cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-44298,https://securityvulnerability.io/vulnerability/CVE-2024-44298,Privacy Vulnerability in Apple macOS for User Data Exposure,"CVE-2024-44298 addresses a significant privacy vulnerability within Apple’s macOS Sequoia 15.1. This flaw permits unauthorized applications to access sensitive information regarding a user's contacts, compromising privacy protections. The vulnerability has been mitigated by enhancing private data redaction in log entries. Users are advised to update to the latest version to safeguard their personal data against potential exposure.",Apple,Mac OS,3.3,LOW,0.0004400000034365803,false,false,false,false,,false,false,2024-12-20T04:06:20.221Z,0 CVE-2024-44293,https://securityvulnerability.io/vulnerability/CVE-2024-44293,Privacy Vulnerability Affecting Apple macOS Sequoia Security,"CVE-2024-44293 is a significant privacy vulnerability found in Apple’s macOS Sequoia 15. The flaw occurs due to inadequate redaction of sensitive user data in log entries, potentially allowing malicious actors or unauthorized users to retrieve private information. This issue, identified as high risk, has been addressed in the macOS Sequoia 15.1 update, which enhances the protection of user privacy by improving the handling of log data. Users of affected versions are urged to update their systems promptly to mitigate potential exposure risks.",Apple,Mac OS,5.5,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-12-20T04:06:19.170Z,0 CVE-2024-44211,https://securityvulnerability.io/vulnerability/CVE-2024-44211,Symlink Validation Flaw in Apple's macOS Sequoia Affects Sensitive User Data,"CVE-2024-44211 is a high-risk vulnerability affecting Apple's macOS Sequoia 15.1 that arises from inadequate validation of symbolic links (symlinks). This security flaw could potentially allow malicious applications to gain unauthorized access to sensitive user data, posing a significant risk to user privacy and data integrity. Apple has addressed this vulnerability through improved symlink validation measures in the latest software update.",Apple,Mac OS,5.5,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2024-12-20T04:06:18.132Z,0 CVE-2024-44231,https://securityvulnerability.io/vulnerability/CVE-2024-44231,Physical Access Vulnerability in MacOS Sequoia Affecting Security Management,"CVE-2024-44231 is a high-severity vulnerability affecting macOS Sequoia 15.1 that arises when an attacker with physical access attempts to bypass the system's Login Window during a software update process. The flaw exists due to inadequate state management during software updates, which could potentially allow an unauthorized user to access sensitive information or perform unauthorized actions. Apple has issued a fix in version 15.1 to mitigate this issue. It is critical for users to ensure their systems are updated to safeguard against this vulnerability.",Apple,Mac OS,4.6,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-12-20T04:06:17.087Z,0 CVE-2024-44292,https://securityvulnerability.io/vulnerability/CVE-2024-44292,Privacy Vulnerability Impacting Apple macOS Sequoia 15.1,"CVE-2024-44292 is a high-risk privacy vulnerability discovered in Apple’s macOS Sequoia 15.1. This flaw pertains to insufficient redaction of private data in log entries, potentially allowing malicious applications to access sensitive user information. Apple has addressed this issue in the latest software update, emphasizing the need for users to upgrade immediately to safeguard their personal data from unauthorized access.",Apple,Mac OS,5.5,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2024-12-20T04:06:16.028Z,0 CVE-2024-44195,https://securityvulnerability.io/vulnerability/CVE-2024-44195,Logic Flaw in macOS Sequoia allowing Unauthorized File Access,"CVE-2024-44195 pertains to a significant vulnerability in macOS Sequoia, where a logic issue could allow malicious applications to read arbitrary files from the user’s system. This flaw underscores the importance of proper validation mechanisms within operating system functionalities. Apple has addressed this vulnerability in macOS Sequoia version 15.1, enhancing the validation processes to mitigate the risks associated with unauthorized access. Users are encouraged to update their systems promptly to shield against potential exploits stemming from this vulnerability.",Apple,Mac OS,,,0.0004400000034365803,false,false,false,false,,false,false,2024-12-20T04:06:14.973Z,0 CVE-2024-44223,https://securityvulnerability.io/vulnerability/CVE-2024-44223,Physical Access Vulnerability in macOS Sequoia 15.1,"CVE-2024-44223 is a high-risk vulnerability affecting Apple's macOS Sequoia 15.1. The vulnerability arises due to inadequate state management, which can potentially allow an attacker with physical access to a Mac to view protected content directly from the Login Window. This critical weakness underscores the importance of securing physical access to devices to mitigate such threats. Users are strongly advised to upgrade to the latest version to protect against this vulnerability.",Apple,Mac OS,4.6,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2024-12-20T04:06:13.875Z,0 CVE-2024-54538,https://securityvulnerability.io/vulnerability/CVE-2024-54538,Denial-of-Service Vulnerability in Apple Products Due to Input Validation Issues,"CVE-2024-54538 is a critical denial-of-service vulnerability affecting multiple Apple operating systems. The flaw stems from inadequate input validation, allowing a remote attacker to exploit this vulnerability and potentially disrupt services. Recent updates have addressed this issue, with fixes implemented in visionOS 2.1, iOS 18.1, iPadOS 18.1, iOS 17.7.1, iPadOS 17.7.1, tvOS 18.1, macOS Sonoma 14.7.1, watchOS 11.1, and macOS Ventura 13.7.1. Users are strongly advised to update their devices to mitigate any security risks.",Apple,"Mac OS,iPhone OS,iPad OS,Watch OS,Visionos,TV OS",7.5,HIGH,0.0009299999801442027,false,false,false,false,,false,false,2024-12-20T01:15:00.000Z,0 CVE-2024-54493,https://securityvulnerability.io/vulnerability/CVE-2024-54493,Improper State Management in Apple macOS Sequoia Microphone Access,"A vulnerability in Apple's macOS Sequoia has been identified where privacy indicators related to microphone access may not accurately reflect the state of microphone use. This issue arises due to improper state management, which can lead to confusion for users regarding which applications are actively using their microphone. Corrective measures have been implemented in version 15.2 of macOS Sequoia, enhancing the reliability of privacy indicators and safeguarding user privacy.",Apple,Mac OS,3.3,LOW,0.0004299999854993075,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-44224,https://securityvulnerability.io/vulnerability/CVE-2024-44224,Permissions Vulnerability in Apple macOS Products,"An identified permissions issue in Apple macOS platforms allows a malicious application to potentially acquire root privileges, thereby compromising system security. This vulnerability has been addressed with enhanced restrictions in the following macOS versions: Sequoia 15.2, Ventura 13.7.2, and Sonoma 14.7.2. Users are encouraged to update their systems to mitigate any potential risks associated with unauthorized access.",Apple,Mac OS,7.8,HIGH,0.0005000000237487257,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-54477,https://securityvulnerability.io/vulnerability/CVE-2024-54477,,"The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An app may be able to access user-sensitive data.",Apple,Mac OS,5.5,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-54494,https://securityvulnerability.io/vulnerability/CVE-2024-54494,Race Condition Vulnerability in Apple Products,"This vulnerability arises from a race condition affecting several Apple operating systems, allowing attackers to potentially create a read-only memory mapping that can be written to, undermining data integrity and system reliability. Additional validation measures were implemented in the latest updates to mitigate this issue. Users are encouraged to update their devices to the latest software versions to ensure protection against potential exploitation.",Apple,"Watch OS,TV OS,Visionos,iPhone OS,Mac OS,iPad OS",5.9,MEDIUM,0.0008900000248104334,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-44225,https://securityvulnerability.io/vulnerability/CVE-2024-44225,Logic Issue in Apple iPadOS and macOS Products Leading to Elevated Privileges,"A logic flaw has been identified in various Apple operating systems, including iPadOS, watchOS, tvOS, and macOS. This vulnerability enables unauthorized applications to potentially gain elevated privileges, allowing them to execute actions without the user's consent. Apple has released updates for compromised versions to address this loophole, enhancing the security of the affected systems. It is crucial for users to update their devices to the latest versions to mitigate the risk associated with this vulnerability.",Apple,"TV OS,Mac OS,Watch OS,iPad OS,iOS And iPad OS",7.8,HIGH,0.0005699999746866524,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-44243,https://securityvulnerability.io/vulnerability/CVE-2024-44243,Apple Addresses File System Configuration Issue with macOS Sequoia 15.2 Update,"A configuration issue in Apple macOS Sequoia allows certain applications the ability to modify protected parts of the file system, potentially exposing critical system components and data to unauthorized changes. This vulnerability emphasizes the importance of maintaining strict access controls and ensuring that security practices are in place to protect system integrity. The issue has been addressed in macOS Sequoia 15.2, underscoring the need for users to update their systems to mitigate the risks associated with this configuration flaw.",Apple,Mac OS,5.5,MEDIUM,0.00044999999227002263,false,true,true,true,,true,false,2024-12-12T02:15:00.000Z,1901 CVE-2024-44300,https://securityvulnerability.io/vulnerability/CVE-2024-44300,,"A logic issue was addressed with improved file handling. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An app may be able to access protected user data.",Apple,Mac OS,5.5,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-44291,https://securityvulnerability.io/vulnerability/CVE-2024-44291,Logic Issue in Apple macOS Products Allowing Escalation of Privileges,"A logic issue has been identified in Apple macOS products that impacts file handling protocols. This vulnerability allows a malicious application to exploit the underlying system, potentially granting it root privileges. The issue has been addressed in the latest updates of macOS Sequoia 15.2, macOS Ventura 13.7.2, and macOS Sonoma 14.7.2, highlighting the importance of keeping systems updated to prevent unauthorized access and maintain user security. Users are advised to apply these updates promptly to safeguard their devices from potential exploitation.",Apple,Mac OS,7.8,HIGH,0.0005000000237487257,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-54466,https://securityvulnerability.io/vulnerability/CVE-2024-54466,,"An authorization issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An encrypted volume may be accessed by a different user without prompting for the password.",Apple,Mac OS,5.3,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-44246,https://securityvulnerability.io/vulnerability/CVE-2024-44246,,"The issue was addressed with improved routing of Safari-originated requests. This issue is fixed in macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2, Safari 18.2, iPadOS 17.7.3. On a device with Private Relay enabled, adding a website to the Safari Reading List may reveal the originating IP address to the website.",Apple,"Mac OS,iPad OS,iOS And iPad OS,Safari",5.3,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-44245,https://securityvulnerability.io/vulnerability/CVE-2024-44245,Memory Handling Vulnerability in Apple Products,"A vulnerability related to memory handling has been identified in several Apple products. This issue poses a risk as an app may exploit it to cause unexpected terminations of the system or potentially corrupt kernel memory. Apple has addressed this vulnerability in various updates across its platforms, including iPadOS 17.7.3, visionOS 2.2, macOS Sequoia 15.2, and more. Users and administrators are encouraged to update their devices to ensure protection against this vulnerability.",Apple,"Visionos,Mac OS,iPad OS,iPhone OS",7.1,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-54476,https://securityvulnerability.io/vulnerability/CVE-2024-54476,,"The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An app may be able to access user-sensitive data.",Apple,Mac OS,5.5,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-54527,https://securityvulnerability.io/vulnerability/CVE-2024-54527,Data Access Vulnerability in Apple Products,"A vulnerability present in various Apple operating systems allows unauthorized access to sensitive user data by applications. This issue has been addressed through enhanced verification checks in the latest updates, ensuring that sensitive information is better protected. Users are encouraged to update their devices to the latest versions to mitigate potential privacy risks that arise from this flaw.",Apple,"Watch OS,iPad OS,TV OS,iPhone OS,Mac OS",5.5,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,340 CVE-2024-44201,https://securityvulnerability.io/vulnerability/CVE-2024-44201,,"The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.3, macOS Ventura 13.7.2, iOS 18.1 and iPadOS 18.1, macOS Sonoma 14.7.2. Processing a malicious crafted file may lead to a denial-of-service.",Apple,"iPhone OS,iPad OS,Mac OS",5.5,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-54498,https://securityvulnerability.io/vulnerability/CVE-2024-54498,Path Handling Vulnerability in Apple macOS Products,"A path handling vulnerability has been identified in certain versions of macOS, which may allow an application to escape its sandbox environment. This issue highlights a validation flaw affecting the integrity of path management within the operating system. Apple has released updates to address this vulnerability in macOS Sequoia 15.2, macOS Ventura 13.7.2, and macOS Sonoma 14.7.2 to mitigate the risk of unauthorized access and ensure improved application containment.",Apple,Mac OS,8.8,HIGH,0.0004199999966658652,false,true,false,true,true,false,false,2024-12-12T02:15:00.000Z,1098 CVE-2024-44220,https://securityvulnerability.io/vulnerability/CVE-2024-44220,,"The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.2, macOS Sonoma 14.7.2. Parsing a maliciously crafted video file may lead to unexpected system termination.",Apple,Mac OS,5.5,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0 CVE-2024-54471,https://securityvulnerability.io/vulnerability/CVE-2024-54471,,"This issue was addressed with additional entitlement checks. This issue is fixed in macOS Sonoma 14.7.1, macOS Ventura 13.7.1. A malicious application may be able to leak a user's credentials.",Apple,Mac OS,5.5,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-12-12T02:15:00.000Z,0