Vulnerability Details CVE-2024-44213
An issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.1, macOS Sonoma 14.7.1, macOS Ventura 13.7.1. An attacker in a privileged network position may be able to leak sensitive user information.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 32.4%
CVSS Severity
CVSS v3 Score 5.9
Products affected by CVE-2024-44213
-
-
cpe:2.3:o:apple:macos:1.0
-
cpe:2.3:o:apple:macos:10.15.7
-
cpe:2.3:o:apple:macos:11.0
-
cpe:2.3:o:apple:macos:11.0.1
-
cpe:2.3:o:apple:macos:11.1
-
cpe:2.3:o:apple:macos:11.1.0
-
cpe:2.3:o:apple:macos:11.2
-
cpe:2.3:o:apple:macos:11.2.1
-
cpe:2.3:o:apple:macos:11.3
-
cpe:2.3:o:apple:macos:11.3.1
-
cpe:2.3:o:apple:macos:11.4
-
cpe:2.3:o:apple:macos:11.5
-
cpe:2.3:o:apple:macos:11.5.1
-
cpe:2.3:o:apple:macos:11.6
-
cpe:2.3:o:apple:macos:11.6.1
-
cpe:2.3:o:apple:macos:11.6.2
-
cpe:2.3:o:apple:macos:11.6.3
-
cpe:2.3:o:apple:macos:11.6.5
-
cpe:2.3:o:apple:macos:11.6.6
-
cpe:2.3:o:apple:macos:11.6.7
-
cpe:2.3:o:apple:macos:11.6.8
-
cpe:2.3:o:apple:macos:11.7
-
cpe:2.3:o:apple:macos:11.7.1
-
cpe:2.3:o:apple:macos:11.7.10
-
cpe:2.3:o:apple:macos:11.7.2
-
cpe:2.3:o:apple:macos:11.7.3
-
cpe:2.3:o:apple:macos:11.7.5
-
cpe:2.3:o:apple:macos:11.7.6
-
cpe:2.3:o:apple:macos:11.7.7
-
cpe:2.3:o:apple:macos:11.7.8
-
cpe:2.3:o:apple:macos:11.7.9
-
cpe:2.3:o:apple:macos:12.0
-
cpe:2.3:o:apple:macos:12.0.0
-
cpe:2.3:o:apple:macos:12.0.1
-
cpe:2.3:o:apple:macos:12.1
-
cpe:2.3:o:apple:macos:12.2
-
cpe:2.3:o:apple:macos:12.2.1
-
cpe:2.3:o:apple:macos:12.3
-
cpe:2.3:o:apple:macos:12.3.1
-
cpe:2.3:o:apple:macos:12.4
-
cpe:2.3:o:apple:macos:12.5
-
cpe:2.3:o:apple:macos:12.5.1
-
cpe:2.3:o:apple:macos:12.6
-
cpe:2.3:o:apple:macos:12.6.1
-
cpe:2.3:o:apple:macos:12.6.2
-
cpe:2.3:o:apple:macos:12.6.3
-
cpe:2.3:o:apple:macos:12.6.4
-
cpe:2.3:o:apple:macos:12.6.5
-
cpe:2.3:o:apple:macos:12.6.6
-
cpe:2.3:o:apple:macos:12.6.7
-
cpe:2.3:o:apple:macos:12.6.8
-
cpe:2.3:o:apple:macos:12.6.9
-
cpe:2.3:o:apple:macos:12.7
-
cpe:2.3:o:apple:macos:12.7.1
-
cpe:2.3:o:apple:macos:12.7.2
-
cpe:2.3:o:apple:macos:12.7.3
-
cpe:2.3:o:apple:macos:12.7.4
-
cpe:2.3:o:apple:macos:12.7.5
-
cpe:2.3:o:apple:macos:12.7.6
-
cpe:2.3:o:apple:macos:13.0
-
cpe:2.3:o:apple:macos:13.0.0
-
cpe:2.3:o:apple:macos:13.0.1
-
cpe:2.3:o:apple:macos:13.1
-
cpe:2.3:o:apple:macos:13.2
-
cpe:2.3:o:apple:macos:13.2.1
-
cpe:2.3:o:apple:macos:13.3
-
cpe:2.3:o:apple:macos:13.3.1
-
cpe:2.3:o:apple:macos:13.3.3
-
cpe:2.3:o:apple:macos:13.4
-
cpe:2.3:o:apple:macos:13.4.1
-
cpe:2.3:o:apple:macos:13.5
-
cpe:2.3:o:apple:macos:13.5.2
-
cpe:2.3:o:apple:macos:13.6
-
cpe:2.3:o:apple:macos:13.6.1
-
cpe:2.3:o:apple:macos:13.6.2
-
cpe:2.3:o:apple:macos:13.6.3
-
cpe:2.3:o:apple:macos:13.6.4
-
cpe:2.3:o:apple:macos:13.6.5
-
cpe:2.3:o:apple:macos:13.6.6
-
cpe:2.3:o:apple:macos:13.6.7
-
cpe:2.3:o:apple:macos:13.6.8
-
cpe:2.3:o:apple:macos:13.7
-
cpe:2.3:o:apple:macos:14.0
-
cpe:2.3:o:apple:macos:14.1
-
cpe:2.3:o:apple:macos:14.1.1
-
cpe:2.3:o:apple:macos:14.1.2
-
cpe:2.3:o:apple:macos:14.2
-
cpe:2.3:o:apple:macos:14.2.1
-
cpe:2.3:o:apple:macos:14.3
-
cpe:2.3:o:apple:macos:14.4
-
cpe:2.3:o:apple:macos:14.4.1
-
cpe:2.3:o:apple:macos:14.5
-
cpe:2.3:o:apple:macos:14.6
-
cpe:2.3:o:apple:macos:14.7
-
cpe:2.3:o:apple:macos:7.5.3
-
cpe:2.3:o:apple:macos:7.6
-
cpe:2.3:o:apple:macos:7.6.1
-
cpe:2.3:o:apple:macos:8.0
-
cpe:2.3:o:apple:macos:8.1
-
cpe:2.3:o:apple:macos:8.5
-
cpe:2.3:o:apple:macos:8.6
-
-
cpe:2.3:o:apple:macos:9.0