| CVE ID | CVSS3.1 | Exploitable | Vendor | Product | Vulnerability | Date added |
|---|---|---|---|---|---|---|
| CVE-2026-20700 | 7.8 | True | Apple | Multiple Products | Apple Multiple Buffer Overflow Vulnerability | 2026-02-12 00:00:00 |
| CVE-2026-24858 | 9.4 | True | Fortinet | Multiple Products | Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability | 2026-01-27 00:00:00 |
| CVE-2025-20393 | 10.0 | True | Cisco | Multiple Products | Cisco Multiple Products Improper Input Validation Vulnerability | 2025-12-17 00:00:00 |
| CVE-2025-59718 | 9.1 | True | Fortinet | Multiple Products | Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability | 2025-12-16 00:00:00 |
| CVE-2025-43529 | 8.8 | True | Apple | Multiple Products | Apple Multiple Products Use-After-Free WebKit Vulnerability | 2025-12-15 00:00:00 |
| CVE-2022-48503 | 8.8 | True | Apple | Multiple Products | Apple Multiple Products Unspecified Vulnerability | 2025-10-20 00:00:00 |
| CVE-2010-3765 | 9.8 | True | Mozilla | Multiple Products | Mozilla Multiple Products Remote Code Execution Vulnerability | 2025-10-06 00:00:00 |
| CVE-2025-53690 | 9.0 | True | Sitecore | Multiple Products | Sitecore Multiple Products Deserialization of Untrusted Data Vulnerability | 2025-09-04 00:00:00 |
| CVE-2025-43200 | 4.2 | True | Apple | Multiple Products | Apple Multiple Products Unspecified Vulnerability | 2025-06-16 00:00:00 |
| CVE-2025-32756 | 9.6 | True | Fortinet | Multiple Products | Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability | 2025-05-14 00:00:00 |
| CVE-2025-31200 | 9.8 | True | Apple | Multiple Products | Apple Multiple Products Memory Corruption Vulnerability | 2025-04-17 00:00:00 |
| CVE-2025-31201 | 9.8 | True | Apple | Multiple Products | Apple Multiple Products Arbitrary Read and Write Vulnerability | 2025-04-17 00:00:00 |
| CVE-2025-24201 | 10.0 | True | Apple | Multiple Products | Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability | 2025-03-13 00:00:00 |
| CVE-2025-24085 | 10.0 | True | Apple | Multiple Products | Apple Multiple Products Use-After-Free Vulnerability | 2025-01-29 00:00:00 |
| CVE-2024-55956 | 9.8 | True | Cleo | Multiple Products | Cleo Multiple Products Unauthenticated File Upload Vulnerability | 2024-12-17 00:00:00 |
| CVE-2024-50623 | 9.8 | True | Cleo | Multiple Products | Cleo Multiple Products Unrestricted File Upload Vulnerability | 2024-12-13 00:00:00 |
| CVE-2024-44308 | 8.8 | True | Apple | Multiple Products | Apple Multiple Products Code Execution Vulnerability | 2024-11-21 00:00:00 |
| CVE-2024-44309 | 6.3 | True | Apple | Multiple Products | Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability | 2024-11-21 00:00:00 |
| CVE-2024-23113 | 9.8 | True | Fortinet | Multiple Products | Fortinet Multiple Products Format String Vulnerability | 2024-10-09 00:00:00 |
| CVE-2024-23296 | 7.8 | True | Apple | Multiple Products | Apple Multiple Products Memory Corruption Vulnerability | 2024-03-06 00:00:00 |
| CVE-2024-23225 | 7.8 | True | Apple | Multiple Products | Apple Multiple Products Memory Corruption Vulnerability | 2024-03-06 00:00:00 |
| CVE-2022-48618 | 7.0 | True | Apple | Multiple Products | Apple Multiple Products Memory Corruption Vulnerability | 2024-01-31 00:00:00 |
| CVE-2024-23222 | 8.8 | True | Apple | Multiple Products | Apple Multiple Products WebKit Type Confusion Vulnerability | 2024-01-23 00:00:00 |
| CVE-2023-41990 | 7.8 | True | Apple | Multiple Products | Apple Multiple Products Code Execution Vulnerability | 2024-01-08 00:00:00 |
| CVE-2023-42916 | 6.5 | True | Apple | Multiple Products | Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability | 2023-12-04 00:00:00 |
| CVE-2023-42917 | 8.8 | True | Apple | Multiple Products | Apple Multiple Products WebKit Memory Corruption Vulnerability | 2023-12-04 00:00:00 |
| CVE-2023-41993 | 8.8 | True | Apple | Multiple Products | Apple Multiple Products WebKit Code Execution Vulnerability | 2023-09-25 00:00:00 |
| CVE-2023-41992 | 7.8 | True | Apple | Multiple Products | Apple Multiple Products Kernel Privilege Escalation Vulnerability | 2023-09-25 00:00:00 |
| CVE-2023-41991 | 5.5 | True | Apple | Multiple Products | Apple Multiple Products Improper Certificate Validation Vulnerability | 2023-09-25 00:00:00 |
| CVE-2023-38606 | 5.5 | True | Apple | Multiple Products | Apple Multiple Products Kernel Unspecified Vulnerability | 2023-07-26 00:00:00 |
| CVE-2023-37450 | 8.8 | True | Apple | Multiple Products | Apple Multiple Products WebKit Code Execution Vulnerability | 2023-07-13 00:00:00 |
| CVE-2023-32439 | 8.8 | True | Apple | Multiple Products | Apple Multiple Products WebKit Type Confusion Vulnerability | 2023-06-23 00:00:00 |
| CVE-2023-32435 | 8.8 | True | Apple | Multiple Products | Apple Multiple Products WebKit Memory Corruption Vulnerability | 2023-06-23 00:00:00 |
| CVE-2023-32434 | 7.8 | True | Apple | Multiple Products | Apple Multiple Products Integer Overflow Vulnerability | 2023-06-23 00:00:00 |
| CVE-2023-32373 | 8.8 | True | Apple | Multiple Products | Apple Multiple Products WebKit Use-After-Free Vulnerability | 2023-05-22 00:00:00 |
| CVE-2023-28204 | 6.5 | True | Apple | Multiple Products | Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability | 2023-05-22 00:00:00 |
| CVE-2023-32409 | 8.6 | True | Apple | Multiple Products | Apple Multiple Products WebKit Sandbox Escape Vulnerability | 2023-05-22 00:00:00 |
| CVE-2023-25717 | 9.8 | True | Ruckus Wireless | Multiple Products | Multiple Ruckus Wireless Products CSRF and RCE Vulnerability | 2023-05-12 00:00:00 |
| CVE-2023-28205 | 8.8 | True | Apple | Multiple Products | Apple Multiple Products WebKit Use-After-Free Vulnerability | 2023-04-10 00:00:00 |
| CVE-2023-23529 | 8.8 | True | Apple | Multiple Products | Apple Multiple Products WebKit Type Confusion Vulnerability | 2023-02-14 00:00:00 |
| CVE-2023-22952 | 8.8 | True | SugarCRM | Multiple Products | Multiple SugarCRM Products Remote Code Execution Vulnerability | 2023-02-02 00:00:00 |
| CVE-2018-19320 | 7.8 | True | GIGABYTE | Multiple Products | GIGABYTE Multiple Products Unspecified Vulnerability | 2022-10-24 00:00:00 |
| CVE-2018-19321 | 7.8 | True | GIGABYTE | Multiple Products | GIGABYTE Multiple Products Privilege Escalation Vulnerability | 2022-10-24 00:00:00 |
| CVE-2018-19322 | 7.8 | True | GIGABYTE | Multiple Products | GIGABYTE Multiple Products Code Execution Vulnerability | 2022-10-24 00:00:00 |
| CVE-2018-19323 | 9.8 | True | GIGABYTE | Multiple Products | GIGABYTE Multiple Products Privilege Escalation Vulnerability | 2022-10-24 00:00:00 |
| CVE-2022-40684 | 9.8 | True | Fortinet | Multiple Products | Fortinet Multiple Products Authentication Bypass Vulnerability | 2022-10-11 00:00:00 |
| CVE-2022-22536 | 9.8 | True | SAP | Multiple Products | SAP Multiple Products HTTP Request Smuggling Vulnerability | 2022-08-18 00:00:00 |
| CVE-2018-4344 | 7.8 | True | Apple | Multiple Products | Apple Multiple Products Memory Corruption Vulnerability | 2022-06-27 00:00:00 |
| CVE-2019-8605 | 7.8 | True | Apple | Multiple Products | Apple Multiple Products Use-After-Free Vulnerability | 2022-06-27 00:00:00 |
| CVE-2020-9907 | 7.8 | True | Apple | Multiple Products | Apple Multiple Products Memory Corruption Vulnerability | 2022-06-27 00:00:00 |
| CVE-2020-3837 | 7.8 | True | Apple | Multiple Products | Apple Multiple Products Memory Corruption Vulnerability | 2022-06-27 00:00:00 |
| CVE-2019-7286 | 7.8 | True | Apple | Multiple Products | Apple Multiple Products Memory Corruption Vulnerability | 2022-05-23 00:00:00 |
| CVE-2021-30883 | 7.8 | True | Apple | Multiple Products | Apple Multiple Products Memory Corruption Vulnerability | 2022-05-23 00:00:00 |
| CVE-2019-8506 | 8.8 | True | Apple | Multiple Products | Apple Multiple Products Type Confusion Vulnerability | 2022-05-04 00:00:00 |
| CVE-2021-1789 | 8.8 | True | Apple | Multiple Products | Apple Multiple Products Type Confusion Vulnerability | 2022-05-04 00:00:00 |
| CVE-2022-29464 | 9.8 | True | WSO2 | Multiple Products | WSO2 Multiple Products Unrestrictive Upload of File Vulnerability | 2022-04-25 00:00:00 |
| CVE-2019-3929 | 9.8 | True | Crestron | Multiple Products | Crestron Multiple Products Command Injection Vulnerability | 2022-04-15 00:00:00 |
| CVE-2022-22960 | 7.8 | True | VMware | Multiple Products | VMware Multiple Products Privilege Escalation Vulnerability | 2022-04-15 00:00:00 |
| CVE-2020-29583 | 9.8 | True | Zyxel | Multiple Products | Zyxel Multiple Products Use of Hard-Coded Credentials Vulnerability | 2021-11-03 00:00:00 |
| CVE-2020-4006 | 9.1 | True | VMware | Multiple Products | Multiple VMware Products Command Injection Vulnerability | 2021-11-03 00:00:00 |
| CVE-2020-3950 | 7.8 | True | VMware | Multiple Products | VMware Multiple Products Privilege Escalation Vulnerability | 2021-11-03 00:00:00 |
| CVE-2020-2555 | 9.8 | True | Oracle | Multiple Products | Oracle Multiple Products Remote Code Execution Vulnerability | 2021-11-03 00:00:00 |
| CVE-2020-9859 | 7.8 | True | Apple | Multiple Products | Apple Multiple Products Code Execution Vulnerability | 2021-11-03 00:00:00 |
| CVE-2021-30663 | 7.8 | True | Apple | Multiple Products | Apple Multiple Products WebKit Integer Overflow Vulnerability | 2021-11-03 00:00:00 |
| CVE-2021-30665 | 8.8 | True | Apple | Multiple Products | Apple Multiple Products WebKit Memory Corruption Vulnerability | 2021-11-03 00:00:00 |
| CVE-2021-30661 | 8.8 | True | Apple | Multiple Products | Apple Multiple Products WebKit Storage Use-After-Free Vulnerability | 2021-11-03 00:00:00 |
| CVE-2021-1782 | 7.0 | True | Apple | Multiple Products | Apple Multiple Products Race Condition Vulnerability | 2021-11-03 00:00:00 |
| CVE-2020-27932 | 7.8 | True | Apple | Multiple Products | Apple Multiple Products Type Confusion Vulnerability | 2021-11-03 00:00:00 |
| CVE-2020-27950 | 5.5 | True | Apple | Multiple Products | Apple Multiple Products Memory Initialization Vulnerability | 2021-11-03 00:00:00 |
| CVE-2021-30807 | 7.8 | True | Apple | Multiple Products | Apple Multiple Products Memory Corruption Vulnerability | 2021-11-03 00:00:00 |
| CVE-2020-27930 | 7.8 | True | Apple | Multiple Products | Apple Multiple Products Memory Corruption Vulnerability | 2021-11-03 00:00:00 |
| CVE-2021-30860 | 7.8 | True | Apple | Multiple Products | Apple Multiple Products Integer Overflow Vulnerability | 2021-11-03 00:00:00 |
AVET INS is an owner of VULNDBASE brand and website. This product uses data from the NVD API but is not endorsed or certified by the NVD. See NVD page for more information. CVE is a registered trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE site. CWE is a registered trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE page. KEV (Known Exploited Vulnerabilities) is a catalog maintained by CISA. EUVD is the official EU repository for timely, curated cybersecurity vulnerability intelligence and remediation guidance run by ENISA. DORA (Digital Operational Resilience Act) is and EU directive.
Copyright AVET INS 1997 - 2026