Export limit exceeded: 10194 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (10194 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-40836 1 Apple 5 Ipad Os, Ipados, Iphone Os and 2 more 2026-04-02 7.5 High
A logic issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6, watchOS 10.6. A shortcut may be able to use sensitive data with certain actions without prompting the user.
CVE-2024-40823 1 Apple 1 Macos 2026-04-02 5.5 Medium
The issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.7.6, macOS Sonoma 14.6, macOS Ventura 13.6.8. An app may be able to access user-sensitive data.
CVE-2024-40804 1 Apple 1 Macos 2026-04-02 5.5 Medium
The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6. A malicious application may be able to access private information.
CVE-2024-40798 1 Apple 3 Ipados, Iphone Os, Macos 2026-04-02 3.3 Low
This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Monterey 12.7.6, macOS Sonoma 14.6, macOS Ventura 13.6.8. An app may be able to read Safari's browsing history.
CVE-2024-40793 1 Apple 4 Ipados, Iphone Os, Macos and 1 more 2026-04-02 5.5 Medium
This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, iOS 17.6 and iPadOS 17.6, macOS Monterey 12.7.6, macOS Sonoma 14.6, macOS Ventura 13.6.8, watchOS 10.6. An app may be able to access user-sensitive data.
CVE-2024-40775 1 Apple 1 Macos 2026-04-02 5.5 Medium
A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Monterey 12.7.6, macOS Sonoma 14.6, macOS Ventura 13.6.8. An app may be able to leak sensitive user information.
CVE-2024-27884 1 Apple 6 Ipados, Iphone Os, Macos and 3 more 2026-04-02 5.5 Medium
This issue was addressed with a new entitlement. This issue is fixed in iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5, tvOS 17.5, visionOS 1.2, watchOS 10.5. An app may be able to access user-sensitive data.
CVE-2024-27850 1 Apple 6 Ipad Os, Ipados, Iphone Os and 3 more 2026-04-02 6.5 Medium
This issue was addressed with improvements to the noise injection algorithm. This issue is fixed in Safari 17.5, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5, visionOS 1.2. A maliciously crafted webpage may be able to fingerprint the user.
CVE-2024-27838 2 Apple, Redhat 9 Ipados, Iphone Os, Macos and 6 more 2026-04-02 6.5 Medium
The issue was addressed by adding additional logic. This issue is fixed in Safari 17.5, iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5, tvOS 17.5, visionOS 1.2, watchOS 10.5. A maliciously crafted webpage may be able to fingerprint the user.
CVE-2024-27830 1 Apple 7 Ipados, Iphone Os, Macos and 4 more 2026-04-02 6.5 Medium
This issue was addressed through improved state management. This issue is fixed in Safari 17.5, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5, tvOS 17.5, visionOS 1.2, watchOS 10.5. A maliciously crafted webpage may be able to fingerprint the user.
CVE-2024-27814 1 Apple 1 Watchos 2026-04-02 2.4 Low
This issue was addressed through improved state management. This issue is fixed in watchOS 10.5. A person with physical access to a device may be able to view contact information from the lock screen.
CVE-2024-27806 1 Apple 5 Ipados, Iphone Os, Macos and 2 more 2026-04-02 5.5 Medium
This issue was addressed with improved environment sanitization. This issue is fixed in iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Monterey 12.7.5, macOS Sonoma 14.5, macOS Ventura 13.6.7, tvOS 17.5, watchOS 10.5. An app may be able to access sensitive user data.
CVE-2024-23292 1 Apple 3 Ipados, Iphone Os, Macos 2026-04-02 3.3 Low
This issue was addressed with improved data protection. This issue is fixed in iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4. An app may be able to access information about a user's contacts.
CVE-2024-23236 1 Apple 1 Macos 2026-04-02 5.5 Medium
A correctness issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5. An app may be able to read arbitrary files.
CVE-2024-23235 1 Apple 8 Ios, Ipad Os, Ipados and 5 more 2026-04-02 8.1 High
A race condition was addressed with additional validation. This issue is fixed in iOS 16.7.6 and iPadOS 16.7.6, iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, tvOS 17.4, visionOS 1.1, watchOS 10.4. An app may be able to access user-sensitive data.
CVE-2024-23228 1 Apple 3 Ios, Ipados, Iphone Os 2026-04-02 4.3 Medium
This issue was addressed through improved state management. This issue is fixed in iOS 17.3 and iPadOS 17.3. Locked Notes content may have been unexpectedly unlocked.
CVE-2024-23224 1 Apple 1 Macos 2026-04-02 5.5 Medium
The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.3, macOS Ventura 13.6.4. An app may be able to access sensitive user data.
CVE-2024-23207 1 Apple 4 Ipados, Iphone Os, Macos and 1 more 2026-04-02 5.5 Medium
This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 17.3 and iPadOS 17.3, macOS Monterey 12.7.3, macOS Sonoma 14.3, macOS Ventura 13.6.4, watchOS 10.3. An app may be able to access sensitive user data.
CVE-2024-23206 1 Apple 6 Ipados, Iphone Os, Macos and 3 more 2026-04-02 6.5 Medium
An access issue was addressed with improved access restrictions. This issue is fixed in Safari 17.3, iOS 16.7.5 and iPadOS 16.7.5, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, tvOS 17.3, watchOS 10.3. A maliciously crafted webpage may be able to fingerprint the user.
CVE-2026-5413 2026-04-02 3.7 Low
A vulnerability was identified in Newgen OmniDocs up to 12.0.00. Affected by this vulnerability is an unknown functionality of the file /omnidocs/GetWebApiConfiguration. The manipulation of the argument connectionDetails leads to information disclosure. The attack is possible to be carried out remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.