PRIOn Logo

Search KB


Search our pre-analyzed vulnerability database

Total Results: 6955

of 348

Published:   Updated:

Vulnerability Type: Memory corruption

Vendor(s):  Apple
Urgent
Remediate Within one Week
CVSS v2N/ACVSS v38.8

A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.

Published:   Updated:

Vulnerability Type: Input validation

Vendor(s):  Apple
Immediate
Remediate Within 48 Hours
CVSS v2N/ACVSS v36.5

An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

A logic issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.1. An attacker with knowledge of a standard user's credentials can unlock another standard user's locked screen on the same Mac.

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v33.3

A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1. An app may be able to access sensitive user data.

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. Processing a file may lead to unexpected app termination or arbitrary code execution.

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. An app may be able to cause a denial-of-service to Endpoint Security clients.

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

The issue was addressed with improved permissions logic. This issue is fixed in macOS Sonoma 14.1. An app may be able to access sensitive user data.

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

The issue was addressed with improved memory handling. This issue is fixed in iOS 17.1 and iPadOS 17.1, macOS Monterey 12.7.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations.

Published:   Updated:

Vulnerability Type: Authentication flaw

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1. An attacker may be able to access passkeys without authentication.

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.3

This issue was addressed by removing the vulnerable code. This issue is fixed in watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, tvOS 17.1, iOS 17.1 and iPadOS 17.1. A device may be passively tracked by its Wi-Fi MAC address.

Published:   Updated:

Vulnerability Type: Authentication flaw

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.3

An authentication issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1. Photos in the Hidden Photos Album may be viewed without authentication.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. A website may be able to access sensitive user data when resolving symlinks.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.1. An app may be able to access sensitive user data.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1. An app may be able to execute arbitrary code with kernel privileges.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.3

An inconsistent user interface issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.1. Visiting a malicious website may lead to user interface spoofing.

Published:   Updated:

Vulnerability Type: Information disclosure

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.6

This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. An attacker with physical access may be able to use Siri to access sensitive user data.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.8

The issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1. An attacker may be able to execute arbitrary code as root from the Lock Screen.

Published:   Updated:

Vulnerability Type: Information disclosure

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.8

This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1, watchOS 10.1, iOS 17.1 and iPadOS 17.1. An attacker with physical access may be able to use Siri to access sensitive user data.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Apple
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, Safari 17.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Processing web content may lead to a denial-of-service.

of 348