CVE-2024-44213

An issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An attacker in a privileged network position may be able to leak sensitive user information.
References
Link Resource
https://support.apple.com/en-us/121570 Release Notes Vendor Advisory
https://support.apple.com/en-us/121568 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

30 Oct 2024, 17:19

Type Values Removed Values Added
First Time Apple
Apple macos
CPE cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9
References () https://support.apple.com/en-us/121570 - () https://support.apple.com/en-us/121570 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/121568 - () https://support.apple.com/en-us/121568 - Release Notes, Vendor Advisory
CWE NVD-CWE-noinfo

28 Oct 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-28 21:15

Updated : 2024-10-30 19:35


NVD link : CVE-2024-44213

Mitre link : CVE-2024-44213


JSON object : View

Products Affected

apple

  • macos