cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-44298,https://securityvulnerability.io/vulnerability/CVE-2024-44298,Privacy Vulnerability in Apple macOS for User Data Exposure,"CVE-2024-44298 addresses a significant privacy vulnerability within Apple’s macOS Sequoia 15.1. This flaw permits unauthorized applications to access sensitive information regarding a user's contacts, compromising privacy protections. The vulnerability has been mitigated by enhancing private data redaction in log entries. Users are advised to update to the latest version to safeguard their personal data against potential exposure.",Apple,Mac OS,3.3,LOW,0.0004400000034365803,false,false,false,false,,false,false,2024-12-20T04:06:20.221Z,0 CVE-2024-44293,https://securityvulnerability.io/vulnerability/CVE-2024-44293,Privacy Vulnerability Affecting Apple macOS Sequoia Security,"CVE-2024-44293 is a significant privacy vulnerability found in Apple’s macOS Sequoia 15. The flaw occurs due to inadequate redaction of sensitive user data in log entries, potentially allowing malicious actors or unauthorized users to retrieve private information. This issue, identified as high risk, has been addressed in the macOS Sequoia 15.1 update, which enhances the protection of user privacy by improving the handling of log data. Users of affected versions are urged to update their systems promptly to mitigate potential exposure risks.",Apple,Mac OS,5.5,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-12-20T04:06:19.170Z,0 CVE-2024-44211,https://securityvulnerability.io/vulnerability/CVE-2024-44211,Symlink Validation Flaw in Apple's macOS Sequoia Affects Sensitive User Data,"CVE-2024-44211 is a high-risk vulnerability affecting Apple's macOS Sequoia 15.1 that arises from inadequate validation of symbolic links (symlinks). This security flaw could potentially allow malicious applications to gain unauthorized access to sensitive user data, posing a significant risk to user privacy and data integrity. Apple has addressed this vulnerability through improved symlink validation measures in the latest software update.",Apple,Mac OS,5.5,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2024-12-20T04:06:18.132Z,0 CVE-2024-44231,https://securityvulnerability.io/vulnerability/CVE-2024-44231,Physical Access Vulnerability in MacOS Sequoia Affecting Security Management,"CVE-2024-44231 is a high-severity vulnerability affecting macOS Sequoia 15.1 that arises when an attacker with physical access attempts to bypass the system's Login Window during a software update process. The flaw exists due to inadequate state management during software updates, which could potentially allow an unauthorized user to access sensitive information or perform unauthorized actions. Apple has issued a fix in version 15.1 to mitigate this issue. It is critical for users to ensure their systems are updated to safeguard against this vulnerability.",Apple,Mac OS,4.6,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-12-20T04:06:17.087Z,0 CVE-2024-44292,https://securityvulnerability.io/vulnerability/CVE-2024-44292,Privacy Vulnerability Impacting Apple macOS Sequoia 15.1,"CVE-2024-44292 is a high-risk privacy vulnerability discovered in Apple’s macOS Sequoia 15.1. This flaw pertains to insufficient redaction of private data in log entries, potentially allowing malicious applications to access sensitive user information. Apple has addressed this issue in the latest software update, emphasizing the need for users to upgrade immediately to safeguard their personal data from unauthorized access.",Apple,Mac OS,5.5,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2024-12-20T04:06:16.028Z,0 CVE-2024-44195,https://securityvulnerability.io/vulnerability/CVE-2024-44195,Logic Flaw in macOS Sequoia allowing Unauthorized File Access,"CVE-2024-44195 pertains to a significant vulnerability in macOS Sequoia, where a logic issue could allow malicious applications to read arbitrary files from the user’s system. This flaw underscores the importance of proper validation mechanisms within operating system functionalities. Apple has addressed this vulnerability in macOS Sequoia version 15.1, enhancing the validation processes to mitigate the risks associated with unauthorized access. Users are encouraged to update their systems promptly to shield against potential exploits stemming from this vulnerability.",Apple,Mac OS,,,0.0004400000034365803,false,false,false,false,,false,false,2024-12-20T04:06:14.973Z,0 CVE-2024-44223,https://securityvulnerability.io/vulnerability/CVE-2024-44223,Physical Access Vulnerability in macOS Sequoia 15.1,"CVE-2024-44223 is a high-risk vulnerability affecting Apple's macOS Sequoia 15.1. The vulnerability arises due to inadequate state management, which can potentially allow an attacker with physical access to a Mac to view protected content directly from the Login Window. This critical weakness underscores the importance of securing physical access to devices to mitigate such threats. Users are strongly advised to upgrade to the latest version to protect against this vulnerability.",Apple,Mac OS,4.6,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2024-12-20T04:06:13.875Z,0 CVE-2024-54538,https://securityvulnerability.io/vulnerability/CVE-2024-54538,Denial-of-Service Vulnerability in Apple Products Due to Input Validation Issues,"CVE-2024-54538 is a critical denial-of-service vulnerability affecting multiple Apple operating systems. The flaw stems from inadequate input validation, allowing a remote attacker to exploit this vulnerability and potentially disrupt services. Recent updates have addressed this issue, with fixes implemented in visionOS 2.1, iOS 18.1, iPadOS 18.1, iOS 17.7.1, iPadOS 17.7.1, tvOS 18.1, macOS Sonoma 14.7.1, watchOS 11.1, and macOS Ventura 13.7.1. Users are strongly advised to update their devices to mitigate any security risks.",Apple,"Mac OS,iPhone OS,iPad OS,Watch OS,Visionos,TV OS",7.5,HIGH,0.0009299999801442027,false,false,false,false,,false,false,2024-12-20T01:15:00.000Z,0 CVE-2024-54471,https://securityvulnerability.io/vulnerability/CVE-2024-54471,,"This issue was addressed with additional entitlement checks. This issue is fixed in macOS Sonoma 14.7.1, macOS Ventura 13.7.1. A malicious application may be able to leak a user's credentials.",Apple,Mac OS,5.5,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-44245,https://securityvulnerability.io/vulnerability/CVE-2024-44245,Memory Handling Vulnerability in Apple Products,"A vulnerability related to memory handling has been identified in several Apple products. This issue poses a risk as an app may exploit it to cause unexpected terminations of the system or potentially corrupt kernel memory. Apple has addressed this vulnerability in various updates across its platforms, including iPadOS 17.7.3, visionOS 2.2, macOS Sequoia 15.2, and more. Users and administrators are encouraged to update their devices to ensure protection against this vulnerability.",Apple,"Visionos,Mac OS,iPad OS,iPhone OS",7.1,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-44248,https://securityvulnerability.io/vulnerability/CVE-2024-44248,,"This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.2, macOS Sonoma 14.7.2. A user with screen sharing access may be able to view another user's screen.",Apple,Mac OS,6.5,MEDIUM,0.0006799999973736703,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-44246,https://securityvulnerability.io/vulnerability/CVE-2024-44246,,"The issue was addressed with improved routing of Safari-originated requests. This issue is fixed in macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2, Safari 18.2, iPadOS 17.7.3. On a device with Private Relay enabled, adding a website to the Safari Reading List may reveal the originating IP address to the website.",Apple,"Mac OS,iPad OS,iOS And iPad OS,Safari",5.3,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-54474,https://securityvulnerability.io/vulnerability/CVE-2024-54474,,"The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An app may be able to access user-sensitive data.",Apple,Mac OS,5.5,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-44300,https://securityvulnerability.io/vulnerability/CVE-2024-44300,,"A logic issue was addressed with improved file handling. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An app may be able to access protected user data.",Apple,Mac OS,5.5,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-54491,https://securityvulnerability.io/vulnerability/CVE-2024-54491,,The issue was resolved by sanitizing logging This issue is fixed in macOS Sequoia 15.2. A malicious application may be able to determine a user's current location.,Apple,Mac OS,3.3,LOW,0.0004400000034365803,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-44225,https://securityvulnerability.io/vulnerability/CVE-2024-44225,Logic Issue in Apple iPadOS and macOS Products Leading to Elevated Privileges,"A logic flaw has been identified in various Apple operating systems, including iPadOS, watchOS, tvOS, and macOS. This vulnerability enables unauthorized applications to potentially gain elevated privileges, allowing them to execute actions without the user's consent. Apple has released updates for compromised versions to address this loophole, enhancing the security of the affected systems. It is crucial for users to update their devices to the latest versions to mitigate the risk associated with this vulnerability.",Apple,"TV OS,Mac OS,Watch OS,iPad OS,iOS And iPad OS",7.8,HIGH,0.0005699999746866524,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-54465,https://securityvulnerability.io/vulnerability/CVE-2024-54465,Logic Issue in macOS Sequoia by Apple Leading to Potential Privilege Escalation,"A logic issue exists in macOS Sequoia, where improper state management can allow an application to elevate its privileges. This vulnerability has been identified and addressed in version 15.2 of macOS Sequoia, ensuring improved security measures are in place. Users are advised to update to the latest version to mitigate the risk of unauthorized access and exploitability by malicious applications.",Apple,Mac OS,9.8,CRITICAL,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-44220,https://securityvulnerability.io/vulnerability/CVE-2024-44220,,"The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.2, macOS Sonoma 14.7.2. Parsing a maliciously crafted video file may lead to unexpected system termination.",Apple,Mac OS,5.5,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-44243,https://securityvulnerability.io/vulnerability/CVE-2024-44243,Apple Addresses File System Configuration Issue with macOS Sequoia 15.2 Update,"A configuration issue in Apple macOS Sequoia allows certain applications the ability to modify protected parts of the file system, potentially exposing critical system components and data to unauthorized changes. This vulnerability emphasizes the importance of maintaining strict access controls and ensuring that security practices are in place to protect system integrity. The issue has been addressed in macOS Sequoia 15.2, underscoring the need for users to update their systems to mitigate the risks associated with this configuration flaw.",Apple,Mac OS,5.5,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-54498,https://securityvulnerability.io/vulnerability/CVE-2024-54498,Path Handling Vulnerability in Apple macOS Products,"A path handling vulnerability has been identified in certain versions of macOS, which may allow an application to escape its sandbox environment. This issue highlights a validation flaw affecting the integrity of path management within the operating system. Apple has released updates to address this vulnerability in macOS Sequoia 15.2, macOS Ventura 13.7.2, and macOS Sonoma 14.7.2 to mitigate the risk of unauthorized access and ensure improved application containment.",Apple,Mac OS,8.8,HIGH,0.0004199999966658652,false,false,false,true,true,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-44224,https://securityvulnerability.io/vulnerability/CVE-2024-44224,Permissions Vulnerability in Apple macOS Products,"An identified permissions issue in Apple macOS platforms allows a malicious application to potentially acquire root privileges, thereby compromising system security. This vulnerability has been addressed with enhanced restrictions in the following macOS versions: Sequoia 15.2, Ventura 13.7.2, and Sonoma 14.7.2. Users are encouraged to update their systems to mitigate any potential risks associated with unauthorized access.",Apple,Mac OS,7.8,HIGH,0.0005000000237487257,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-44291,https://securityvulnerability.io/vulnerability/CVE-2024-44291,Logic Issue in Apple macOS Products Allowing Escalation of Privileges,"A logic issue has been identified in Apple macOS products that impacts file handling protocols. This vulnerability allows a malicious application to exploit the underlying system, potentially granting it root privileges. The issue has been addressed in the latest updates of macOS Sequoia 15.2, macOS Ventura 13.7.2, and macOS Sonoma 14.7.2, highlighting the importance of keeping systems updated to prevent unauthorized access and maintain user security. Users are advised to apply these updates promptly to safeguard their devices from potential exploitation.",Apple,Mac OS,7.8,HIGH,0.0005000000237487257,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-54527,https://securityvulnerability.io/vulnerability/CVE-2024-54527,Data Access Vulnerability in Apple Products,"A vulnerability present in various Apple operating systems allows unauthorized access to sensitive user data by applications. This issue has been addressed through enhanced verification checks in the latest updates, ensuring that sensitive information is better protected. Users are encouraged to update their devices to the latest versions to mitigate potential privacy risks that arise from this flaw.",Apple,"Watch OS,iPad OS,TV OS,iPhone OS,Mac OS",5.5,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,267 CVE-2024-44201,https://securityvulnerability.io/vulnerability/CVE-2024-44201,,"The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.3, macOS Ventura 13.7.2, iOS 18.1 and iPadOS 18.1, macOS Sonoma 14.7.2. Processing a malicious crafted file may lead to a denial-of-service.",Apple,"iPhone OS,iPad OS,Mac OS",5.5,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-54466,https://securityvulnerability.io/vulnerability/CVE-2024-54466,,"An authorization issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An encrypted volume may be accessed by a different user without prompting for the password.",Apple,Mac OS,5.3,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0