Apple Macos

CVSS Base Metrics

Access Vector (AV)

The access vector (AV) shows how a vulnerability may be exploited.

Access Complexity (AC)

The access complexity (AC) metric describes how easy or difficult it is to exploit the discovered vulnerability.

Authentication (Au)

The authentication (Au) metric describes the number of times that an attacker must authenticate to a target to exploit it. It does not include (for example) authentication to a network in order to gain access. For locally exploitable vulnerabilities, this value should only be set to Single or Multiple if further authentication is required after initial access.

Attack Vector (AV)

This metric reflects the context by which vulnerability exploitation is possible.

Attack Complexity (AC)

This metric depicts the situations that are not under the attackers control and are required to exploit vulnerability.

Privileges Required (PR)

This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.

User Interaction (UI)

This metric captures the requirement for a user, other than the attacker, to participate in the successful compromise the vulnerable component.

Scope (S)

This metric is a determination on whether a vulnerability in one system or component can have carry over impact on another system or component.

CVSS Impact Metrics

Confidentiality (C)

The confidentiality (C) metric describes the impact on the confidentiality of data processed by the system.

Integrity (I)

The Integrity (I) metric describes the impact on the integrity of the exploited system.

Availability (A)

The availability (A) metric describes the impact on the availability of the target system. Attacks that consume network bandwidth, processor cycles, memory or any other resources affect the availability of a system.

Confidentiality (C)

This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones.

Integrity (I)

This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information.

Availability (A)

This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability. It refers to the loss of availability of the impacted component itself, such as a networked service (e.g., web, database, email). Since availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of an impacted component.

Title CPE22 CPE23 Type Vendor Product Version Update Edition Language SW Edition Target SW Target HW Other
Title CPE22 CPE23 Type Vendor Product Version Update Edition Language SW Edition Target SW Target HW Other
URL Type
https://apple.fandom.com/wiki/Mac_OS_7.5.3 Version
https://apple.fandom.com/wiki/Mac_OS_7.6 Version
https://apple.fandom.com/wiki/Mac_OS_7.6.1 Version
https://apple.fandom.com/wiki/Mac_OS_8 Version
https://apple.fandom.com/wiki/Mac_OS_8.1 Version
https://apple.fandom.com/wiki/Mac_OS_8.5 Version
https://apple.fandom.com/wiki/Mac_OS_8.6 Version
https://apple.fandom.com/wiki/Mac_OS_9 Version
https://developer.apple.com/documentation/macos-release-notes Change Log
https://developer.apple.com/documentation/macos-release-notes/macos-15-release-notes Version
https://developer.apple.com/macos/ Project
https://en.wikipedia.org/wiki/MacOS_Catalina Product
https://github.com/CVEProject/cvelistV5/blob/main/cves/2024/40xxx/CVE-2024-40786.json Version
https://github.com/skysafe/reblog/tree/main/cve-2023-45866 Advisory
https://support.apple.com/en-us/102791 Advisory
https://support.apple.com/en-us/102796 Advisory
https://support.apple.com/en-us/102804 Advisory
https://support.apple.com/en-us/103006 Advisory
https://support.apple.com/en-us/106339 Change Log
https://support.apple.com/en-us/106356 Advisory
https://support.apple.com/en-us/120900 Advisory
https://support.apple.com/en-us/HT201222 Advisory
https://support.apple.com/en-us/HT201222 Version
https://support.apple.com/en-us/HT211931 Version
https://support.apple.com/en-us/HT212177 Advisory
https://support.apple.com/en-us/HT212177 Version
https://support.apple.com/en-us/HT212325 Advisory
https://support.apple.com/en-us/HT212335 Change Log
https://support.apple.com/en-us/HT212529 Advisory
https://support.apple.com/en-us/HT212600 Version
https://support.apple.com/en-us/HT212602 Change Log
https://support.apple.com/en-us/HT212805 Version
https://support.apple.com/en-us/HT212869 Advisory
https://support.apple.com/en-us/HT212872 Advisory
https://support.apple.com/en-us/HT212979 Advisory
https://support.apple.com/en-us/HT213055 Version
https://support.apple.com/en-us/HT213183 Advisory
https://support.apple.com/en-us/HT213184 Advisory
https://support.apple.com/en-us/HT213185 Advisory
https://support.apple.com/en-us/HT213256 Advisory
https://support.apple.com/en-us/HT213345 Change Log
https://support.apple.com/en-us/HT213443 Advisory
https://support.apple.com/en-us/HT213444 Advisory
https://support.apple.com/en-us/HT213493 Advisory
https://support.apple.com/en-us/HT213494 Advisory
https://support.apple.com/en-us/HT213532 Version
https://support.apple.com/en-us/HT213533 Version
https://support.apple.com/en-us/HT213534 Version
https://support.apple.com/en-us/HT213603 Advisory
https://support.apple.com/en-us/HT213604 Advisory
https://support.apple.com/en-us/HT213605 Advisory
https://support.apple.com/en-us/HT213670 Advisory
https://support.apple.com/en-us/HT213675 Advisory
https://support.apple.com/en-us/HT213677 Advisory
https://support.apple.com/en-us/HT213758 Advisory
https://support.apple.com/en-us/HT213759 Advisory
https://support.apple.com/en-us/HT213760 Advisory
https://support.apple.com/en-us/HT213843 Advisory
https://support.apple.com/en-us/HT213844 Advisory
https://support.apple.com/en-us/HT213845 Advisory
https://support.apple.com/en-us/HT213932 Advisory
https://support.apple.com/en-us/HT213984 Change Log
https://support.apple.com/en-us/HT214036 Advisory
https://support.apple.com/en-us/HT214037 Advisory
https://support.apple.com/en-us/HT214038 Advisory
https://support.apple.com/en-us/HT214048 Advisory
https://support.apple.com/en-us/HT214057 Change Log
https://support.apple.com/en-us/HT214058 Advisory
https://support.apple.com/en-us/HT214061 Advisory
https://support.apple.com/en-us/HT214083 Advisory
https://support.apple.com/en-us/HT214084 Advisory
https://support.apple.com/en-us/HT214085 Advisory
https://support.apple.com/kb/DL2051?locale=en_US Version
https://support.apple.com/kb/DL2085?locale=en_US Version
https://support.apple.com/kb/HT212011 Version
https://www.apple.com/ Vendor
https://www.apple.com/macos/big-sur-preview/ Product
https://www.apple.com/macos/ventura/ Product
https://www.macworld.co.uk/news/macos-big-sur-release-date-3779573/ Advisory
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...