Vulnerabilities (CVE)

Filtered by CWE-200
Total 8217 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-13604 2025-04-07 N/A 7.5 HIGH
The KB Support – Customer Support Ticket & Helpdesk Plugin, Knowledge Base Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.7.4 via the 'kbs' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/kbs directory which can contain file attachments included in support tickets. The vulnerability was partially patched in version 1.7.3.2.
CVE-2024-43046 2025-04-07 N/A 5.5 MEDIUM
There may be information disclosure during memory re-allocation in TZ Secure OS.
CVE-2025-24283 1 Apple 4 Ipados, Iphone Os, Macos and 1 more 2025-04-07 N/A 5.5 MEDIUM
A logging issue was addressed with improved data redaction. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data.
CVE-2025-30424 1 Apple 1 Macos 2025-04-07 N/A 9.8 CRITICAL
A logging issue was addressed with improved data redaction. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Deleting a conversation in Messages may expose user contact information in system logging.
CVE-2025-30426 1 Apple 5 Ipados, Iphone Os, Macos and 2 more 2025-04-07 N/A 9.8 CRITICAL
This issue was addressed with additional entitlement checks. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may be able to enumerate a user's installed apps.
CVE-2025-24217 1 Apple 4 Ipados, Iphone Os, Macos and 1 more 2025-04-07 N/A 5.5 MEDIUM
This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data.
CVE-2025-24244 1 Apple 4 Ipados, Iphone Os, Macos and 1 more 2025-04-07 N/A 5.5 MEDIUM
The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Processing a maliciously crafted font may result in the disclosure of process memory.
CVE-2025-24246 1 Apple 1 Macos 2025-04-07 N/A 9.8 CRITICAL
An injection issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data.
CVE-2025-24250 1 Apple 1 Macos 2025-04-07 N/A 9.8 CRITICAL
This issue was addressed with improved access restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app acting as a HTTPS proxy could get access to sensitive user data.
CVE-2025-24253 1 Apple 1 Macos 2025-04-07 N/A 9.8 CRITICAL
This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access protected user data.
CVE-2025-24261 1 Apple 1 Macos 2025-04-07 N/A 5.5 MEDIUM
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system.
CVE-2025-24276 1 Apple 1 Macos 2025-04-07 N/A 5.5 MEDIUM
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to access private information.
CVE-2025-30439 1 Apple 4 Ipados, Iphone Os, Macos and 1 more 2025-04-07 N/A 4.6 MEDIUM
The issue was addressed with improved checks. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An attacker with physical access to a locked device may be able to view sensitive user information.
CVE-2025-30443 1 Apple 1 Macos 2025-04-07 N/A 5.5 MEDIUM
A privacy issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data.
CVE-2025-30447 1 Apple 5 Ipados, Iphone Os, Macos and 2 more 2025-04-07 N/A 5.5 MEDIUM
The issue was resolved by sanitizing logging This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access sensitive user data.
CVE-2025-30454 1 Apple 4 Ipados, Iphone Os, Macos and 1 more 2025-04-07 N/A 5.5 MEDIUM
A path handling issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. A malicious app may be able to access private information.
CVE-2025-30455 1 Apple 1 Macos 2025-04-07 N/A 5.5 MEDIUM
The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to access private information.
CVE-2025-3031 1 Mozilla 2 Firefox, Thunderbird 2025-04-07 N/A 6.5 MEDIUM
An attacker could read 32 bits of values spilled onto the stack in a JIT compiled function. This vulnerability affects Firefox < 137 and Thunderbird < 137.
CVE-2024-11088 1 Simple-membership-plugin 1 Simple Membership 2025-04-05 N/A 5.3 MEDIUM
The Simple Membership plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.5.5 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
CVE-2025-23215 2025-04-04 N/A N/A
PMD is an extensible multilanguage static code analyzer. The passphrase for the PMD and PMD Designer release signing keys are included in jar published to Maven Central. The private key itself is not known to have been compromised itself, but given its passphrase is, it must also be considered potentially compromised. As a mitigation, both compromised keys have been revoked so that no future use of the keys are possible. Note, that the published artifacts in Maven Central under the group id net.sourceforge.pmd are not compromised and the signatures are valid.