Vulnerability Details CVE-2024-44213
An issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An attacker in a privileged network position may be able to leak sensitive user information.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 25.4%
CVSS Severity
CVSS v3 Score 5.9
Products affected by CVE-2024-44213
-
-
cpe:2.3:o:apple:macos:1.0
-
cpe:2.3:o:apple:macos:10.15.7
-
cpe:2.3:o:apple:macos:11.0
-
cpe:2.3:o:apple:macos:11.0.1
-
cpe:2.3:o:apple:macos:11.1
-
cpe:2.3:o:apple:macos:11.1.0
-
cpe:2.3:o:apple:macos:11.2
-
cpe:2.3:o:apple:macos:11.2.1
-
cpe:2.3:o:apple:macos:11.3
-
cpe:2.3:o:apple:macos:11.3.1
-
cpe:2.3:o:apple:macos:11.4
-
cpe:2.3:o:apple:macos:11.5
-
cpe:2.3:o:apple:macos:11.5.1
-
cpe:2.3:o:apple:macos:11.6
-
cpe:2.3:o:apple:macos:11.6.1
-
cpe:2.3:o:apple:macos:11.6.2
-
cpe:2.3:o:apple:macos:11.6.3
-
cpe:2.3:o:apple:macos:11.6.5
-
cpe:2.3:o:apple:macos:11.6.6
-
cpe:2.3:o:apple:macos:11.6.7
-
cpe:2.3:o:apple:macos:11.6.8
-
cpe:2.3:o:apple:macos:11.7
-
cpe:2.3:o:apple:macos:11.7.1
-
cpe:2.3:o:apple:macos:11.7.10
-
cpe:2.3:o:apple:macos:11.7.2
-
cpe:2.3:o:apple:macos:11.7.3
-
cpe:2.3:o:apple:macos:11.7.5
-
cpe:2.3:o:apple:macos:11.7.6
-
cpe:2.3:o:apple:macos:11.7.7
-
cpe:2.3:o:apple:macos:11.7.8
-
cpe:2.3:o:apple:macos:11.7.9
-
cpe:2.3:o:apple:macos:12.0
-
cpe:2.3:o:apple:macos:12.0.0
-
cpe:2.3:o:apple:macos:12.0.1
-
cpe:2.3:o:apple:macos:12.1
-
cpe:2.3:o:apple:macos:12.2
-
cpe:2.3:o:apple:macos:12.2.1
-
cpe:2.3:o:apple:macos:12.3
-
cpe:2.3:o:apple:macos:12.3.1
-
cpe:2.3:o:apple:macos:12.4
-
cpe:2.3:o:apple:macos:12.5
-
cpe:2.3:o:apple:macos:12.5.1
-
cpe:2.3:o:apple:macos:12.6
-
cpe:2.3:o:apple:macos:12.6.1
-
cpe:2.3:o:apple:macos:12.6.2
-
cpe:2.3:o:apple:macos:12.6.3
-
cpe:2.3:o:apple:macos:12.6.4
-
cpe:2.3:o:apple:macos:12.6.5
-
cpe:2.3:o:apple:macos:12.6.6
-
cpe:2.3:o:apple:macos:12.6.7
-
cpe:2.3:o:apple:macos:12.6.8
-
cpe:2.3:o:apple:macos:12.6.9
-
cpe:2.3:o:apple:macos:12.7
-
cpe:2.3:o:apple:macos:12.7.1
-
cpe:2.3:o:apple:macos:12.7.2
-
cpe:2.3:o:apple:macos:12.7.3
-
cpe:2.3:o:apple:macos:12.7.4
-
cpe:2.3:o:apple:macos:12.7.5
-
cpe:2.3:o:apple:macos:12.7.6
-
cpe:2.3:o:apple:macos:13.0
-
cpe:2.3:o:apple:macos:13.0.0
-
cpe:2.3:o:apple:macos:13.0.1
-
cpe:2.3:o:apple:macos:13.1
-
cpe:2.3:o:apple:macos:13.2
-
cpe:2.3:o:apple:macos:13.2.1
-
cpe:2.3:o:apple:macos:13.3
-
cpe:2.3:o:apple:macos:13.3.1
-
cpe:2.3:o:apple:macos:13.3.3
-
cpe:2.3:o:apple:macos:13.4
-
cpe:2.3:o:apple:macos:13.4.1
-
cpe:2.3:o:apple:macos:13.5
-
cpe:2.3:o:apple:macos:13.5.2
-
cpe:2.3:o:apple:macos:13.6
-
cpe:2.3:o:apple:macos:13.6.1
-
cpe:2.3:o:apple:macos:13.6.2
-
cpe:2.3:o:apple:macos:13.6.3
-
cpe:2.3:o:apple:macos:13.6.4
-
cpe:2.3:o:apple:macos:13.6.5
-
cpe:2.3:o:apple:macos:13.6.6
-
cpe:2.3:o:apple:macos:13.6.7
-
cpe:2.3:o:apple:macos:13.6.8
-
cpe:2.3:o:apple:macos:13.7
-
cpe:2.3:o:apple:macos:14.0
-
cpe:2.3:o:apple:macos:14.1
-
cpe:2.3:o:apple:macos:14.1.1
-
cpe:2.3:o:apple:macos:14.1.2
-
cpe:2.3:o:apple:macos:14.2
-
cpe:2.3:o:apple:macos:14.2.1
-
cpe:2.3:o:apple:macos:14.3
-
cpe:2.3:o:apple:macos:14.4
-
cpe:2.3:o:apple:macos:14.4.1
-
cpe:2.3:o:apple:macos:14.5
-
cpe:2.3:o:apple:macos:14.6
-
cpe:2.3:o:apple:macos:14.7
-
cpe:2.3:o:apple:macos:7.5.3
-
cpe:2.3:o:apple:macos:7.6
-
cpe:2.3:o:apple:macos:7.6.1
-
cpe:2.3:o:apple:macos:8.0
-
cpe:2.3:o:apple:macos:8.1
-
cpe:2.3:o:apple:macos:8.5
-
cpe:2.3:o:apple:macos:8.6
-
-
cpe:2.3:o:apple:macos:9.0