A vulnerability, which was classified as problematic, has been found in Apple macOS up to 15.0. This issue affects some unknown processing. The manipulation leads to sensitive information in log files.
This vulnerability is listed as CVE-2024-44292. The attack must be carried out locally. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic has been found in Apple macOS up to 13.6/14.6. Affected by this issue is some unknown functionality. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2024-44289. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Apple watchOS. This issue affects some unknown processing. Executing manipulation can lead to information disclosure.
The identification of this vulnerability is CVE-2024-44290. The attack can only be executed locally. There is no exploit available.
You should upgrade the affected component.
A vulnerability has been found in Apple iOS and iPadOS and classified as problematic. Impacted is an unknown function. The manipulation leads to information disclosure.
This vulnerability is referenced as CVE-2024-44290. The attack can only be performed from a local environment. No exploit is available.
The affected component should be upgraded.
A vulnerability described as critical has been identified in Apple macOS up to 13.6/14.6. The impacted element is an unknown function. The manipulation results in improper access controls.
This vulnerability was named CVE-2024-44287. The attack needs to be approached locally. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in Apple tvOS. It has been declared as problematic. The impacted element is an unknown function of the component Kernel Memory Handler. Executing manipulation can lead to use after free.
This vulnerability is registered as CVE-2024-44285. The attack needs to be launched locally. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple watchOS. It has been rated as problematic. This affects an unknown function of the component Kernel Memory Handler. The manipulation leads to use after free.
This vulnerability is documented as CVE-2024-44285. The attack needs to be performed locally. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability categorized as problematic has been discovered in Apple iOS and iPadOS. This impacts an unknown function of the component Kernel Memory Handler. The manipulation results in use after free.
This vulnerability is reported as CVE-2024-44285. The attack requires a local approach. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability described as critical has been identified in Apple macOS up to 13.6/14.6. Affected by this vulnerability is an unknown functionality of the component File Handler. Executing manipulation can lead to out-of-bounds write.
This vulnerability appears as CVE-2024-44284. The attack requires local access. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in Apple visionOS. It has been classified as problematic. The affected element is an unknown function of the component Kernel Memory Handler. Performing manipulation results in use after free.
This vulnerability is cataloged as CVE-2024-44285. The attack must be initiated from a local position. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Apple macOS up to 13.6/14.6 and classified as problematic. The affected element is an unknown function of the component File Handler. Executing manipulation can lead to out-of-bounds read.
The identification of this vulnerability is CVE-2024-44283. The attack may be launched remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Click2Learn Ingenium Learning Management System 5.1/6.1. It has been declared as problematic. This vulnerability affects unknown code of the file config.txt. Such manipulation leads to information disclosure (Password).
This vulnerability is referenced as CVE-2002-1909. It is possible to launch the attack remotely. No exploit is available.
A vulnerability marked as problematic has been reported in dump. This affects the function flock of the file /etc/dumpdates. This manipulation causes denial of service.
This vulnerability is registered as CVE-2002-1914. The attack needs to be launched locally. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability classified as critical was found in GeekLog 1.3.5 Sr1/1.35. Affected by this vulnerability is an unknown functionality of the component User Profile Handler. Executing manipulation can lead to improper privilege management.
This vulnerability appears as CVE-2002-1917. The attack may be performed from remote. There is no available exploit.
A vulnerability has been found in Datawizard FtpXQ 2.5 and classified as critical. This vulnerability affects unknown code of the component MKD Command Handler. This manipulation causes memory corruption.
This vulnerability is handled as CVE-2002-1920. The attack can be initiated remotely. There is not any exploit available.
A vulnerability categorized as critical has been discovered in Tiny Personal Firewall up to 3.0.6. This affects an unknown function of the component Portscan Handler. The manipulation results in denial of service.
This vulnerability is identified as CVE-2002-1925. The attack can be executed remotely. There is not any exploit available.
A vulnerability marked as problematic has been reported in 602Pro LAN Suite 2002. Affected by this vulnerability is an unknown functionality of the component GET Request Handler. Performing manipulation results in information disclosure (Directory).
This vulnerability is cataloged as CVE-2002-1928. It is possible to initiate the attack remotely. There is no exploit available.