CVE-2022-48503
Apple Multiple Products Unspecified Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
Sunday's security landscape marks a critical federal compliance deadline as 5 CISA KEV vulnerabilities expire TODAY requiring immediate patching for Apple iOS (CVE-2022-48503), Microsoft Windows (CVE-2025-33073), Kentico CMS (CVE-2025-2746, CVE-2025-2747), and Oracle E-Business Suite (CVE-2025-61884). In an unprecedented weekend development, zero critical CVEs (CVSS 9.0+) were disclosed for the first time in months, representing a 100% drop from Saturday's 6 vulnerabilities. However, the 22 high-priority CVEs demand continued vigilance despite the 76% decrease from yesterday's 93 disclosures. Federal agencies face compliance enforcement today while patch availability improved marginally to 21%, leaving 79% of vulnerabilities without vendor-provided fixes as organizations navigate this critical deadline day.
Immediate action: Immediate action: Federal agencies and organizations must deploy emergency patches TODAY for CVE-2022-48503 (Apple iOS), CVE-2025-33073 (Microsoft Windows), CVE-2025-2746/CVE-2025-2747 (Kentico CMS), and CVE-2025-61884 (Oracle E-Business Suite) to meet November 9 federal deadline. Security teams should verify patch deployment, document compliance, and prepare deadline reports before end of business. Organizations unable to patch must implement compensating controls and document exceptions immediately.
Apple Multiple Products Unspecified Vulnerability - Active in CISA KEV catalog.
Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability - Active in CISA KEV catalog.
Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability - Active in CISA KEV catalog.
Microsoft Windows SMB Client Improper Access Control Vulnerability - Active in CISA KEV catalog.
Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability - Active in CISA KEV catalog.
Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability - Active in CISA KEV catalog.
Adobe Commerce and Magento Improper Input Validation Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
Dassault Systèmes DELMIA Apriso Code Injection Vulnerability - Active in CISA KEV catalog.
Dassault Systèmes DELMIA Apriso Missing Authorization Vulnerability - Active in CISA KEV catalog.
Broadcom VMware Aria Operations and VMware Tools Privilege Defined with Unsafe Actions Vulnerability - Active in CISA KEV catalog.
XWiki Platform Eval Injection Vulnerability - Active in CISA KEV catalog.
CWP Control Web Panel OS Command Injection Vulnerability - Active in CISA KEV catalog.
Gladinet CentreStack and Triofox Files or Directories Accessible to External Parties Vulnerability - Active in CISA KEV catalog.
The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3
The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the idonate_donor_password() function in versions 2
Apollo Router Core is a configurable Rust graph router written to run a federated supergraph using Apollo Federation 2
The LC Wizard plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check in the ghl-wizard/inc/wp_user
The Asgaros Forum plugin for WordPress is vulnerable to SQL Injection via the '$_COOKIE['asgarosforum_unread_exclude']' cookie in all versions up to, and including, 3
Improper Authorization in Elastic Cloud Enterprise can lead to Privilege Escalation where the built-in readonly user can call APIs that should not be allowed
The Smart Auto Upload Images plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the auto-image creation functionality in all versions up to, and including, 1
The Better Find and Replace – AI-Powered Suggestions plugin for WordPress is vulnerable to Limited Code Injection in all versions up to, and including, 1
The Mail Mint plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the process_contact_attribute_import function in all versions up to, and including, 1
The Alex Reservations: Smart Restaurant Booking plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the /wp-json/srr/v1/app/upload/file REST endpoint in all versions up to, and including, 2
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'), CWE - 564 - SQL Injection: Hibernate vulnerability in GG Soft Software Services Inc
Dosage is a comic strip downloader and archiver
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application
(conda) Constructor is a tool that enables users to create installers for conda package collections
A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory Corruption vulnerability
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node
A flaw was found in the xmlSetTreeDoc() function of the libxml2 XML parsing library
IBM Db2 12
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline