Auto-Update: 2025-03-31T23:55:20.112939+00:00

This commit is contained in:
cad-safe-bot 2025-03-31 23:59:48 +00:00
parent d1342cd785
commit 7fbbeb2c82
180 changed files with 6458 additions and 87 deletions

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-40864",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:15.157",
"lastModified": "2025-03-31T23:15:15.157",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved handling of protocols. This issue is fixed in macOS Ventura 13.7.5, macOS Sonoma 14.7.5. An attacker in a privileged network position can track a user's activity."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-54533",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:16.027",
"lastModified": "2025-03-31T23:15:16.027",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sonoma 14.7.5. An app may be able to access sensitive user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-24095",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:16.117",
"lastModified": "2025-03-31T23:15:16.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with additional entitlement checks. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4. An app may be able to bypass Privacy preferences."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-24097",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:16.213",
"lastModified": "2025-03-31T23:15:16.213",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to read arbitrary file metadata."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24148",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:16.300",
"lastModified": "2025-03-31T23:15:16.300",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved handling of executable types. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious JAR file may bypass Gatekeeper checks."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24157",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:16.397",
"lastModified": "2025-03-31T23:15:16.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause unexpected system termination or corrupt kernel memory."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24164",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:16.487",
"lastModified": "2025-03-31T23:15:16.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24167",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:16.583",
"lastModified": "2025-03-31T23:15:16.583",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed through improved state management. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. A download's origin may be incorrectly associated."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122379",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-24170",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:16.677",
"lastModified": "2025-03-31T23:15:16.677",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved file handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sonoma 14.7.5. An app may be able to gain root privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24172",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:16.773",
"lastModified": "2025-03-31T23:15:16.773",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. \"Block All Remote Content\" may not apply for all mail previews."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2025-24173",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:16.880",
"lastModified": "2025-03-31T23:15:16.880",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with additional entitlement checks. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2025-24178",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:16.983",
"lastModified": "2025-03-31T23:15:16.983",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-24180",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:17.083",
"lastModified": "2025-03-31T23:15:17.083",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved input validation. This issue is fixed in Safari 18.4, visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. A malicious website may be able to claim WebAuthn credentials from another website that shares a registrable suffix."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122379",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24181",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:17.173",
"lastModified": "2025-03-31T23:15:17.173",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access protected user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-24182",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:17.277",
"lastModified": "2025-03-31T23:15:17.277",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. Processing a maliciously crafted font may result in the disclosure of process memory."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2025-24190",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:17.370",
"lastModified": "2025-03-31T23:15:17.370",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Processing a maliciously crafted video file may lead to unexpected app termination or corrupt process memory."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-24191",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:17.470",
"lastModified": "2025-03-31T23:15:17.470",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved validation of environment variables. This issue is fixed in macOS Sequoia 15.4. An app may be able to modify protected parts of the file system."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-24192",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:17.567",
"lastModified": "2025-03-31T23:15:17.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A script imports issue was addressed with improved isolation. This issue is fixed in Safari 18.4, visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. Visiting a website may leak sensitive data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122379",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-24193",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:17.703",
"lastModified": "2025-03-31T23:15:17.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved authentication. This issue is fixed in iOS 18.4 and iPadOS 18.4. An attacker with a USB-C connection to an unlocked device may be able to programmatically access photos."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-24194",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:17.807",
"lastModified": "2025-03-31T23:15:17.807",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved checks. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. Processing maliciously crafted web content may result in the disclosure of process memory."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24195",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:17.903",
"lastModified": "2025-03-31T23:15:17.903",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An integer overflow was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A user may be able to elevate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-24196",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.007",
"lastModified": "2025-03-31T23:15:18.007",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A type confusion issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker with user privileges may be able to read kernel memory."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-24198",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.103",
"lastModified": "2025-03-31T23:15:18.103",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Ventura 13.7.5, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker with physical access may be able to use Siri to access sensitive user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24199",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.193",
"lastModified": "2025-03-31T23:15:18.193",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An uncontrolled format string issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause a denial-of-service."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-24202",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.293",
"lastModified": "2025-03-31T23:15:18.293",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-24203",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.383",
"lastModified": "2025-03-31T23:15:18.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-24204",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.483",
"lastModified": "2025-03-31T23:15:18.483",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4. An app may be able to access protected user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-24205",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.580",
"lastModified": "2025-03-31T23:15:18.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authorization issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.7.5, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24207",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.680",
"lastModified": "2025-03-31T23:15:18.680",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to enable iCloud storage features without user consent."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-24208",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.773",
"lastModified": "2025-03-31T23:15:18.773",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4. Loading a malicious iframe may lead to a cross-site scripting attack."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122379",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-24209",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.870",
"lastModified": "2025-03-31T23:15:18.870",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in tvOS 18.4, Safari 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. Processing maliciously crafted web content may lead to an unexpected process crash."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122379",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2025-24210",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:18.963",
"lastModified": "2025-03-31T23:15:18.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic error was addressed with improved error handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Parsing an image may lead to disclosure of user information."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2025-24211",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.087",
"lastModified": "2025-03-31T23:15:19.087",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Processing a maliciously crafted video file may lead to unexpected app termination or corrupt process memory."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2025-24212",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.203",
"lastModified": "2025-03-31T23:15:19.203",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved checks. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-24213",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.300",
"lastModified": "2025-03-31T23:15:19.300",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved handling of floats. This issue is fixed in tvOS 18.4, Safari 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. A type confusion issue could lead to memory corruption."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122379",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-24214",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.400",
"lastModified": "2025-03-31T23:15:19.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed by not logging contents of text fields. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-24215",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.490",
"lastModified": "2025-03-31T23:15:19.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to access private information."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2025-24216",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.593",
"lastModified": "2025-03-31T23:15:19.593",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122379",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24217",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.697",
"lastModified": "2025-03-31T23:15:19.697",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-24218",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.793",
"lastModified": "2025-03-31T23:15:19.793",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.4. An app may be able to access information about a user's contacts."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24221",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.893",
"lastModified": "2025-03-31T23:15:19.893",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved data access restriction. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6. Sensitive keychain data may be accessible from an iOS backup."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-24226",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.990",
"lastModified": "2025-03-31T23:15:19.990",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in Xcode 16.3. A malicious app may be able to access private information."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122380",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24228",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:20.080",
"lastModified": "2025-03-31T23:15:20.080",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to execute arbitrary code with kernel privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24229",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:20.180",
"lastModified": "2025-03-31T23:15:20.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A sandboxed app may be able to access sensitive user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2025-24230",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:20.273",
"lastModified": "2025-03-31T23:15:20.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Playing a malicious audio file may lead to an unexpected app termination."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24231",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:20.387",
"lastModified": "2025-03-31T23:15:20.387",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24232",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:20.480",
"lastModified": "2025-03-31T23:15:20.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to access arbitrary files."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24233",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:20.583",
"lastModified": "2025-03-31T23:15:20.583",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to read or write to protected files."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24234",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:20.673",
"lastModified": "2025-03-31T23:15:20.673",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to gain root privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24235",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:20.770",
"lastModified": "2025-03-31T23:15:20.770",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A remote attacker may be able to cause unexpected app termination or heap corruption."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-24236",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:20.867",
"lastModified": "2025-03-31T23:15:20.867",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access sensitive user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2025-24237",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:20.957",
"lastModified": "2025-03-31T23:15:20.957",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow was addressed with improved bounds checking. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause unexpected system termination."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-24238",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:21.060",
"lastModified": "2025-03-31T23:15:21.060",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain elevated privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-24239",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:21.157",
"lastModified": "2025-03-31T23:15:21.157",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Sequoia 15.4. An app may be able to access protected user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24240",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:21.247",
"lastModified": "2025-03-31T23:15:21.247",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24241",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:21.337",
"lastModified": "2025-03-31T23:15:21.337",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A configuration issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to trick a user into copying sensitive data to the pasteboard."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-24242",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:21.433",
"lastModified": "2025-03-31T23:15:21.433",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.4. An app with root privileges may be able to access private information."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2025-24243",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:21.520",
"lastModified": "2025-03-31T23:15:21.520",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Processing a maliciously crafted file may lead to arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2025-24244",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:21.620",
"lastModified": "2025-03-31T23:15:21.620",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Processing a maliciously crafted font may result in the disclosure of process memory."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-24245",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:21.720",
"lastModified": "2025-03-31T23:15:21.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed by adding a delay between verification code attempts. This issue is fixed in macOS Sequoia 15.4. A malicious app may be able to access a user's saved passwords."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24246",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:21.820",
"lastModified": "2025-03-31T23:15:21.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An injection issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24247",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:21.917",
"lastModified": "2025-03-31T23:15:21.917",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A type confusion issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker may be able to cause unexpected app termination."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-24248",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:21.993",
"lastModified": "2025-03-31T23:15:21.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.4. An app may be able to enumerate devices that have signed into the user's Apple Account."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24249",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.090",
"lastModified": "2025-03-31T23:15:22.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to check the existence of an arbitrary path on the file system."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24250",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.187",
"lastModified": "2025-03-31T23:15:22.187",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved access restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app acting as a HTTPS proxy could get access to sensitive user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24253",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.283",
"lastModified": "2025-03-31T23:15:22.283",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access protected user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24254",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.380",
"lastModified": "2025-03-31T23:15:22.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A user may be able to elevate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24255",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.477",
"lastModified": "2025-03-31T23:15:22.477",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A file access issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24256",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.570",
"lastModified": "2025-03-31T23:15:22.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to disclose kernel memory."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24257",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.673",
"lastModified": "2025-03-31T23:15:22.673",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may be able to cause unexpected system termination or write kernel memory."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24259",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.820",
"lastModified": "2025-03-31T23:15:22.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with additional entitlement checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to retrieve Safari bookmarks without an entitlement check."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24260",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:22.960",
"lastModified": "2025-03-31T23:15:22.960",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker in a privileged position may be able to perform a denial-of-service."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24261",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:23.060",
"lastModified": "2025-03-31T23:15:23.060",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-24262",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:23.150",
"lastModified": "2025-03-31T23:15:23.150",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.4. A sandboxed app may be able to access sensitive user data in system logs."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-24263",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:23.247",
"lastModified": "2025-03-31T23:15:23.247",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed by moving sensitive data to a protected location. This issue is fixed in macOS Sequoia 15.4. An app may be able to observe unprotected user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2025-24264",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:23.337",
"lastModified": "2025-03-31T23:15:23.337",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122379",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24265",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:23.437",
"lastModified": "2025-03-31T23:15:23.437",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause unexpected system termination."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24266",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:23.530",
"lastModified": "2025-03-31T23:15:23.530",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause unexpected system termination."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24267",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:23.623",
"lastModified": "2025-03-31T23:15:23.623",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain root privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-24269",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:23.717",
"lastModified": "2025-03-31T23:15:23.717",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.4. An app may be able to cause unexpected system termination."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24272",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:23.807",
"lastModified": "2025-03-31T23:15:23.807",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24273",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:23.910",
"lastModified": "2025-03-31T23:15:23.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause unexpected system termination or corrupt kernel memory."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24276",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:24.003",
"lastModified": "2025-03-31T23:15:24.003",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to access private information."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24277",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:24.103",
"lastModified": "2025-03-31T23:15:24.103",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain root privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24278",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:24.197",
"lastModified": "2025-03-31T23:15:24.197",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access protected user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24279",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:24.293",
"lastModified": "2025-03-31T23:15:24.293",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved file handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access contacts."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-24280",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:24.383",
"lastModified": "2025-03-31T23:15:24.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-24281",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:24.477",
"lastModified": "2025-03-31T23:15:24.477",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved data protection. This issue is fixed in macOS Sequoia 15.4. An app may be able to access sensitive user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-24282",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:24.577",
"lastModified": "2025-03-31T23:15:24.577",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A library injection issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.4. An app may be able to modify protected parts of the file system."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-24283",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:24.663",
"lastModified": "2025-03-31T23:15:24.663",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logging issue was addressed with improved data redaction. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2025-26683",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-03-31T22:15:18.743",
"lastModified": "2025-03-31T22:15:18.743",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "secure@microsoft.com",
"tags": [
"exclusively-hosted-service"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper authorization in Azure Playwright allows an unauthorized attacker to elevate privileges over a network."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26683",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-28256",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-28T21:15:17.810",
"lastModified": "2025-03-28T21:15:17.810",
"lastModified": "2025-03-31T22:15:19.387",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in TOTOLINK A3100R V4.1.2cu.5247_B20211129 allows a remote attacker to execute arbitrary code via the setWebWlanIdx of the file /lib/cste_modules/wireless.so."
},
{
"lang": "es",
"value": "Un problema en TOTOLINK A3100R V4.1.2cu.5247_B20211129 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del setWebWlanIdx del archivo /lib/cste_modules/wireless.so."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ZackSecurity/VulnerReport/blob/cve/totolink/A3100R/1.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ZackSecurity/VulnerReport/blob/cve/totolink/A3100R/1.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-30424",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:24.757",
"lastModified": "2025-03-31T23:15:24.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logging issue was addressed with improved data redaction. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Deleting a conversation in Messages may expose user contact information in system logging."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-30425",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:24.847",
"lastModified": "2025-03-31T23:15:24.847",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed through improved state management. This issue is fixed in tvOS 18.4, Safari 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. A malicious website may be able to track users in Safari private browsing mode."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122379",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-30426",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:24.940",
"lastModified": "2025-03-31T23:15:24.940",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with additional entitlement checks. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may be able to enumerate a user's installed apps."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2025-30427",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:25.037",
"lastModified": "2025-03-31T23:15:25.037",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122379",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-30428",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:25.133",
"lastModified": "2025-03-31T23:15:25.133",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed through improved state management. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6. Photos in the Hidden Photos Album may be viewed without authentication."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2025-30429",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:25.220",
"lastModified": "2025-03-31T23:15:25.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A path handling issue was addressed with improved validation. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-30430",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:25.313",
"lastModified": "2025-03-31T23:15:25.313",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed through improved state management. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. Password autofill may fill in passwords after failing authentication."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122373",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2025-30432",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:25.400",
"lastModified": "2025-03-31T23:15:25.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved state management. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sonoma 14.7.5. A malicious app may be able to attempt passcode entries on a locked device and thereby cause escalating time delays after 4 failures."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122372",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122374",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122375",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122377",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122378",
"source": "product-security@apple.com"
}
]
}

Some files were not shown because too many files have changed in this diff Show More