data.
CVE-2025-43401 1 Apple 3 Macos, Macos Sequoia, Macos Sonoma 2026-04-27 7.5 High
A denial-of-service issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1. A remote attacker may be able to cause a denial-of-service.
CVE-2025-43397 1 Apple 3 Macos, Macos Sequoia, Macos Sonoma 2026-04-27 5.5 Medium
A permissions issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1. An app may be able to cause a denial-of-service.
CVE-2026-6074 1 Intrado 1 911 Emergency Gateway 2026-04-27 N/A
A path traversal condition in Intrado 911 Emergency Gateway could allow an attacker with existing network access the ability to access the EGW management interface without authentication. Successful exploitation of this vulnerability could allow a user to read, modify, or delete files.
CVE-2026-31472 1 Linux 1 Linux Kernel 2026-04-27 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: xfrm: iptfs: validate inner IPv4 header length in IPTFS payload Add validation of the inner IPv4 packet tot_len and ihl fields parsed from decrypted IPTFS payloads in __input_process_payload(). A crafted ESP packet containing an inner IPv4 header with tot_len=0 causes an infinite loop: iplen=0 leads to capturelen=min(0, remaining)=0, so the data offset never advances and the while(data < tail) loop never terminates, spinning forever in softirq context. Reject inner IPv4 packets where tot_len < ihl*4 or ihl*4 < sizeof(struct iphdr), which catches both the tot_len=0 case and malformed ihl values. The normal IP stack performs this validation in ip_rcv_core(), but IPTFS extracts and processes inner packets before they reach that layer.