cvelist/2021/30xxx/CVE-2021-30890.json

136 lines
5.2 KiB
JSON
Raw Normal View History

2021-04-13 21:00:45 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-30890",
2021-10-28 19:00:59 +00:00
"ASSIGNER": "product-security@apple.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apple",
"product": {
"product_data": [
{
"product_name": "iOS and iPadOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "15.1"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "12.0"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "8.1"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "15.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Processing maliciously crafted web content may lead to universal cross site scripting"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212869",
"name": "https://support.apple.com/en-us/HT212869"
},
{
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212867",
"name": "https://support.apple.com/en-us/HT212867"
},
{
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212874",
"name": "https://support.apple.com/en-us/HT212874"
},
{
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212876",
"name": "https://support.apple.com/en-us/HT212876"
2021-12-20 16:01:05 +00:00
},
{
"refsource": "MLIST",
"name": "[oss-security] 20211220 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0007",
"url": "http://www.openwall.com/lists/oss-security/2021/12/20/6"
2021-12-24 15:01:01 +00:00
},
{
"refsource": "DEBIAN",
"name": "DSA-5030",
"url": "https://www.debian.org/security/2021/dsa-5030"
},
{
"refsource": "DEBIAN",
"name": "DSA-5031",
"url": "https://www.debian.org/security/2021/dsa-5031"
2022-01-23 04:01:04 +00:00
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-25a98f5d55",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/"
2022-02-06 04:01:08 +00:00
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-f7366e60cb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/"
2021-10-28 19:00:59 +00:00
}
]
2021-04-13 21:00:45 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2021-10-28 19:00:59 +00:00
"value": "A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to universal cross site scripting."
2021-04-13 21:00:45 +00:00
}
]
}
}