From 6d8910d878108d7a51a8138b8d159601727e23e0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 5 Mar 2019 11:06:13 -0500 Subject: [PATCH] - Synchronized data. --- 2018/19xxx/CVE-2018-19636.json | 110 +++++++------- 2018/19xxx/CVE-2018-19637.json | 110 +++++++------- 2018/19xxx/CVE-2018-19638.json | 110 +++++++------- 2018/19xxx/CVE-2018-19639.json | 110 +++++++------- 2018/19xxx/CVE-2018-19640.json | 110 +++++++------- 2019/6xxx/CVE-2019-6200.json | 143 +++++++++--------- 2019/6xxx/CVE-2019-6202.json | 173 ++++++++++----------- 2019/6xxx/CVE-2019-6205.json | 173 ++++++++++----------- 2019/6xxx/CVE-2019-6208.json | 173 ++++++++++----------- 2019/6xxx/CVE-2019-6209.json | 203 +++++++++++++------------ 2019/6xxx/CVE-2019-6210.json | 203 +++++++++++++------------ 2019/6xxx/CVE-2019-6211.json | 143 +++++++++--------- 2019/6xxx/CVE-2019-6212.json | 233 +++++++++++++++-------------- 2019/6xxx/CVE-2019-6213.json | 203 +++++++++++++------------ 2019/6xxx/CVE-2019-6214.json | 203 +++++++++++++------------ 2019/6xxx/CVE-2019-6215.json | 233 +++++++++++++++-------------- 2019/6xxx/CVE-2019-6216.json | 263 ++++++++++++++++---------------- 2019/6xxx/CVE-2019-6217.json | 263 ++++++++++++++++---------------- 2019/6xxx/CVE-2019-6218.json | 173 ++++++++++----------- 2019/6xxx/CVE-2019-6219.json | 173 ++++++++++----------- 2019/6xxx/CVE-2019-6220.json | 113 +++++++------- 2019/6xxx/CVE-2019-6221.json | 173 ++++++++++----------- 2019/6xxx/CVE-2019-6223.json | 143 +++++++++--------- 2019/6xxx/CVE-2019-6224.json | 203 +++++++++++++------------ 2019/6xxx/CVE-2019-6225.json | 173 ++++++++++----------- 2019/6xxx/CVE-2019-6226.json | 264 +++++++++++++++++---------------- 2019/6xxx/CVE-2019-6227.json | 263 ++++++++++++++++---------------- 2019/6xxx/CVE-2019-6228.json | 143 +++++++++--------- 2019/6xxx/CVE-2019-6229.json | 233 +++++++++++++++-------------- 2019/6xxx/CVE-2019-6230.json | 203 +++++++++++++------------ 2019/6xxx/CVE-2019-6231.json | 203 +++++++++++++------------ 2019/6xxx/CVE-2019-6233.json | 233 +++++++++++++++-------------- 2019/6xxx/CVE-2019-6234.json | 233 +++++++++++++++-------------- 33 files changed, 3163 insertions(+), 2922 deletions(-) diff --git a/2018/19xxx/CVE-2018-19636.json b/2018/19xxx/CVE-2018-19636.json index ddee47da240..ae6645482c1 100644 --- a/2018/19xxx/CVE-2018-19636.json +++ b/2018/19xxx/CVE-2018-19636.json @@ -1,94 +1,94 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@suse.de", - "DATE_PUBLIC": "2019-02-21T00:00:00.000Z", - "ID": "CVE-2018-19636", - "STATE": "PUBLIC", - "TITLE": "Local root exploit via inclusion of attacker controlled shell script" + "CVE_data_meta" : { + "ASSIGNER" : "security@suse.de", + "DATE_PUBLIC" : "2019-02-21T00:00:00.000Z", + "ID" : "CVE-2018-19636", + "STATE" : "PUBLIC", + "TITLE" : "Local root exploit via inclusion of attacker controlled shell script" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "supportutils", - "version": { - "version_data": [ + "product_name" : "supportutils", + "version" : { + "version_data" : [ { - "affected": "<", - "version_value": "3.1-5.7.1" + "affected" : "<", + "version_value" : "3.1-5.7.1" } ] } } ] }, - "vendor_name": "SUSE" + "vendor_name" : "SUSE" } ] } }, - "credit": [ + "credit" : [ { - "lang": "eng", - "value": "Vítězslav Čížek of SUSE" + "lang" : "eng", + "value" : "Vítězslav Čížek of SUSE" } ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "Supportutils, before version 3.1-5.7.1, when run with command line argument -A searched the file system for a ndspath binary. If an attacker provides one at an arbitrary location it is executed with root privileges " + "lang" : "eng", + "value" : "Supportutils, before version 3.1-5.7.1, when run with command line argument -A searched the file system for a ndspath binary. If an attacker provides one at an arbitrary location it is executed with root privileges" } ] }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 7.3, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", - "version": "3.0" + "impact" : { + "cvss" : { + "attackComplexity" : "LOW", + "attackVector" : "LOCAL", + "availabilityImpact" : "HIGH", + "baseScore" : 7.3, + "baseSeverity" : "HIGH", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "privilegesRequired" : "LOW", + "scope" : "UNCHANGED", + "userInteraction" : "REQUIRED", + "vectorString" : "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version" : "3.0" } }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "CWE-306" + "lang" : "eng", + "value" : "CWE-306" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "name": "https://bugzilla.suse.com/show_bug.cgi?id=1117751", - "refsource": "CONFIRM", - "url": "https://bugzilla.suse.com/show_bug.cgi?id=1117751" + "name" : "https://bugzilla.suse.com/show_bug.cgi?id=1117751", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.suse.com/show_bug.cgi?id=1117751" } ] }, - "source": { - "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1117751", - "defect": [ + "source" : { + "advisory" : "https://bugzilla.suse.com/show_bug.cgi?id=1117751", + "defect" : [ "1117751" ], - "discovery": "INTERNAL" + "discovery" : "INTERNAL" } } diff --git a/2018/19xxx/CVE-2018-19637.json b/2018/19xxx/CVE-2018-19637.json index 0d569474103..59a8b6deee2 100644 --- a/2018/19xxx/CVE-2018-19637.json +++ b/2018/19xxx/CVE-2018-19637.json @@ -1,94 +1,94 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@suse.de", - "DATE_PUBLIC": "2019-02-21T00:00:00.000Z", - "ID": "CVE-2018-19637", - "STATE": "PUBLIC", - "TITLE": "Static temporary filename allows overwriting of files" + "CVE_data_meta" : { + "ASSIGNER" : "security@suse.de", + "DATE_PUBLIC" : "2019-02-21T00:00:00.000Z", + "ID" : "CVE-2018-19637", + "STATE" : "PUBLIC", + "TITLE" : "Static temporary filename allows overwriting of files" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "supportutils", - "version": { - "version_data": [ + "product_name" : "supportutils", + "version" : { + "version_data" : [ { - "affected": "<", - "version_value": "3.1-5.7.1" + "affected" : "<", + "version_value" : "3.1-5.7.1" } ] } } ] }, - "vendor_name": "SUSE" + "vendor_name" : "SUSE" } ] } }, - "credit": [ + "credit" : [ { - "lang": "eng", - "value": "Vítězslav Čížek of SUSE" + "lang" : "eng", + "value" : "Vítězslav Čížek of SUSE" } ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "Supportutils, before version 3.1-5.7.1, wrote data to static file /tmp/supp_log, allowing local attackers to overwrite files on systems without symlink protection" + "lang" : "eng", + "value" : "Supportutils, before version 3.1-5.7.1, wrote data to static file /tmp/supp_log, allowing local attackers to overwrite files on systems without symlink protection" } ] }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "NONE", - "baseScore": 2.8, - "baseSeverity": "LOW", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", - "version": "3.0" + "impact" : { + "cvss" : { + "attackComplexity" : "LOW", + "attackVector" : "LOCAL", + "availabilityImpact" : "NONE", + "baseScore" : 2.8, + "baseSeverity" : "LOW", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "privilegesRequired" : "LOW", + "scope" : "UNCHANGED", + "userInteraction" : "REQUIRED", + "vectorString" : "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "version" : "3.0" } }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "CWE-377" + "lang" : "eng", + "value" : "CWE-377" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "name": "https://bugzilla.suse.com/show_bug.cgi?id=1117776", - "refsource": "CONFIRM", - "url": "https://bugzilla.suse.com/show_bug.cgi?id=1117776" + "name" : "https://bugzilla.suse.com/show_bug.cgi?id=1117776", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.suse.com/show_bug.cgi?id=1117776" } ] }, - "source": { - "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1117776", - "defect": [ + "source" : { + "advisory" : "https://bugzilla.suse.com/show_bug.cgi?id=1117776", + "defect" : [ "1117776" ], - "discovery": "INTERNAL" + "discovery" : "INTERNAL" } } diff --git a/2018/19xxx/CVE-2018-19638.json b/2018/19xxx/CVE-2018-19638.json index cf5036ed396..b00e8b2fd82 100644 --- a/2018/19xxx/CVE-2018-19638.json +++ b/2018/19xxx/CVE-2018-19638.json @@ -1,94 +1,94 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@suse.de", - "DATE_PUBLIC": "2019-02-21T00:00:00.000Z", - "ID": "CVE-2018-19638", - "STATE": "PUBLIC", - "TITLE": "User can overwrite arbitrary log files in support tar" + "CVE_data_meta" : { + "ASSIGNER" : "security@suse.de", + "DATE_PUBLIC" : "2019-02-21T00:00:00.000Z", + "ID" : "CVE-2018-19638", + "STATE" : "PUBLIC", + "TITLE" : "User can overwrite arbitrary log files in support tar" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "supportutils", - "version": { - "version_data": [ + "product_name" : "supportutils", + "version" : { + "version_data" : [ { - "affected": "<", - "version_value": "3.1-5.7.1" + "affected" : "<", + "version_value" : "3.1-5.7.1" } ] } } ] }, - "vendor_name": "SUSE" + "vendor_name" : "SUSE" } ] } }, - "credit": [ + "credit" : [ { - "lang": "eng", - "value": "Johannes Segitz of SUSE" + "lang" : "eng", + "value" : "Johannes Segitz of SUSE" } ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "In supportutils, before version 3.1-5.7.1 and if pacemaker is installed on the system, an unprivileged user could have overwritten arbitrary files in the directory that is used by supportutils to collect the log files." + "lang" : "eng", + "value" : "In supportutils, before version 3.1-5.7.1 and if pacemaker is installed on the system, an unprivileged user could have overwritten arbitrary files in the directory that is used by supportutils to collect the log files." } ] }, - "impact": { - "cvss": { - "attackComplexity": "HIGH", - "attackVector": "LOCAL", - "availabilityImpact": "NONE", - "baseScore": 2.2, - "baseSeverity": "LOW", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N", - "version": "3.0" + "impact" : { + "cvss" : { + "attackComplexity" : "HIGH", + "attackVector" : "LOCAL", + "availabilityImpact" : "NONE", + "baseScore" : 2.2, + "baseSeverity" : "LOW", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "privilegesRequired" : "LOW", + "scope" : "UNCHANGED", + "userInteraction" : "REQUIRED", + "vectorString" : "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N", + "version" : "3.0" } }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "CWE-377" + "lang" : "eng", + "value" : "CWE-377" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "name": "https://bugzilla.suse.com/show_bug.cgi?id=1118460", - "refsource": "CONFIRM", - "url": "https://bugzilla.suse.com/show_bug.cgi?id=1118460" + "name" : "https://bugzilla.suse.com/show_bug.cgi?id=1118460", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.suse.com/show_bug.cgi?id=1118460" } ] }, - "source": { - "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1118460", - "defect": [ + "source" : { + "advisory" : "https://bugzilla.suse.com/show_bug.cgi?id=1118460", + "defect" : [ "1118460" ], - "discovery": "INTERNAL" + "discovery" : "INTERNAL" } } diff --git a/2018/19xxx/CVE-2018-19639.json b/2018/19xxx/CVE-2018-19639.json index a5456646fd8..5a2da3d6962 100644 --- a/2018/19xxx/CVE-2018-19639.json +++ b/2018/19xxx/CVE-2018-19639.json @@ -1,94 +1,94 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@suse.de", - "DATE_PUBLIC": "2019-02-21T00:00:00.000Z", - "ID": "CVE-2018-19639", - "STATE": "PUBLIC", - "TITLE": "Code execution if run with command line switch -v" + "CVE_data_meta" : { + "ASSIGNER" : "security@suse.de", + "DATE_PUBLIC" : "2019-02-21T00:00:00.000Z", + "ID" : "CVE-2018-19639", + "STATE" : "PUBLIC", + "TITLE" : "Code execution if run with command line switch -v" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "supportutils", - "version": { - "version_data": [ + "product_name" : "supportutils", + "version" : { + "version_data" : [ { - "affected": "<", - "version_value": "3.1-5.7.1" + "affected" : "<", + "version_value" : "3.1-5.7.1" } ] } } ] }, - "vendor_name": "SUSE" + "vendor_name" : "SUSE" } ] } }, - "credit": [ + "credit" : [ { - "lang": "eng", - "value": "Johannes Segitz of SUSE" + "lang" : "eng", + "value" : "Johannes Segitz of SUSE" } ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "If supportutils before version 3.1-5.7.1 is run with -v to perform rpm verification and the attacker manages to manipulate the rpm listing (e.g. with CVE-2018-19638) he can execute arbitrary commands as root." + "lang" : "eng", + "value" : "If supportutils before version 3.1-5.7.1 is run with -v to perform rpm verification and the attacker manages to manipulate the rpm listing (e.g. with CVE-2018-19638) he can execute arbitrary commands as root." } ] }, - "impact": { - "cvss": { - "attackComplexity": "HIGH", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 6.7, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", - "version": "3.0" + "impact" : { + "cvss" : { + "attackComplexity" : "HIGH", + "attackVector" : "LOCAL", + "availabilityImpact" : "HIGH", + "baseScore" : 6.7, + "baseSeverity" : "MEDIUM", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "privilegesRequired" : "LOW", + "scope" : "UNCHANGED", + "userInteraction" : "REQUIRED", + "vectorString" : "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version" : "3.0" } }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "CWE-78" + "lang" : "eng", + "value" : "CWE-78" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "name": "https://bugzilla.suse.com/show_bug.cgi?id=1118462", - "refsource": "CONFIRM", - "url": "https://bugzilla.suse.com/show_bug.cgi?id=1118462" + "name" : "https://bugzilla.suse.com/show_bug.cgi?id=1118462", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.suse.com/show_bug.cgi?id=1118462" } ] }, - "source": { - "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1118462", - "defect": [ + "source" : { + "advisory" : "https://bugzilla.suse.com/show_bug.cgi?id=1118462", + "defect" : [ "1118462" ], - "discovery": "INTERNAL" + "discovery" : "INTERNAL" } } diff --git a/2018/19xxx/CVE-2018-19640.json b/2018/19xxx/CVE-2018-19640.json index 46a2308c2a0..a48a466f763 100644 --- a/2018/19xxx/CVE-2018-19640.json +++ b/2018/19xxx/CVE-2018-19640.json @@ -1,94 +1,94 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@suse.de", - "DATE_PUBLIC": "2019-02-21T00:00:00.000Z", - "ID": "CVE-2018-19640", - "STATE": "PUBLIC", - "TITLE": "Code execution if run with command line switch -v" + "CVE_data_meta" : { + "ASSIGNER" : "security@suse.de", + "DATE_PUBLIC" : "2019-02-21T00:00:00.000Z", + "ID" : "CVE-2018-19640", + "STATE" : "PUBLIC", + "TITLE" : "Code execution if run with command line switch -v" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "supportutils", - "version": { - "version_data": [ + "product_name" : "supportutils", + "version" : { + "version_data" : [ { - "affected": "<", - "version_value": "3.1-5.7.1" + "affected" : "<", + "version_value" : "3.1-5.7.1" } ] } } ] }, - "vendor_name": "SUSE" + "vendor_name" : "SUSE" } ] } }, - "credit": [ + "credit" : [ { - "lang": "eng", - "value": "Johannes Segitz of SUSE" + "lang" : "eng", + "value" : "Johannes Segitz of SUSE" } ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": " If the attacker manages to create files in the directory used to collect log files in supportutils before version 3.1-5.7.1 (e.g. with CVE-2018-19638) he can kill arbitrary processes on the local machine." + "lang" : "eng", + "value" : "If the attacker manages to create files in the directory used to collect log files in supportutils before version 3.1-5.7.1 (e.g. with CVE-2018-19638) he can kill arbitrary processes on the local machine." } ] }, - "impact": { - "cvss": { - "attackComplexity": "HIGH", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 4.4, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", - "version": "3.0" + "impact" : { + "cvss" : { + "attackComplexity" : "HIGH", + "attackVector" : "LOCAL", + "availabilityImpact" : "HIGH", + "baseScore" : 4.4, + "baseSeverity" : "MEDIUM", + "confidentialityImpact" : "NONE", + "integrityImpact" : "NONE", + "privilegesRequired" : "LOW", + "scope" : "UNCHANGED", + "userInteraction" : "REQUIRED", + "vectorString" : "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", + "version" : "3.0" } }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "CWE-377" + "lang" : "eng", + "value" : "CWE-377" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "name": "https://bugzilla.suse.com/show_bug.cgi?id=1118463", - "refsource": "CONFIRM", - "url": "https://bugzilla.suse.com/show_bug.cgi?id=1118463" + "name" : "https://bugzilla.suse.com/show_bug.cgi?id=1118463", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.suse.com/show_bug.cgi?id=1118463" } ] }, - "source": { - "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1118463", - "defect": [ + "source" : { + "advisory" : "https://bugzilla.suse.com/show_bug.cgi?id=1118463", + "defect" : [ "1118463" ], - "discovery": "INTERNAL" + "discovery" : "INTERNAL" } } diff --git a/2019/6xxx/CVE-2019-6200.json b/2019/6xxx/CVE-2019-6200.json index 26ebf5af2a3..25b119fdd59 100644 --- a/2019/6xxx/CVE-2019-6200.json +++ b/2019/6xxx/CVE-2019-6200.json @@ -1,74 +1,79 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6200", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6200", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "An attacker in a privileged network position may be able to execute arbitrary code" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3. An attacker in a privileged network position may be able to execute arbitrary code." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209446" - }, - { - "url": "https://support.apple.com/HT209443" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "An attacker in a privileged network position may be able to execute arbitrary code" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3. An attacker in a privileged network position may be able to execute arbitrary code." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209446", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209446" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6202.json b/2019/6xxx/CVE-2019-6202.json index bee51417622..dc6680aaba5 100644 --- a/2019/6xxx/CVE-2019-6202.json +++ b/2019/6xxx/CVE-2019-6202.json @@ -1,88 +1,95 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6202", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - }, - { - "product_name": "watchOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "watchOS 5.1.3" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6202", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + }, + { + "product_name" : "watchOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "watchOS 5.1.3" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "A malicious application may be able to elevate privileges" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, watchOS 5.1.3. A malicious application may be able to elevate privileges." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209446" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209448" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "A malicious application may be able to elevate privileges" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, watchOS 5.1.3. A malicious application may be able to elevate privileges." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209446", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209446" + }, + { + "name" : "https://support.apple.com/HT209448", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209448" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6205.json b/2019/6xxx/CVE-2019-6205.json index 4810132e27a..5cf50bb33d4 100644 --- a/2019/6xxx/CVE-2019-6205.json +++ b/2019/6xxx/CVE-2019-6205.json @@ -1,88 +1,95 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6205", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6205", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "A malicious application may cause unexpected changes in memory shared between processes" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A memory corruption issue was addressed with improved lock state checking. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may cause unexpected changes in memory shared between processes." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209446" - }, - { - "url": "https://support.apple.com/HT209443" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "A malicious application may cause unexpected changes in memory shared between processes" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A memory corruption issue was addressed with improved lock state checking. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may cause unexpected changes in memory shared between processes." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209446", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209446" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6208.json b/2019/6xxx/CVE-2019-6208.json index 99d1bd29f92..f479741c109 100644 --- a/2019/6xxx/CVE-2019-6208.json +++ b/2019/6xxx/CVE-2019-6208.json @@ -1,88 +1,95 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6208", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6208", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "A malicious application may cause unexpected changes in memory shared between processes" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may cause unexpected changes in memory shared between processes." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209446" - }, - { - "url": "https://support.apple.com/HT209443" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "A malicious application may cause unexpected changes in memory shared between processes" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may cause unexpected changes in memory shared between processes." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209446", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209446" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6209.json b/2019/6xxx/CVE-2019-6209.json index 88273b0851f..d7a09b699dd 100644 --- a/2019/6xxx/CVE-2019-6209.json +++ b/2019/6xxx/CVE-2019-6209.json @@ -1,102 +1,111 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6209", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - }, - { - "product_name": "watchOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "watchOS 5.1.3" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6209", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + }, + { + "product_name" : "watchOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "watchOS 5.1.3" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "A malicious application may be able to determine kernel memory layout" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. A malicious application may be able to determine kernel memory layout." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209446" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209448" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "A malicious application may be able to determine kernel memory layout" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. A malicious application may be able to determine kernel memory layout." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209446", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209446" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + }, + { + "name" : "https://support.apple.com/HT209448", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209448" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6210.json b/2019/6xxx/CVE-2019-6210.json index 300128be8ba..c1bc3c9b132 100644 --- a/2019/6xxx/CVE-2019-6210.json +++ b/2019/6xxx/CVE-2019-6210.json @@ -1,102 +1,111 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6210", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - }, - { - "product_name": "watchOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "watchOS 5.1.3" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6210", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + }, + { + "product_name" : "watchOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "watchOS 5.1.3" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "A malicious application may be able to execute arbitrary code with kernel privileges" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. A malicious application may be able to execute arbitrary code with kernel privileges." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209446" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209448" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "A malicious application may be able to execute arbitrary code with kernel privileges" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. A malicious application may be able to execute arbitrary code with kernel privileges." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209446", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209446" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + }, + { + "name" : "https://support.apple.com/HT209448", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209448" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6211.json b/2019/6xxx/CVE-2019-6211.json index 9a052c655b6..500fcf27b55 100644 --- a/2019/6xxx/CVE-2019-6211.json +++ b/2019/6xxx/CVE-2019-6211.json @@ -1,74 +1,79 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6211", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6211", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Processing maliciously crafted web content may lead to arbitrary code execution" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3. Processing maliciously crafted web content may lead to arbitrary code execution." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209446" - }, - { - "url": "https://support.apple.com/HT209443" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Processing maliciously crafted web content may lead to arbitrary code execution" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3. Processing maliciously crafted web content may lead to arbitrary code execution." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209446", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209446" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6212.json b/2019/6xxx/CVE-2019-6212.json index 53e06e0e6f4..ff30183c594 100644 --- a/2019/6xxx/CVE-2019-6212.json +++ b/2019/6xxx/CVE-2019-6212.json @@ -1,116 +1,127 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6212", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - }, - { - "product_name": "Safari", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "Safari 12.0.3" - } - ] - } - }, - { - "product_name": "iTunes for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iTunes 12.9.3 for Windows" - } - ] - } - }, - { - "product_name": "iCloud for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iCloud for Windows 7.10" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6212", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + }, + { + "product_name" : "Safari", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "Safari 12.0.3" + } + ] + } + }, + { + "product_name" : "iTunes for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iTunes 12.9.3 for Windows" + } + ] + } + }, + { + "product_name" : "iCloud for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iCloud for Windows 7.10" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Processing maliciously crafted web content may lead to arbitrary code execution" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209451" - }, - { - "url": "https://support.apple.com/HT209449" - }, - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209450" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Processing maliciously crafted web content may lead to arbitrary code execution" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + }, + { + "name" : "https://support.apple.com/HT209449", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209449" + }, + { + "name" : "https://support.apple.com/HT209450", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209450" + }, + { + "name" : "https://support.apple.com/HT209451", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209451" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6213.json b/2019/6xxx/CVE-2019-6213.json index bda06c3d5a4..3b5d6b639c8 100644 --- a/2019/6xxx/CVE-2019-6213.json +++ b/2019/6xxx/CVE-2019-6213.json @@ -1,102 +1,111 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6213", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - }, - { - "product_name": "watchOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "watchOS 5.1.3" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6213", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + }, + { + "product_name" : "watchOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "watchOS 5.1.3" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "An application may be able to execute arbitrary code with kernel privileges" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. An application may be able to execute arbitrary code with kernel privileges." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209446" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209448" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "An application may be able to execute arbitrary code with kernel privileges" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. An application may be able to execute arbitrary code with kernel privileges." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209446", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209446" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + }, + { + "name" : "https://support.apple.com/HT209448", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209448" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6214.json b/2019/6xxx/CVE-2019-6214.json index 6b23892f04b..229e2e52974 100644 --- a/2019/6xxx/CVE-2019-6214.json +++ b/2019/6xxx/CVE-2019-6214.json @@ -1,102 +1,111 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6214", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - }, - { - "product_name": "watchOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "watchOS 5.1.3" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6214", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + }, + { + "product_name" : "watchOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "watchOS 5.1.3" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "A malicious application may be able to break out of its sandbox" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. A malicious application may be able to break out of its sandbox." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209446" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209448" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "A malicious application may be able to break out of its sandbox" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. A malicious application may be able to break out of its sandbox." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209446", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209446" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + }, + { + "name" : "https://support.apple.com/HT209448", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209448" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6215.json b/2019/6xxx/CVE-2019-6215.json index f978f726db9..9fc119308c5 100644 --- a/2019/6xxx/CVE-2019-6215.json +++ b/2019/6xxx/CVE-2019-6215.json @@ -1,116 +1,127 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6215", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - }, - { - "product_name": "Safari", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "Safari 12.0.3" - } - ] - } - }, - { - "product_name": "iTunes for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iTunes 12.9.3 for Windows" - } - ] - } - }, - { - "product_name": "iCloud for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iCloud for Windows 7.10" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6215", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + }, + { + "product_name" : "Safari", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "Safari 12.0.3" + } + ] + } + }, + { + "product_name" : "iTunes for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iTunes 12.9.3 for Windows" + } + ] + } + }, + { + "product_name" : "iCloud for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iCloud for Windows 7.10" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Processing maliciously crafted web content may lead to arbitrary code execution" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209451" - }, - { - "url": "https://support.apple.com/HT209449" - }, - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209450" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Processing maliciously crafted web content may lead to arbitrary code execution" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + }, + { + "name" : "https://support.apple.com/HT209449", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209449" + }, + { + "name" : "https://support.apple.com/HT209450", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209450" + }, + { + "name" : "https://support.apple.com/HT209451", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209451" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6216.json b/2019/6xxx/CVE-2019-6216.json index 4f08a83ccfb..15f47bcb4ad 100644 --- a/2019/6xxx/CVE-2019-6216.json +++ b/2019/6xxx/CVE-2019-6216.json @@ -1,130 +1,143 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6216", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - }, - { - "product_name": "watchOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "watchOS 5.1.3" - } - ] - } - }, - { - "product_name": "Safari", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "Safari 12.0.3" - } - ] - } - }, - { - "product_name": "iTunes for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iTunes 12.9.3 for Windows" - } - ] - } - }, - { - "product_name": "iCloud for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iCloud for Windows 7.10" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6216", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + }, + { + "product_name" : "watchOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "watchOS 5.1.3" + } + ] + } + }, + { + "product_name" : "Safari", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "Safari 12.0.3" + } + ] + } + }, + { + "product_name" : "iTunes for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iTunes 12.9.3 for Windows" + } + ] + } + }, + { + "product_name" : "iCloud for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iCloud for Windows 7.10" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Processing maliciously crafted web content may lead to arbitrary code execution" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209451" - }, - { - "url": "https://support.apple.com/HT209449" - }, - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209448" - }, - { - "url": "https://support.apple.com/HT209450" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Processing maliciously crafted web content may lead to arbitrary code execution" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + }, + { + "name" : "https://support.apple.com/HT209448", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209448" + }, + { + "name" : "https://support.apple.com/HT209449", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209449" + }, + { + "name" : "https://support.apple.com/HT209450", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209450" + }, + { + "name" : "https://support.apple.com/HT209451", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209451" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6217.json b/2019/6xxx/CVE-2019-6217.json index df3c4c796d1..37e8a98eeec 100644 --- a/2019/6xxx/CVE-2019-6217.json +++ b/2019/6xxx/CVE-2019-6217.json @@ -1,130 +1,143 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6217", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - }, - { - "product_name": "watchOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "watchOS 5.1.3" - } - ] - } - }, - { - "product_name": "Safari", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "Safari 12.0.3" - } - ] - } - }, - { - "product_name": "iTunes for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iTunes 12.9.3 for Windows" - } - ] - } - }, - { - "product_name": "iCloud for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iCloud for Windows 7.10" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6217", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + }, + { + "product_name" : "watchOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "watchOS 5.1.3" + } + ] + } + }, + { + "product_name" : "Safari", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "Safari 12.0.3" + } + ] + } + }, + { + "product_name" : "iTunes for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iTunes 12.9.3 for Windows" + } + ] + } + }, + { + "product_name" : "iCloud for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iCloud for Windows 7.10" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Processing maliciously crafted web content may lead to arbitrary code execution" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209451" - }, - { - "url": "https://support.apple.com/HT209449" - }, - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209448" - }, - { - "url": "https://support.apple.com/HT209450" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Processing maliciously crafted web content may lead to arbitrary code execution" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + }, + { + "name" : "https://support.apple.com/HT209448", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209448" + }, + { + "name" : "https://support.apple.com/HT209449", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209449" + }, + { + "name" : "https://support.apple.com/HT209450", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209450" + }, + { + "name" : "https://support.apple.com/HT209451", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209451" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6218.json b/2019/6xxx/CVE-2019-6218.json index bd3e37d359d..4eff9c114dc 100644 --- a/2019/6xxx/CVE-2019-6218.json +++ b/2019/6xxx/CVE-2019-6218.json @@ -1,88 +1,95 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6218", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6218", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "A malicious application may be able to execute arbitrary code with kernel privileges" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may be able to execute arbitrary code with kernel privileges." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209446" - }, - { - "url": "https://support.apple.com/HT209443" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "A malicious application may be able to execute arbitrary code with kernel privileges" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may be able to execute arbitrary code with kernel privileges." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209446", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209446" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6219.json b/2019/6xxx/CVE-2019-6219.json index d8d623bfe44..f0276ee2783 100644 --- a/2019/6xxx/CVE-2019-6219.json +++ b/2019/6xxx/CVE-2019-6219.json @@ -1,88 +1,95 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6219", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - }, - { - "product_name": "watchOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "watchOS 5.1.3" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6219", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + }, + { + "product_name" : "watchOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "watchOS 5.1.3" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Processing a maliciously crafted message may lead to a denial of service" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A denial of service issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, watchOS 5.1.3. Processing a maliciously crafted message may lead to a denial of service." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209446" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209448" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Processing a maliciously crafted message may lead to a denial of service" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A denial of service issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, watchOS 5.1.3. Processing a maliciously crafted message may lead to a denial of service." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209446", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209446" + }, + { + "name" : "https://support.apple.com/HT209448", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209448" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6220.json b/2019/6xxx/CVE-2019-6220.json index da86c7c3299..db69a1308d2 100644 --- a/2019/6xxx/CVE-2019-6220.json +++ b/2019/6xxx/CVE-2019-6220.json @@ -1,60 +1,63 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6220", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6220", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "An application may be able to read restricted memory" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Mojave 10.14.3. An application may be able to read restricted memory." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209446" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "An application may be able to read restricted memory" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Mojave 10.14.3. An application may be able to read restricted memory." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209446", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209446" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6221.json b/2019/6xxx/CVE-2019-6221.json index 0ad1ab798f8..ea2f4f5fd0e 100644 --- a/2019/6xxx/CVE-2019-6221.json +++ b/2019/6xxx/CVE-2019-6221.json @@ -1,88 +1,95 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6221", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - }, - { - "product_name": "iTunes for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iTunes 12.9.3 for Windows" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6221", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + }, + { + "product_name" : "iTunes for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iTunes 12.9.3 for Windows" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "A malicious application may be able to elevate privileges" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, iTunes 12.9.3 for Windows. A malicious application may be able to elevate privileges." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209446" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209450" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "A malicious application may be able to elevate privileges" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, iTunes 12.9.3 for Windows. A malicious application may be able to elevate privileges." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209446", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209446" + }, + { + "name" : "https://support.apple.com/HT209450", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209450" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6223.json b/2019/6xxx/CVE-2019-6223.json index 54b0276bc54..a57c65acfef 100644 --- a/2019/6xxx/CVE-2019-6223.json +++ b/2019/6xxx/CVE-2019-6223.json @@ -1,74 +1,79 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6223", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6223", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "The initiator of a Group FaceTime call may be able to cause the recipient to answer" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A logic issue existed in the handling of Group FaceTime calls. The issue was addressed with improved state management. This issue is fixed in iOS 12.1.4, macOS Mojave 10.14.3 Supplemental Update. The initiator of a Group FaceTime call may be able to cause the recipient to answer." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209521" - }, - { - "url": "https://support.apple.com/HT209520" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "The initiator of a Group FaceTime call may be able to cause the recipient to answer" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A logic issue existed in the handling of Group FaceTime calls. The issue was addressed with improved state management. This issue is fixed in iOS 12.1.4, macOS Mojave 10.14.3 Supplemental Update. The initiator of a Group FaceTime call may be able to cause the recipient to answer." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209520", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209520" + }, + { + "name" : "https://support.apple.com/HT209521", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209521" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6224.json b/2019/6xxx/CVE-2019-6224.json index cf74065b64a..a9a7cb756e4 100644 --- a/2019/6xxx/CVE-2019-6224.json +++ b/2019/6xxx/CVE-2019-6224.json @@ -1,102 +1,111 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6224", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - }, - { - "product_name": "watchOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "watchOS 5.1.3" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6224", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + }, + { + "product_name" : "watchOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "watchOS 5.1.3" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "A remote attacker may be able to initiate a FaceTime call causing arbitrary code execution" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. A remote attacker may be able to initiate a FaceTime call causing arbitrary code execution." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209446" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209448" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "A remote attacker may be able to initiate a FaceTime call causing arbitrary code execution" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. A remote attacker may be able to initiate a FaceTime call causing arbitrary code execution." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209446", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209446" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + }, + { + "name" : "https://support.apple.com/HT209448", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209448" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6225.json b/2019/6xxx/CVE-2019-6225.json index 772139c780d..bc1d1121a70 100644 --- a/2019/6xxx/CVE-2019-6225.json +++ b/2019/6xxx/CVE-2019-6225.json @@ -1,88 +1,95 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6225", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6225", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "A malicious application may be able to elevate privileges" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may be able to elevate privileges." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209446" - }, - { - "url": "https://support.apple.com/HT209443" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "A malicious application may be able to elevate privileges" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may be able to elevate privileges." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209446", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209446" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6226.json b/2019/6xxx/CVE-2019-6226.json index 20b4c188fa4..7aeddaf387f 100644 --- a/2019/6xxx/CVE-2019-6226.json +++ b/2019/6xxx/CVE-2019-6226.json @@ -1,131 +1,143 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6226", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - }, - { - "product_name": "watchOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "watchOS 5.1.3" - } - ] - } - }, - { - "product_name": "Safari", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "Safari 12.0.3" - } - ] - } - }, - { - "product_name": "iTunes for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iTunes 12.9.3 for Windows" - } - ] - } - - }, - { - "product_name": "iCloud for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iCloud for Windows 7.10" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6226", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + }, + { + "product_name" : "watchOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "watchOS 5.1.3" + } + ] + } + }, + { + "product_name" : "Safari", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "Safari 12.0.3" + } + ] + } + }, + { + "product_name" : "iTunes for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iTunes 12.9.3 for Windows" + } + ] + } + }, + { + "product_name" : "iCloud for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iCloud for Windows 7.10" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Processing maliciously crafted web content may lead to arbitrary code execution" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209451" - }, - { - "url": "https://support.apple.com/HT209449" - }, - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209448" - }, - { - "url": "https://support.apple.com/HT209450" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Processing maliciously crafted web content may lead to arbitrary code execution" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + }, + { + "name" : "https://support.apple.com/HT209448", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209448" + }, + { + "name" : "https://support.apple.com/HT209449", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209449" + }, + { + "name" : "https://support.apple.com/HT209450", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209450" + }, + { + "name" : "https://support.apple.com/HT209451", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209451" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6227.json b/2019/6xxx/CVE-2019-6227.json index ea2098b210d..a0f891104d7 100644 --- a/2019/6xxx/CVE-2019-6227.json +++ b/2019/6xxx/CVE-2019-6227.json @@ -1,130 +1,143 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6227", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - }, - { - "product_name": "watchOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "watchOS 5.1.3" - } - ] - } - }, - { - "product_name": "Safari", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "Safari 12.0.3" - } - ] - } - }, - { - "product_name": "iTunes for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iTunes 12.9.3 for Windows" - } - ] - } - }, - { - "product_name": "iCloud for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iCloud for Windows 7.10" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6227", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + }, + { + "product_name" : "watchOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "watchOS 5.1.3" + } + ] + } + }, + { + "product_name" : "Safari", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "Safari 12.0.3" + } + ] + } + }, + { + "product_name" : "iTunes for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iTunes 12.9.3 for Windows" + } + ] + } + }, + { + "product_name" : "iCloud for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iCloud for Windows 7.10" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Processing maliciously crafted web content may lead to arbitrary code execution" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209451" - }, - { - "url": "https://support.apple.com/HT209449" - }, - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209448" - }, - { - "url": "https://support.apple.com/HT209450" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Processing maliciously crafted web content may lead to arbitrary code execution" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + }, + { + "name" : "https://support.apple.com/HT209448", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209448" + }, + { + "name" : "https://support.apple.com/HT209449", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209449" + }, + { + "name" : "https://support.apple.com/HT209450", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209450" + }, + { + "name" : "https://support.apple.com/HT209451", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209451" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6228.json b/2019/6xxx/CVE-2019-6228.json index b92e137f4f3..7b98f3e73c3 100644 --- a/2019/6xxx/CVE-2019-6228.json +++ b/2019/6xxx/CVE-2019-6228.json @@ -1,74 +1,79 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6228", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "Safari", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "Safari 12.0.3" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6228", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "Safari", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "Safari 12.0.3" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Processing maliciously crafted web content may lead to a cross site scripting attack" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A cross-site scripting issue existed in Safari. This issue was addressed with improved URL validation. This issue is fixed in iOS 12.1.3, Safari 12.0.3. Processing maliciously crafted web content may lead to a cross site scripting attack." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209449" - }, - { - "url": "https://support.apple.com/HT209443" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Processing maliciously crafted web content may lead to a cross site scripting attack" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A cross-site scripting issue existed in Safari. This issue was addressed with improved URL validation. This issue is fixed in iOS 12.1.3, Safari 12.0.3. Processing maliciously crafted web content may lead to a cross site scripting attack." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209449", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209449" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6229.json b/2019/6xxx/CVE-2019-6229.json index 3b55a41fa23..91c6d13e0df 100644 --- a/2019/6xxx/CVE-2019-6229.json +++ b/2019/6xxx/CVE-2019-6229.json @@ -1,116 +1,127 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6229", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - }, - { - "product_name": "Safari", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "Safari 12.0.3" - } - ] - } - }, - { - "product_name": "iTunes for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iTunes 12.9.3 for Windows" - } - ] - } - }, - { - "product_name": "iCloud for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iCloud for Windows 7.10" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6229", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + }, + { + "product_name" : "Safari", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "Safari 12.0.3" + } + ] + } + }, + { + "product_name" : "iTunes for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iTunes 12.9.3 for Windows" + } + ] + } + }, + { + "product_name" : "iCloud for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iCloud for Windows 7.10" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Processing maliciously crafted web content may lead to universal cross site scripting" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A logic issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to universal cross site scripting." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209451" - }, - { - "url": "https://support.apple.com/HT209449" - }, - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209450" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Processing maliciously crafted web content may lead to universal cross site scripting" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A logic issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to universal cross site scripting." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + }, + { + "name" : "https://support.apple.com/HT209449", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209449" + }, + { + "name" : "https://support.apple.com/HT209450", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209450" + }, + { + "name" : "https://support.apple.com/HT209451", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209451" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6230.json b/2019/6xxx/CVE-2019-6230.json index 790e9904445..936a96efdd4 100644 --- a/2019/6xxx/CVE-2019-6230.json +++ b/2019/6xxx/CVE-2019-6230.json @@ -1,102 +1,111 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6230", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - }, - { - "product_name": "watchOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "watchOS 5.1.3" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6230", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + }, + { + "product_name" : "watchOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "watchOS 5.1.3" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "A malicious application may be able to break out of its sandbox" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3,macOS Mojave 10.14.3,tvOS 12.1.2,watchOS 5.1.3. A malicious application may be able to break out of its sandbox." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209446" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209448" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "A malicious application may be able to break out of its sandbox" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3,macOS Mojave 10.14.3,tvOS 12.1.2,watchOS 5.1.3. A malicious application may be able to break out of its sandbox." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209446", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209446" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + }, + { + "name" : "https://support.apple.com/HT209448", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209448" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6231.json b/2019/6xxx/CVE-2019-6231.json index a49896afaca..f3fa4249090 100644 --- a/2019/6xxx/CVE-2019-6231.json +++ b/2019/6xxx/CVE-2019-6231.json @@ -1,102 +1,111 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6231", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "macOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "macOS Mojave 10.14.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - }, - { - "product_name": "watchOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "watchOS 5.1.3" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6231", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "macOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "macOS Mojave 10.14.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + }, + { + "product_name" : "watchOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "watchOS 5.1.3" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "A malicious application may be able to read restricted memory" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. A malicious application may be able to read restricted memory." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209446" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209448" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "A malicious application may be able to read restricted memory" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. A malicious application may be able to read restricted memory." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209446", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209446" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + }, + { + "name" : "https://support.apple.com/HT209448", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209448" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6233.json b/2019/6xxx/CVE-2019-6233.json index 3d7ef4bba25..637c335ff94 100644 --- a/2019/6xxx/CVE-2019-6233.json +++ b/2019/6xxx/CVE-2019-6233.json @@ -1,116 +1,127 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6233", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - }, - { - "product_name": "Safari", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "Safari 12.0.3" - } - ] - } - }, - { - "product_name": "iTunes for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iTunes 12.9.3 for Windows" - } - ] - } - }, - { - "product_name": "iCloud for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iCloud for Windows 7.10" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6233", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + }, + { + "product_name" : "Safari", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "Safari 12.0.3" + } + ] + } + }, + { + "product_name" : "iTunes for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iTunes 12.9.3 for Windows" + } + ] + } + }, + { + "product_name" : "iCloud for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iCloud for Windows 7.10" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Processing maliciously crafted web content may lead to arbitrary code execution" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209451" - }, - { - "url": "https://support.apple.com/HT209449" - }, - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209450" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Processing maliciously crafted web content may lead to arbitrary code execution" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + }, + { + "name" : "https://support.apple.com/HT209449", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209449" + }, + { + "name" : "https://support.apple.com/HT209450", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209450" + }, + { + "name" : "https://support.apple.com/HT209451", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209451" + } ] - } - } + } +} diff --git a/2019/6xxx/CVE-2019-6234.json b/2019/6xxx/CVE-2019-6234.json index f64eebb2516..44f4149fccb 100644 --- a/2019/6xxx/CVE-2019-6234.json +++ b/2019/6xxx/CVE-2019-6234.json @@ -1,116 +1,127 @@ - { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-6234", - "ASSIGNER": "product-security@apple.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Apple", - "product": { - "product_data": [ - { - "product_name": "iOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iOS 12.1.3" - } - ] - } - }, - { - "product_name": "tvOS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "tvOS 12.1.2" - } - ] - } - }, - { - "product_name": "Safari", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "Safari 12.0.3" - } - ] - } - }, - { - "product_name": "iTunes for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iTunes 12.9.3 for Windows" - } - ] - } - }, - { - "product_name": "iCloud for Windows", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "iCloud for Windows 7.10" - } - ] - } - } - ] +{ + "CVE_data_meta" : { + "ASSIGNER" : "product-security@apple.com", + "ID" : "CVE-2019-6234", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iOS 12.1.3" + } + ] + } + }, + { + "product_name" : "tvOS", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "tvOS 12.1.2" + } + ] + } + }, + { + "product_name" : "Safari", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "Safari 12.0.3" + } + ] + } + }, + { + "product_name" : "iTunes for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iTunes 12.9.3 for Windows" + } + ] + } + }, + { + "product_name" : "iCloud for Windows", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "iCloud for Windows 7.10" + } + ] + } + } + ] + }, + "vendor_name" : "Apple" } - } - ] + ] } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Processing maliciously crafted web content may lead to arbitrary code execution" - } - ] - } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution." + } ] - }, - "references": { - "reference_data": [ - { - "url": "https://support.apple.com/HT209451" - }, - { - "url": "https://support.apple.com/HT209449" - }, - { - "url": "https://support.apple.com/HT209447" - }, - { - "url": "https://support.apple.com/HT209443" - }, - { - "url": "https://support.apple.com/HT209450" - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Processing maliciously crafted web content may lead to arbitrary code execution" + } + ] + } ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution." - } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://support.apple.com/HT209443", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209443" + }, + { + "name" : "https://support.apple.com/HT209447", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209447" + }, + { + "name" : "https://support.apple.com/HT209449", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209449" + }, + { + "name" : "https://support.apple.com/HT209450", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209450" + }, + { + "name" : "https://support.apple.com/HT209451", + "refsource" : "CONFIRM", + "url" : "https://support.apple.com/HT209451" + } ] - } - } + } +}