{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T04:34:27.301","vulnerabilities":[{"cve":{"id":"CVE-2024-44294","sourceIdentifier":"product-security@apple.com","published":"2024-10-28T21:15:08.757","lastModified":"2026-04-02T19:18:37.287","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A path deletion vulnerability was addressed by preventing vulnerable code from running with privileges. This issue is fixed in macOS Sequoia 15.1, macOS Sonoma 14.7.1, macOS Ventura 13.7.1. An attacker with root privileges may be able to delete protected system files."},{"lang":"es","value":"Se solucionó una vulnerabilidad de eliminación de rutas al evitar que el código vulnerable se ejecutara con privilegios. Este problema se solucionó en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Un atacante con privilegios de superusuario podría eliminar archivos de sistema protegidos."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.2},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.2}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionEndExcluding":"13.7.1","matchCriteriaId":"FA438ABE-99D4-49D3-A90A-959B8FDD4012"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0","versionEndExcluding":"14.7.1","matchCriteriaId":"901D36FD-C5D9-428D-BE13-662AC380C9AE"}]}]}],"references":[{"url":"https://support.apple.com/en-us/121564","source":"product-security@apple.com"},{"url":"https://support.apple.com/en-us/121568","source":"product-security@apple.com","tags":["Vendor Advisory"]},{"url":"https://support.apple.com/en-us/121570","source":"product-security@apple.com","tags":["Vendor Advisory"]},{"url":"http://seclists.org/fulldisclosure/2024/Oct/11","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://seclists.org/fulldisclosure/2024/Oct/12","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://seclists.org/fulldisclosure/2024/Oct/13","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}