A vulnerability, which was classified as critical, was found in Apple iOS and iPadOS. Affected by this issue is some unknown functionality of the component Shortcut Handler. The manipulation results in improper access controls.
This vulnerability was named CVE-2024-44269. The attack needs to be approached locally. There is no available exploit.
You should upgrade the affected component.
A vulnerability classified as critical was found in Apple macOS. Affected is an unknown function of the component Shortcut Handler. Executing manipulation can lead to improper access controls.
This vulnerability is handled as CVE-2024-44269. It is possible to launch the attack on the local host. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, has been found in Apple visionOS. Affected by this vulnerability is an unknown functionality of the component Shortcut Handler. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2024-44269. Local access is required to approach this attack. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability identified as critical has been detected in Apple macOS up to 13.6/14.6. This issue affects some unknown processing. Performing manipulation results in improper access controls.
This vulnerability is known as CVE-2024-44267. Attacking locally is a requirement. No exploit is available.
You should upgrade the affected component.
A vulnerability identified as problematic has been detected in Apple iOS and iPadOS. The affected element is an unknown function. Performing manipulation results in state issue.
This vulnerability was named CVE-2024-44259. The attack may be initiated remotely. There is no available exploit.
You should upgrade the affected component.
A vulnerability, which was classified as critical, was found in Apple macOS up to 13.6/14.6. The affected element is an unknown function of the component System Files Handler. Such manipulation leads to improper access controls.
This vulnerability is referenced as CVE-2024-44260. The attack can only be performed from a local environment. No exploit is available.
You should upgrade the affected component.
A vulnerability described as critical has been identified in Apple macOS up to 13.6/14.6. This affects an unknown function. Such manipulation leads to symlink following.
This vulnerability is traded as CVE-2024-44264. An attack has to be approached locally. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability classified as critical has been found in Apple macOS up to 13.6/14.6. This impacts an unknown function of the component Game Controller Event Handler. Performing manipulation results in improper access controls.
This vulnerability is known as CVE-2024-44265. The attack may be carried out on the physical device. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability categorized as problematic has been discovered in Apple visionOS. Impacted is an unknown function. Such manipulation leads to state issue.
This vulnerability is uniquely identified as CVE-2024-44259. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability has been found in Apple macOS up to 13.6/14.6 and classified as problematic. Impacted is an unknown function. Performing manipulation results in information disclosure.
This vulnerability was named CVE-2024-44257. The attack needs to be approached locally. There is no available exploit.
The affected component should be upgraded.
A vulnerability categorized as critical has been discovered in Apple macOS up to 13.6/14.6. This affects an unknown part. Executing manipulation can lead to sandbox issue.
This vulnerability is tracked as CVE-2024-44256. The attack is restricted to local execution. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability marked as critical has been reported in Vim up to 9.1.1405. The impacted element is the function clear_tv of the component Vim9 Script Import. Performing manipulation of the argument typval_T results in double free.
This vulnerability is identified as CVE-2025-55158. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in libcsp 2.0. It has been rated as critical. Affected by this vulnerability is the function csp_usart_open of the file drivers/usart/zephyr.c. Performing manipulation results in buffer overflow.
This vulnerability was named CVE-2025-51824. The attack needs to be approached within the local network. There is no available exploit.
It is suggested to install a patch to address this issue.
A vulnerability classified as problematic has been found in ETHER Catalyst::Authentication::Credential::HTTP up to 1.018 on Perl. This impacts an unknown function of the component Data::UUID library. The manipulation leads to generation of predictable numbers or identifiers.
This vulnerability is listed as CVE-2025-40920. The attack may be initiated remotely. There is no available exploit.
Applying a patch is the recommended action to fix this issue.