CVE-2021-30930

A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1. An attacker may be able to track users through their IP address.
Configurations

Configuration 1 (hide)

cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:04

Type Values Removed Values Added
References () https://support.apple.com/en-us/HT212869 - () https://support.apple.com/en-us/HT212869 -

28 Dec 2021, 20:24

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 5.3
References (MISC) https://support.apple.com/en-us/HT212869 - (MISC) https://support.apple.com/en-us/HT212869 - Vendor Advisory
CPE cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

23 Dec 2021, 20:15

Type Values Removed Values Added
References
  • (MISC) https://support.apple.com/en-us/HT212869 -
Summary ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by the CVE program. Notes: none. A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1. An attacker may be able to track users through their IP address.

24 Aug 2021, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-24 19:15

Updated : 2024-11-21 06:04


NVD link : CVE-2021-30930

Mitre link : CVE-2021-30930

CVE.ORG link : CVE-2021-30930


JSON object : View

Products Affected

apple

  • macos