Total
29509 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-44128 | 1 Apple | 1 Macos | 2024-09-25 | N/A | 5.5 MEDIUM |
This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An Automator Quick Action workflow may be able to bypass Gatekeeper. | |||||
CVE-2024-44129 | 1 Apple | 1 Macos | 2024-09-25 | N/A | 5.5 MEDIUM |
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7, macOS Sequoia 15. An app may be able to leak sensitive user information. | |||||
CVE-2024-44135 | 1 Apple | 1 Macos | 2024-09-25 | N/A | 5.5 MEDIUM |
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to access protected files within an App Sandbox container. | |||||
CVE-2024-44176 | 1 Apple | 6 Ipados, Iphone Os, Macos and 3 more | 2024-09-25 | N/A | 5.5 MEDIUM |
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.7, iOS 17.7 and iPadOS 17.7, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 and iPadOS 18, macOS Sonoma 14.7, tvOS 18. Processing an image may lead to a denial-of-service. | |||||
CVE-2024-44191 | 1 Apple | 7 Ipados, Iphone Os, Macos and 4 more | 2024-09-25 | N/A | 5.5 MEDIUM |
This issue was addressed through improved state management. This issue is fixed in iOS 17.7 and iPadOS 17.7, Xcode 16, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 and iPadOS 18, tvOS 18. An app may gain unauthorized access to Bluetooth. | |||||
CVE-2024-47000 | 1 Zitadel | 1 Zitadel | 2024-09-24 | N/A | 7.5 HIGH |
Zitadel is an open source identity management platform. ZITADEL's user account deactivation mechanism did not work correctly with service accounts. Deactivated service accounts retained the ability to request tokens, which could lead to unauthorized access to applications and resources. Versions 2.62.1, 2.61.1, 2.60.2, 2.59.3, 2.58.5, 2.57.5, 2.56.6, 2.55.8, and 2.54.10 have been released which address this issue. Users are advised t upgrade. Users unable to upgrade may instead of deactivating the service account, consider creating new credentials and replacing the old ones wherever they are used. This effectively prevents the deactivated service account from being utilized. Be sure to revoke all existing authentication keys associated with the service account and to rotate the service account's password. | |||||
CVE-2024-46999 | 1 Zitadel | 1 Zitadel | 2024-09-24 | N/A | 6.5 MEDIUM |
Zitadel is an open source identity management platform. ZITADEL's user grants deactivation mechanism did not work correctly. Deactivated user grants were still provided in token, which could lead to unauthorized access to applications and resources. Additionally, the management and auth API always returned the state as active or did not provide any information about the state. Versions 2.62.1, 2.61.1, 2.60.2, 2.59.3, 2.58.5, 2.57.5, 2.56.6, 2.55.8, and 2.54.10 have been released which address this issue. Users are advised to upgrade. Users unable to upgrade may explicitly remove the user grants to make sure the user does not get access anymore. | |||||
CVE-2024-45810 | 1 Envoyproxy | 1 Envoy | 2024-09-24 | N/A | 7.5 HIGH |
Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy will crash when the http async client is handling `sendLocalReply` under some circumstance, e.g., websocket upgrade, and requests mirroring. The http async client will crash during the `sendLocalReply()` in http async client, one reason is http async client is duplicating the status code, another one is the destroy of router is called at the destructor of the async stream, while the stream is deferred deleted at first. There will be problems that the stream decoder is destroyed but its reference is called in `router.onDestroy()`, causing segment fault. This will impact ext_authz if the `upgrade` and `connection` header are allowed, and request mirrorring. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. | |||||
CVE-2024-44183 | 1 Apple | 6 Ipados, Iphone Os, Macos and 3 more | 2024-09-24 | N/A | 5.5 MEDIUM |
A logic error was addressed with improved error handling. This issue is fixed in macOS Ventura 13.7, iOS 17.7 and iPadOS 17.7, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 and iPadOS 18, macOS Sonoma 14.7, tvOS 18. An app may be able to cause a denial-of-service. | |||||
CVE-2024-44180 | 1 Apple | 2 Ipados, Iphone Os | 2024-09-24 | N/A | 2.4 LOW |
The issue was addressed with improved checks. This issue is fixed in iOS 18 and iPadOS 18. An attacker with physical access may be able to access contacts from the lock screen. | |||||
CVE-2024-44184 | 1 Apple | 3 Ipados, Iphone Os, Macos | 2024-09-24 | N/A | 5.5 MEDIUM |
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7, iOS 17.7 and iPadOS 17.7, iOS 18 and iPadOS 18, macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to access user-sensitive data. | |||||
CVE-2024-40866 | 1 Apple | 2 Macos, Safari | 2024-09-24 | N/A | 6.5 MEDIUM |
The issue was addressed with improved UI. This issue is fixed in Safari 18, macOS Sequoia 15. Visiting a malicious website may lead to address bar spoofing. | |||||
CVE-2024-44130 | 1 Apple | 1 Macos | 2024-09-24 | N/A | 4.4 MEDIUM |
This issue was addressed with improved data protection. This issue is fixed in macOS Sequoia 15. An app with root privileges may be able to access private information. | |||||
CVE-2024-44181 | 1 Apple | 1 Macos | 2024-09-24 | N/A | 5.5 MEDIUM |
An issue was addressed with improved handling of temporary files. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to read sensitive location information. | |||||
CVE-2024-44189 | 1 Apple | 1 Macos | 2024-09-24 | N/A | 7.5 HIGH |
The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15. A logic issue existed where a process may be able to capture screen contents without user consent. | |||||
CVE-2024-44139 | 1 Apple | 2 Ipad Os, Iphone Os | 2024-09-24 | N/A | 2.4 LOW |
The issue was addressed with improved checks. This issue is fixed in iOS 18 and iPadOS 18. An attacker with physical access may be able to access contacts from the lock screen. | |||||
CVE-2024-44134 | 1 Apple | 1 Macos | 2024-09-24 | N/A | 5.5 MEDIUM |
This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15. An app may be able to read sensitive location information. | |||||
CVE-2024-44133 | 1 Apple | 1 Macos | 2024-09-24 | N/A | 5.5 MEDIUM |
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15. On MDM managed devices, an app may be able to bypass certain Privacy preferences. | |||||
CVE-2024-44186 | 1 Apple | 1 Macos | 2024-09-24 | N/A | 5.5 MEDIUM |
An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15. An app may be able to access protected user data. | |||||
CVE-2024-44182 | 1 Apple | 1 Macos | 2024-09-24 | N/A | 5.5 MEDIUM |
This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to access sensitive data logged when a shortcut fails to launch another app. |