{"uuid": "d867413d-9942-4562-8e3e-119440695a35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44309", "type": "exploited", "source": "https://t.me/cvedetector/11554", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44309 - Apple Safari Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-44309 \nPublished : Nov. 20, 2024, 12:15 a.m. | 43\u00a0minutes ago \nDescription : A cookie management issue was addressed with improved state management. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, macOS Sequoia 15.1.1, iOS 18.1.1 and iPadOS 18.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to a cross site scripting attack. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T02:02:32.000000Z"}