Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-42913 |
This issue was addressed through improved state management. This issue is fixed in macOS Sonoma 14.2. Remote Login sessions may be able to obtain full disk access permissions. Published: March 28, 2024; 12:15:08 PM -0400 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-40390 |
A privacy issue was addressed by moving sensitive data to a protected location. This issue is fixed in macOS Sonoma 14.2. An app may be able to access user-sensitive data. Published: March 28, 2024; 12:15:07 PM -0400 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-20749 |
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Published: February 15, 2024; 8:15:49 AM -0500 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-20748 |
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Published: February 15, 2024; 8:15:49 AM -0500 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-20747 |
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Published: February 15, 2024; 8:15:48 AM -0500 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-20736 |
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Published: February 15, 2024; 8:15:48 AM -0500 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-20735 |
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Published: February 15, 2024; 8:15:48 AM -0500 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-20734 |
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Published: February 15, 2024; 8:15:47 AM -0500 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-20733 |
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an Improper Input Validation vulnerability that could lead to an application denial-of-service. An attacker could leverage this vulnerability to cause the application to crash, resulting in a denial of service. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Published: February 15, 2024; 8:15:47 AM -0500 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-20731 |
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Published: February 15, 2024; 8:15:47 AM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-20730 |
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Published: February 15, 2024; 8:15:47 AM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-20729 |
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Published: February 15, 2024; 8:15:47 AM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-20728 |
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Published: February 15, 2024; 8:15:46 AM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-20727 |
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Published: February 15, 2024; 8:15:46 AM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-20726 |
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Published: February 15, 2024; 8:15:46 AM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-1149 |
Improper Verification of Cryptographic Signature vulnerability in Snow Software Inventory Agent on MacOS, Snow Software Inventory Agent on Windows, Snow Software Inventory Agent on Linux allows File Manipulation through Snow Update Packages.This issue affects Inventory Agent: through 6.12.0; Inventory Agent: through 6.14.5; Inventory Agent: through 6.7.2. Published: February 08, 2024; 8:15:09 AM -0500 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-23746 |
Miro Desktop 0.8.18 on macOS allows local Electron code injection via a complex series of steps that might be usable in some environments (bypass a kTCCServiceSystemPolicyAppBundles requirement via a file copy, an app.app/Contents rename, an asar modification, and a rename back to app.app/Contents). Published: February 01, 2024; 9:15:18 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2024-23739 |
An issue in Discord for macOS version 0.0.291 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. Published: January 27, 2024; 10:15:07 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2024-23743 |
Notion through 3.1.0 on macOS might allow code execution because of RunAsNode and enableNodeClilnspectArguments. NOTE: the vendor states "the attacker must launch the Notion Desktop application with nonstandard flags that turn the Electron-based application into a Node.js execution environment." Published: January 27, 2024; 9:15:08 PM -0500 |
V3.1: 3.3 LOW V2.0:(not available) |
CVE-2024-23738 |
An issue in Postman version 10.22 and before on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. NOTE: the vendor states "we dispute the report's accuracy ... the configuration does not enable remote code execution.." Published: January 27, 2024; 8:15:07 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |