Vulnerabilities > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2025-01-27 | CVE-2025-24085 | Use After Free vulnerability in Apple products A use after free issue was addressed with improved memory management. | 7.8 |
2025-01-27 | CVE-2025-24107 | Unspecified vulnerability in Apple products A permissions issue was addressed with additional restrictions. | 7.8 |
2025-01-27 | CVE-2025-24118 | Unspecified vulnerability in Apple Ipados and Macos The issue was addressed with improved memory handling. | 7.1 |
2025-01-27 | CVE-2025-24120 | Unspecified vulnerability in Apple Macos This issue was addressed by improved management of object lifetimes. | 7.5 |
2025-01-27 | CVE-2025-24126 | Unspecified vulnerability in Apple products An input validation issue was addressed. low complexity apple | 7.3 |
2025-01-27 | CVE-2025-24129 | Type Confusion vulnerability in Apple products A type confusion issue was addressed with improved checks. | 7.5 |
2025-01-27 | CVE-2025-24135 | Unspecified vulnerability in Apple Macos This issue was addressed with improved message validation. | 7.8 |
2025-01-27 | CVE-2025-24150 | Command Injection vulnerability in Apple products A privacy issue was addressed with improved handling of files. | 8.8 |
2025-01-27 | CVE-2025-24156 | Integer Overflow or Wraparound vulnerability in Apple Macos An integer overflow was addressed through improved input validation. | 7.8 |
2025-01-27 | CVE-2025-24159 | Unspecified vulnerability in Apple products A validation issue was addressed with improved logic. | 7.8 |