{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T17:55:40.540","vulnerabilities":[{"cve":{"id":"CVE-2025-24194","sourceIdentifier":"product-security@apple.com","published":"2025-03-31T23:15:17.807","lastModified":"2026-04-02T19:19:16.497","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A logic issue was addressed with improved checks. This issue is fixed in iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, tvOS 18.4, visionOS 2.4, watchOS 11.4. Processing maliciously crafted web content may result in the disclosure of process memory."},{"lang":"es","value":"Se solucionó un problema lógico mejorando las comprobaciones. Este problema se solucionó en visionOS 2.4, iOS 18.4 y iPadOS 18.4, tvOS 18.4 y macOS Sequoia 15.4. El procesamiento de contenido web malintencionado puede provocar la divulgación de memoria del proceso."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionEndExcluding":"18.4","matchCriteriaId":"6B3450F7-7B4A-46CE-A6E0-BBE6569F2EBF"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndExcluding":"18.4","matchCriteriaId":"0D9C73F9-FEF4-4FC1-B83D-56566AD35990"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0","versionEndExcluding":"15.4","matchCriteriaId":"1320B815-0457-4276-83B9-AFAFDAF17EDA"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","versionEndExcluding":"18.4","matchCriteriaId":"8C61CCC2-87D3-4A3A-837B-63C48299A7AD"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*","versionEndExcluding":"2.4","matchCriteriaId":"E82603D7-A630-4B9B-9C51-880667F05EC7"}]}]}],"references":[{"url":"https://support.apple.com/en-us/122371","source":"product-security@apple.com","tags":["Vendor Advisory"]},{"url":"https://support.apple.com/en-us/122373","source":"product-security@apple.com","tags":["Vendor Advisory"]},{"url":"https://support.apple.com/en-us/122376","source":"product-security@apple.com"},{"url":"https://support.apple.com/en-us/122377","source":"product-security@apple.com","tags":["Vendor Advisory"]},{"url":"https://support.apple.com/en-us/122378","source":"product-security@apple.com","tags":["Vendor Advisory"]},{"url":"http://seclists.org/fulldisclosure/2025/Apr/11","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://seclists.org/fulldisclosure/2025/Apr/12","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://seclists.org/fulldisclosure/2025/Apr/13","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://seclists.org/fulldisclosure/2025/Apr/4","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://seclists.org/fulldisclosure/2025/Apr/8","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}