mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2025-03-31T23:55:20.112939+00:00
This commit is contained in:
parent
d1342cd785
commit
7fbbeb2c82
25
CVE-2024/CVE-2024-408xx/CVE-2024-40864.json
Normal file
25
CVE-2024/CVE-2024-408xx/CVE-2024-40864.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-40864",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:15.157",
|
||||
"lastModified": "2025-03-31T23:15:15.157",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved handling of protocols. This issue is fixed in macOS Ventura 13.7.5, macOS Sonoma 14.7.5. An attacker in a privileged network position can track a user's activity."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-545xx/CVE-2024-54533.json
Normal file
25
CVE-2024/CVE-2024-545xx/CVE-2024-54533.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-54533",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:16.027",
|
||||
"lastModified": "2025-03-31T23:15:16.027",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sonoma 14.7.5. An app may be able to access sensitive user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-240xx/CVE-2025-24095.json
Normal file
25
CVE-2025/CVE-2025-240xx/CVE-2025-24095.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-24095",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:16.117",
|
||||
"lastModified": "2025-03-31T23:15:16.117",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with additional entitlement checks. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4. An app may be able to bypass Privacy preferences."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-240xx/CVE-2025-24097.json
Normal file
33
CVE-2025/CVE-2025-240xx/CVE-2025-24097.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-24097",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:16.213",
|
||||
"lastModified": "2025-03-31T23:15:16.213",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to read arbitrary file metadata."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-241xx/CVE-2025-24148.json
Normal file
29
CVE-2025/CVE-2025-241xx/CVE-2025-24148.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24148",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:16.300",
|
||||
"lastModified": "2025-03-31T23:15:16.300",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved handling of executable types. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious JAR file may bypass Gatekeeper checks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-241xx/CVE-2025-24157.json
Normal file
29
CVE-2025/CVE-2025-241xx/CVE-2025-24157.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24157",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:16.397",
|
||||
"lastModified": "2025-03-31T23:15:16.397",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause unexpected system termination or corrupt kernel memory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-241xx/CVE-2025-24164.json
Normal file
29
CVE-2025/CVE-2025-241xx/CVE-2025-24164.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24164",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:16.487",
|
||||
"lastModified": "2025-03-31T23:15:16.487",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-241xx/CVE-2025-24167.json
Normal file
29
CVE-2025/CVE-2025-241xx/CVE-2025-24167.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24167",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:16.583",
|
||||
"lastModified": "2025-03-31T23:15:16.583",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed through improved state management. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. A download's origin may be incorrectly associated."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122379",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-241xx/CVE-2025-24170.json
Normal file
25
CVE-2025/CVE-2025-241xx/CVE-2025-24170.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-24170",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:16.677",
|
||||
"lastModified": "2025-03-31T23:15:16.677",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved file handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sonoma 14.7.5. An app may be able to gain root privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-241xx/CVE-2025-24172.json
Normal file
29
CVE-2025/CVE-2025-241xx/CVE-2025-24172.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24172",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:16.773",
|
||||
"lastModified": "2025-03-31T23:15:16.773",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. \"Block All Remote Content\" may not apply for all mail previews."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2025/CVE-2025-241xx/CVE-2025-24173.json
Normal file
45
CVE-2025/CVE-2025-241xx/CVE-2025-24173.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2025-24173",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:16.880",
|
||||
"lastModified": "2025-03-31T23:15:16.880",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with additional entitlement checks. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
41
CVE-2025/CVE-2025-241xx/CVE-2025-24178.json
Normal file
41
CVE-2025/CVE-2025-241xx/CVE-2025-24178.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2025-24178",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:16.983",
|
||||
"lastModified": "2025-03-31T23:15:16.983",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-241xx/CVE-2025-24180.json
Normal file
33
CVE-2025/CVE-2025-241xx/CVE-2025-24180.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-24180",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:17.083",
|
||||
"lastModified": "2025-03-31T23:15:17.083",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved input validation. This issue is fixed in Safari 18.4, visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. A malicious website may be able to claim WebAuthn credentials from another website that shares a registrable suffix."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122379",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-241xx/CVE-2025-24181.json
Normal file
29
CVE-2025/CVE-2025-241xx/CVE-2025-24181.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24181",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:17.173",
|
||||
"lastModified": "2025-03-31T23:15:17.173",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access protected user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-241xx/CVE-2025-24182.json
Normal file
33
CVE-2025/CVE-2025-241xx/CVE-2025-24182.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-24182",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:17.277",
|
||||
"lastModified": "2025-03-31T23:15:17.277",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. Processing a maliciously crafted font may result in the disclosure of process memory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2025/CVE-2025-241xx/CVE-2025-24190.json
Normal file
45
CVE-2025/CVE-2025-241xx/CVE-2025-24190.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2025-24190",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:17.370",
|
||||
"lastModified": "2025-03-31T23:15:17.370",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Processing a maliciously crafted video file may lead to unexpected app termination or corrupt process memory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-241xx/CVE-2025-24191.json
Normal file
21
CVE-2025/CVE-2025-241xx/CVE-2025-24191.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-24191",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:17.470",
|
||||
"lastModified": "2025-03-31T23:15:17.470",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved validation of environment variables. This issue is fixed in macOS Sequoia 15.4. An app may be able to modify protected parts of the file system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-241xx/CVE-2025-24192.json
Normal file
33
CVE-2025/CVE-2025-241xx/CVE-2025-24192.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-24192",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:17.567",
|
||||
"lastModified": "2025-03-31T23:15:17.567",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A script imports issue was addressed with improved isolation. This issue is fixed in Safari 18.4, visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. Visiting a website may leak sensitive data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122379",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-241xx/CVE-2025-24193.json
Normal file
21
CVE-2025/CVE-2025-241xx/CVE-2025-24193.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-24193",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:17.703",
|
||||
"lastModified": "2025-03-31T23:15:17.703",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved authentication. This issue is fixed in iOS 18.4 and iPadOS 18.4. An attacker with a USB-C connection to an unlocked device may be able to programmatically access photos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-241xx/CVE-2025-24194.json
Normal file
33
CVE-2025/CVE-2025-241xx/CVE-2025-24194.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-24194",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:17.807",
|
||||
"lastModified": "2025-03-31T23:15:17.807",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved checks. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. Processing maliciously crafted web content may result in the disclosure of process memory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-241xx/CVE-2025-24195.json
Normal file
29
CVE-2025/CVE-2025-241xx/CVE-2025-24195.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24195",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:17.903",
|
||||
"lastModified": "2025-03-31T23:15:17.903",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An integer overflow was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A user may be able to elevate privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-241xx/CVE-2025-24196.json
Normal file
25
CVE-2025/CVE-2025-241xx/CVE-2025-24196.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-24196",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.007",
|
||||
"lastModified": "2025-03-31T23:15:18.007",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A type confusion issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker with user privileges may be able to read kernel memory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2025/CVE-2025-241xx/CVE-2025-24198.json
Normal file
37
CVE-2025/CVE-2025-241xx/CVE-2025-24198.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2025-24198",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.103",
|
||||
"lastModified": "2025-03-31T23:15:18.103",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Ventura 13.7.5, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker with physical access may be able to use Siri to access sensitive user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-241xx/CVE-2025-24199.json
Normal file
29
CVE-2025/CVE-2025-241xx/CVE-2025-24199.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24199",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.193",
|
||||
"lastModified": "2025-03-31T23:15:18.193",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An uncontrolled format string issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause a denial-of-service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-242xx/CVE-2025-24202.json
Normal file
25
CVE-2025/CVE-2025-242xx/CVE-2025-24202.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-24202",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.293",
|
||||
"lastModified": "2025-03-31T23:15:18.293",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-242xx/CVE-2025-24203.json
Normal file
33
CVE-2025/CVE-2025-242xx/CVE-2025-24203.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-24203",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.383",
|
||||
"lastModified": "2025-03-31T23:15:18.383",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-242xx/CVE-2025-24204.json
Normal file
21
CVE-2025/CVE-2025-242xx/CVE-2025-24204.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-24204",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.483",
|
||||
"lastModified": "2025-03-31T23:15:18.483",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4. An app may be able to access protected user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2025/CVE-2025-242xx/CVE-2025-24205.json
Normal file
37
CVE-2025/CVE-2025-242xx/CVE-2025-24205.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2025-24205",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.580",
|
||||
"lastModified": "2025-03-31T23:15:18.580",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authorization issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.7.5, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24207.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24207.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24207",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.680",
|
||||
"lastModified": "2025-03-31T23:15:18.680",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to enable iCloud storage features without user consent."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-242xx/CVE-2025-24208.json
Normal file
25
CVE-2025/CVE-2025-242xx/CVE-2025-24208.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-24208",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.773",
|
||||
"lastModified": "2025-03-31T23:15:18.773",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4. Loading a malicious iframe may lead to a cross-site scripting attack."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122379",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2025/CVE-2025-242xx/CVE-2025-24209.json
Normal file
37
CVE-2025/CVE-2025-242xx/CVE-2025-24209.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2025-24209",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.870",
|
||||
"lastModified": "2025-03-31T23:15:18.870",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in tvOS 18.4, Safari 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. Processing maliciously crafted web content may lead to an unexpected process crash."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122379",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2025/CVE-2025-242xx/CVE-2025-24210.json
Normal file
45
CVE-2025/CVE-2025-242xx/CVE-2025-24210.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2025-24210",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.963",
|
||||
"lastModified": "2025-03-31T23:15:18.963",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic error was addressed with improved error handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Parsing an image may lead to disclosure of user information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2025/CVE-2025-242xx/CVE-2025-24211.json
Normal file
45
CVE-2025/CVE-2025-242xx/CVE-2025-24211.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2025-24211",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.087",
|
||||
"lastModified": "2025-03-31T23:15:19.087",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Processing a maliciously crafted video file may lead to unexpected app termination or corrupt process memory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2025/CVE-2025-242xx/CVE-2025-24212.json
Normal file
45
CVE-2025/CVE-2025-242xx/CVE-2025-24212.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2025-24212",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.203",
|
||||
"lastModified": "2025-03-31T23:15:19.203",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved checks. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2025/CVE-2025-242xx/CVE-2025-24213.json
Normal file
37
CVE-2025/CVE-2025-242xx/CVE-2025-24213.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2025-24213",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.300",
|
||||
"lastModified": "2025-03-31T23:15:19.300",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved handling of floats. This issue is fixed in tvOS 18.4, Safari 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. A type confusion issue could lead to memory corruption."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122379",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-242xx/CVE-2025-24214.json
Normal file
33
CVE-2025/CVE-2025-242xx/CVE-2025-24214.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-24214",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.400",
|
||||
"lastModified": "2025-03-31T23:15:19.400",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privacy issue was addressed by not logging contents of text fields. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-242xx/CVE-2025-24215.json
Normal file
33
CVE-2025/CVE-2025-242xx/CVE-2025-24215.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-24215",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.490",
|
||||
"lastModified": "2025-03-31T23:15:19.490",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to access private information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
41
CVE-2025/CVE-2025-242xx/CVE-2025-24216.json
Normal file
41
CVE-2025/CVE-2025-242xx/CVE-2025-24216.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2025-24216",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.593",
|
||||
"lastModified": "2025-03-31T23:15:19.593",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122379",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24217.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24217.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24217",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.697",
|
||||
"lastModified": "2025-03-31T23:15:19.697",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-242xx/CVE-2025-24218.json
Normal file
21
CVE-2025/CVE-2025-242xx/CVE-2025-24218.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-24218",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.793",
|
||||
"lastModified": "2025-03-31T23:15:19.793",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.4. An app may be able to access information about a user's contacts."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24221.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24221.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24221",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.893",
|
||||
"lastModified": "2025-03-31T23:15:19.893",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved data access restriction. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6. Sensitive keychain data may be accessible from an iOS backup."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-242xx/CVE-2025-24226.json
Normal file
21
CVE-2025/CVE-2025-242xx/CVE-2025-24226.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-24226",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.990",
|
||||
"lastModified": "2025-03-31T23:15:19.990",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in Xcode 16.3. A malicious app may be able to access private information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122380",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24228.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24228.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24228",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:20.080",
|
||||
"lastModified": "2025-03-31T23:15:20.080",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to execute arbitrary code with kernel privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24229.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24229.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24229",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:20.180",
|
||||
"lastModified": "2025-03-31T23:15:20.180",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A sandboxed app may be able to access sensitive user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2025/CVE-2025-242xx/CVE-2025-24230.json
Normal file
45
CVE-2025/CVE-2025-242xx/CVE-2025-24230.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2025-24230",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:20.273",
|
||||
"lastModified": "2025-03-31T23:15:20.273",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Playing a malicious audio file may lead to an unexpected app termination."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24231.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24231.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24231",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:20.387",
|
||||
"lastModified": "2025-03-31T23:15:20.387",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24232.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24232.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24232",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:20.480",
|
||||
"lastModified": "2025-03-31T23:15:20.480",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to access arbitrary files."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24233.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24233.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24233",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:20.583",
|
||||
"lastModified": "2025-03-31T23:15:20.583",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to read or write to protected files."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24234.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24234.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24234",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:20.673",
|
||||
"lastModified": "2025-03-31T23:15:20.673",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to gain root privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24235.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24235.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24235",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:20.770",
|
||||
"lastModified": "2025-03-31T23:15:20.770",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A remote attacker may be able to cause unexpected app termination or heap corruption."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-242xx/CVE-2025-24236.json
Normal file
25
CVE-2025/CVE-2025-242xx/CVE-2025-24236.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-24236",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:20.867",
|
||||
"lastModified": "2025-03-31T23:15:20.867",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access sensitive user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
41
CVE-2025/CVE-2025-242xx/CVE-2025-24237.json
Normal file
41
CVE-2025/CVE-2025-242xx/CVE-2025-24237.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2025-24237",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:20.957",
|
||||
"lastModified": "2025-03-31T23:15:20.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow was addressed with improved bounds checking. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause unexpected system termination."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2025/CVE-2025-242xx/CVE-2025-24238.json
Normal file
37
CVE-2025/CVE-2025-242xx/CVE-2025-24238.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2025-24238",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:21.060",
|
||||
"lastModified": "2025-03-31T23:15:21.060",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain elevated privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-242xx/CVE-2025-24239.json
Normal file
21
CVE-2025/CVE-2025-242xx/CVE-2025-24239.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-24239",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:21.157",
|
||||
"lastModified": "2025-03-31T23:15:21.157",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Sequoia 15.4. An app may be able to access protected user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24240.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24240.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24240",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:21.247",
|
||||
"lastModified": "2025-03-31T23:15:21.247",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24241.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24241.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24241",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:21.337",
|
||||
"lastModified": "2025-03-31T23:15:21.337",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A configuration issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to trick a user into copying sensitive data to the pasteboard."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-242xx/CVE-2025-24242.json
Normal file
21
CVE-2025/CVE-2025-242xx/CVE-2025-24242.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-24242",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:21.433",
|
||||
"lastModified": "2025-03-31T23:15:21.433",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.4. An app with root privileges may be able to access private information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2025/CVE-2025-242xx/CVE-2025-24243.json
Normal file
45
CVE-2025/CVE-2025-242xx/CVE-2025-24243.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2025-24243",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:21.520",
|
||||
"lastModified": "2025-03-31T23:15:21.520",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Processing a maliciously crafted file may lead to arbitrary code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
41
CVE-2025/CVE-2025-242xx/CVE-2025-24244.json
Normal file
41
CVE-2025/CVE-2025-242xx/CVE-2025-24244.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2025-24244",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:21.620",
|
||||
"lastModified": "2025-03-31T23:15:21.620",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Processing a maliciously crafted font may result in the disclosure of process memory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-242xx/CVE-2025-24245.json
Normal file
21
CVE-2025/CVE-2025-242xx/CVE-2025-24245.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-24245",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:21.720",
|
||||
"lastModified": "2025-03-31T23:15:21.720",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed by adding a delay between verification code attempts. This issue is fixed in macOS Sequoia 15.4. A malicious app may be able to access a user's saved passwords."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24246.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24246.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24246",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:21.820",
|
||||
"lastModified": "2025-03-31T23:15:21.820",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An injection issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24247.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24247.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24247",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:21.917",
|
||||
"lastModified": "2025-03-31T23:15:21.917",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A type confusion issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker may be able to cause unexpected app termination."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-242xx/CVE-2025-24248.json
Normal file
21
CVE-2025/CVE-2025-242xx/CVE-2025-24248.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-24248",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:21.993",
|
||||
"lastModified": "2025-03-31T23:15:21.993",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.4. An app may be able to enumerate devices that have signed into the user's Apple Account."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24249.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24249.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24249",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.090",
|
||||
"lastModified": "2025-03-31T23:15:22.090",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to check the existence of an arbitrary path on the file system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24250.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24250.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24250",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.187",
|
||||
"lastModified": "2025-03-31T23:15:22.187",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved access restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app acting as a HTTPS proxy could get access to sensitive user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24253.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24253.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24253",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.283",
|
||||
"lastModified": "2025-03-31T23:15:22.283",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access protected user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24254.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24254.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24254",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.380",
|
||||
"lastModified": "2025-03-31T23:15:22.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A user may be able to elevate privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24255.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24255.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24255",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.477",
|
||||
"lastModified": "2025-03-31T23:15:22.477",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A file access issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24256.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24256.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24256",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.570",
|
||||
"lastModified": "2025-03-31T23:15:22.570",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to disclose kernel memory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24257.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24257.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24257",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.673",
|
||||
"lastModified": "2025-03-31T23:15:22.673",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may be able to cause unexpected system termination or write kernel memory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24259.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24259.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24259",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.820",
|
||||
"lastModified": "2025-03-31T23:15:22.820",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with additional entitlement checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to retrieve Safari bookmarks without an entitlement check."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24260.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24260.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24260",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.960",
|
||||
"lastModified": "2025-03-31T23:15:22.960",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker in a privileged position may be able to perform a denial-of-service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24261.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24261.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24261",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:23.060",
|
||||
"lastModified": "2025-03-31T23:15:23.060",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-242xx/CVE-2025-24262.json
Normal file
21
CVE-2025/CVE-2025-242xx/CVE-2025-24262.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-24262",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:23.150",
|
||||
"lastModified": "2025-03-31T23:15:23.150",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.4. A sandboxed app may be able to access sensitive user data in system logs."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-242xx/CVE-2025-24263.json
Normal file
21
CVE-2025/CVE-2025-242xx/CVE-2025-24263.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-24263",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:23.247",
|
||||
"lastModified": "2025-03-31T23:15:23.247",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privacy issue was addressed by moving sensitive data to a protected location. This issue is fixed in macOS Sequoia 15.4. An app may be able to observe unprotected user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
41
CVE-2025/CVE-2025-242xx/CVE-2025-24264.json
Normal file
41
CVE-2025/CVE-2025-242xx/CVE-2025-24264.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2025-24264",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:23.337",
|
||||
"lastModified": "2025-03-31T23:15:23.337",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122379",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24265.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24265.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24265",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:23.437",
|
||||
"lastModified": "2025-03-31T23:15:23.437",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause unexpected system termination."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24266.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24266.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24266",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:23.530",
|
||||
"lastModified": "2025-03-31T23:15:23.530",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause unexpected system termination."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24267.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24267.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24267",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:23.623",
|
||||
"lastModified": "2025-03-31T23:15:23.623",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain root privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-242xx/CVE-2025-24269.json
Normal file
21
CVE-2025/CVE-2025-242xx/CVE-2025-24269.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-24269",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:23.717",
|
||||
"lastModified": "2025-03-31T23:15:23.717",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.4. An app may be able to cause unexpected system termination."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24272.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24272.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24272",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:23.807",
|
||||
"lastModified": "2025-03-31T23:15:23.807",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24273.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24273.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24273",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:23.910",
|
||||
"lastModified": "2025-03-31T23:15:23.910",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause unexpected system termination or corrupt kernel memory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24276.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24276.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24276",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:24.003",
|
||||
"lastModified": "2025-03-31T23:15:24.003",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to access private information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24277.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24277.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24277",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:24.103",
|
||||
"lastModified": "2025-03-31T23:15:24.103",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain root privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24278.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24278.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24278",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:24.197",
|
||||
"lastModified": "2025-03-31T23:15:24.197",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access protected user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24279.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24279.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24279",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:24.293",
|
||||
"lastModified": "2025-03-31T23:15:24.293",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved file handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access contacts."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-242xx/CVE-2025-24280.json
Normal file
25
CVE-2025/CVE-2025-242xx/CVE-2025-24280.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-24280",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:24.383",
|
||||
"lastModified": "2025-03-31T23:15:24.383",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-242xx/CVE-2025-24281.json
Normal file
21
CVE-2025/CVE-2025-242xx/CVE-2025-24281.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-24281",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:24.477",
|
||||
"lastModified": "2025-03-31T23:15:24.477",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved data protection. This issue is fixed in macOS Sequoia 15.4. An app may be able to access sensitive user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-242xx/CVE-2025-24282.json
Normal file
21
CVE-2025/CVE-2025-242xx/CVE-2025-24282.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-24282",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:24.577",
|
||||
"lastModified": "2025-03-31T23:15:24.577",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A library injection issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.4. An app may be able to modify protected parts of the file system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-242xx/CVE-2025-24283.json
Normal file
29
CVE-2025/CVE-2025-242xx/CVE-2025-24283.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-24283",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:24.663",
|
||||
"lastModified": "2025-03-31T23:15:24.663",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logging issue was addressed with improved data redaction. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2025/CVE-2025-266xx/CVE-2025-26683.json
Normal file
63
CVE-2025/CVE-2025-266xx/CVE-2025-26683.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2025-26683",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-03-31T22:15:18.743",
|
||||
"lastModified": "2025-03-31T22:15:18.743",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"exclusively-hosted-service"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper authorization in Azure Playwright allows an unauthorized attacker to elevate privileges over a network."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26683",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-28256",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-28T21:15:17.810",
|
||||
"lastModified": "2025-03-28T21:15:17.810",
|
||||
"lastModified": "2025-03-31T22:15:19.387",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in TOTOLINK A3100R V4.1.2cu.5247_B20211129 allows a remote attacker to execute arbitrary code via the setWebWlanIdx of the file /lib/cste_modules/wireless.so."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en TOTOLINK A3100R V4.1.2cu.5247_B20211129 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del setWebWlanIdx del archivo /lib/cste_modules/wireless.so."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZackSecurity/VulnerReport/blob/cve/totolink/A3100R/1.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ZackSecurity/VulnerReport/blob/cve/totolink/A3100R/1.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-304xx/CVE-2025-30424.json
Normal file
29
CVE-2025/CVE-2025-304xx/CVE-2025-30424.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-30424",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:24.757",
|
||||
"lastModified": "2025-03-31T23:15:24.757",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logging issue was addressed with improved data redaction. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Deleting a conversation in Messages may expose user contact information in system logging."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2025/CVE-2025-304xx/CVE-2025-30425.json
Normal file
37
CVE-2025/CVE-2025-304xx/CVE-2025-30425.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2025-30425",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:24.847",
|
||||
"lastModified": "2025-03-31T23:15:24.847",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed through improved state management. This issue is fixed in tvOS 18.4, Safari 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. A malicious website may be able to track users in Safari private browsing mode."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122379",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2025/CVE-2025-304xx/CVE-2025-30426.json
Normal file
37
CVE-2025/CVE-2025-304xx/CVE-2025-30426.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2025-30426",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:24.940",
|
||||
"lastModified": "2025-03-31T23:15:24.940",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with additional entitlement checks. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may be able to enumerate a user's installed apps."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
41
CVE-2025/CVE-2025-304xx/CVE-2025-30427.json
Normal file
41
CVE-2025/CVE-2025-304xx/CVE-2025-30427.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2025-30427",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:25.037",
|
||||
"lastModified": "2025-03-31T23:15:25.037",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122379",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-304xx/CVE-2025-30428.json
Normal file
25
CVE-2025/CVE-2025-304xx/CVE-2025-30428.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-30428",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:25.133",
|
||||
"lastModified": "2025-03-31T23:15:25.133",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed through improved state management. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6. Photos in the Hidden Photos Album may be viewed without authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2025/CVE-2025-304xx/CVE-2025-30429.json
Normal file
45
CVE-2025/CVE-2025-304xx/CVE-2025-30429.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2025-30429",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:25.220",
|
||||
"lastModified": "2025-03-31T23:15:25.220",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path handling issue was addressed with improved validation. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-304xx/CVE-2025-30430.json
Normal file
29
CVE-2025/CVE-2025-304xx/CVE-2025-30430.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-30430",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:25.313",
|
||||
"lastModified": "2025-03-31T23:15:25.313",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed through improved state management. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. Password autofill may fill in passwords after failing authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122373",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
41
CVE-2025/CVE-2025-304xx/CVE-2025-30432.json
Normal file
41
CVE-2025/CVE-2025-304xx/CVE-2025-30432.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2025-30432",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:25.400",
|
||||
"lastModified": "2025-03-31T23:15:25.400",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved state management. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sonoma 14.7.5. A malicious app may be able to attempt passcode entries on a locked device and thereby cause escalating time delays after 4 failures."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122371",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122372",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122374",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122375",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122377",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122378",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user