"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-10-16 17:01:49 +00:00
parent 432299191f
commit a3aa390752
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
56 changed files with 1046 additions and 631 deletions

View File

@ -166,6 +166,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1265",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-d30881c970",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/"
}
]
}

View File

@ -61,6 +61,11 @@
"url": "https://forum.aapanel.com",
"refsource": "MISC",
"name": "https://forum.aapanel.com"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/159575/aaPanel-6.6.6-Privilege-Escalation.html",
"url": "http://packetstormsecurity.com/files/159575/aaPanel-6.6.6-Privilege-Escalation.html"
}
]
}

View File

@ -156,6 +156,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-c539babb0a",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-d30881c970",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/"
}
]
}

View File

@ -35,7 +35,7 @@
"description_data": [
{
"lang": "eng",
"value": "In Anuko Time Tracker before verion 1.19.23.5325, due to not properly filtered user input a CSV export of a report could contain cells that are treated as formulas by spreadsheet software (for example, when a cell value starts with an equal sign).\n\nThis is fixed in version 1.19.23.5325."
"value": "In Anuko Time Tracker before verion 1.19.23.5325, due to not properly filtered user input a CSV export of a report could contain cells that are treated as formulas by spreadsheet software (for example, when a cell value starts with an equal sign). This is fixed in version 1.19.23.5325."
}
]
},

View File

@ -66,6 +66,16 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-221823ebdd",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-887d3fa26f",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-d30881c970",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/"
}
]
}

View File

@ -129,26 +129,6 @@
"url": "https://support.apple.com/HT211107",
"refsource": "MISC",
"name": "https://support.apple.com/HT211107"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/157378/WebKit-AudioArray-allocate-Data-Race-Out-Of-Bounds-Access.html",
"url": "http://packetstormsecurity.com/files/157378/WebKit-AudioArray-allocate-Data-Race-Out-Of-Bounds-Access.html"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200427 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0005",
"url": "http://www.openwall.com/lists/oss-security/2020/04/27/3"
},
{
"refsource": "DEBIAN",
"name": "DSA-4681",
"url": "https://www.debian.org/security/2020/dsa-4681"
},
{
"refsource": "GENTOO",
"name": "GLSA-202006-08",
"url": "https://security.gentoo.org/glsa/202006-08"
}
]
},

View File

@ -145,21 +145,6 @@
"url": "https://support.apple.com/HT211107",
"refsource": "MISC",
"name": "https://support.apple.com/HT211107"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200427 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0005",
"url": "http://www.openwall.com/lists/oss-security/2020/04/27/3"
},
{
"refsource": "DEBIAN",
"name": "DSA-4681",
"url": "https://www.debian.org/security/2020/dsa-4681"
},
{
"refsource": "GENTOO",
"name": "GLSA-202006-08",
"url": "https://security.gentoo.org/glsa/202006-08"
}
]
},

View File

@ -145,21 +145,6 @@
"url": "https://support.apple.com/HT211107",
"refsource": "MISC",
"name": "https://support.apple.com/HT211107"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200427 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0005",
"url": "http://www.openwall.com/lists/oss-security/2020/04/27/3"
},
{
"refsource": "DEBIAN",
"name": "DSA-4681",
"url": "https://www.debian.org/security/2020/dsa-4681"
},
{
"refsource": "GENTOO",
"name": "GLSA-202006-08",
"url": "https://security.gentoo.org/glsa/202006-08"
}
]
},

View File

@ -36,6 +36,17 @@
]
}
},
{
"product_name": "watchOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "watchOS 6.2"
}
]
}
},
{
"product_name": "Safari",
"version": {
@ -100,11 +111,6 @@
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT211103",
"url": "https://support.apple.com/kb/HT211103"
},
{
"url": "https://support.apple.com/HT211102",
"refsource": "MISC",
@ -134,46 +140,6 @@
"url": "https://support.apple.com/HT211107",
"refsource": "MISC",
"name": "https://support.apple.com/HT211107"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200427 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0005",
"url": "http://www.openwall.com/lists/oss-security/2020/04/27/3"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-224cd9ff9b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4V2TWGEZTYFWE5HIORULXJAUDJ4NXII/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-bd170e803f",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYLI3NEKPO5FTXFOBKRSRQLHCTZOTHCZ/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-7f34d2cfd8",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPGNJ7JQCD6IE2SCSFAIMSUY5XHOYWKE/"
},
{
"refsource": "UBUNTU",
"name": "USN-4347-1",
"url": "https://usn.ubuntu.com/4347-1/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4681",
"url": "https://www.debian.org/security/2020/dsa-4681"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0646",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00015.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202006-08",
"url": "https://security.gentoo.org/glsa/202006-08"
}
]
},
@ -181,7 +147,7 @@
"description_data": [
{
"lang": "eng",
"value": "A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A remote attacker may be able to cause arbitrary code execution."
"value": "A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A remote attacker may be able to cause arbitrary code execution."
}
]
}

View File

@ -145,21 +145,6 @@
"url": "https://support.apple.com/HT211107",
"refsource": "MISC",
"name": "https://support.apple.com/HT211107"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200427 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0005",
"url": "http://www.openwall.com/lists/oss-security/2020/04/27/3"
},
{
"refsource": "DEBIAN",
"name": "DSA-4681",
"url": "https://www.debian.org/security/2020/dsa-4681"
},
{
"refsource": "GENTOO",
"name": "GLSA-202006-08",
"url": "https://security.gentoo.org/glsa/202006-08"
}
]
},

View File

@ -145,21 +145,6 @@
"url": "https://support.apple.com/HT211107",
"refsource": "MISC",
"name": "https://support.apple.com/HT211107"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200427 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0005",
"url": "http://www.openwall.com/lists/oss-security/2020/04/27/3"
},
{
"refsource": "DEBIAN",
"name": "DSA-4681",
"url": "https://www.debian.org/security/2020/dsa-4681"
},
{
"refsource": "GENTOO",
"name": "GLSA-202006-08",
"url": "https://security.gentoo.org/glsa/202006-08"
}
]
},

View File

@ -100,11 +100,6 @@
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT211100",
"url": "https://support.apple.com/kb/HT211100"
},
{
"url": "https://support.apple.com/HT211102",
"refsource": "MISC",
@ -134,21 +129,6 @@
"url": "https://support.apple.com/HT211107",
"refsource": "MISC",
"name": "https://support.apple.com/HT211107"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200427 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0005",
"url": "http://www.openwall.com/lists/oss-security/2020/04/27/3"
},
{
"refsource": "DEBIAN",
"name": "DSA-4681",
"url": "https://www.debian.org/security/2020/dsa-4681"
},
{
"refsource": "GENTOO",
"name": "GLSA-202006-08",
"url": "https://security.gentoo.org/glsa/202006-08"
}
]
},

View File

@ -20,40 +20,7 @@
"version_data": [
{
"version_affected": "<",
"version_value": "iOS 13.4 and iPadOS 13.4"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "macOS Catalina 10.15.4"
}
]
}
},
{
"product_name": "tvOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "tvOS 13.4"
}
]
}
},
{
"product_name": "watchOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "watchOS 6.2"
"version_value": "iOS 14.0 and iPadOS 14.0"
}
]
}
@ -79,34 +46,9 @@
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211100",
"url": "https://support.apple.com/HT211850",
"refsource": "MISC",
"name": "https://support.apple.com/HT211100"
},
{
"url": "https://support.apple.com/HT211102",
"refsource": "MISC",
"name": "https://support.apple.com/HT211102"
},
{
"url": "https://support.apple.com/HT211101",
"refsource": "MISC",
"name": "https://support.apple.com/HT211101"
},
{
"url": "https://support.apple.com/HT211103",
"refsource": "MISC",
"name": "https://support.apple.com/HT211103"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT211850",
"url": "https://support.apple.com/kb/HT211850"
},
{
"refsource": "FULLDISC",
"name": "20200918 APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0",
"url": "http://seclists.org/fulldisclosure/2020/Sep/36"
"name": "https://support.apple.com/HT211850"
}
]
},
@ -114,7 +56,7 @@
"description_data": [
{
"lang": "eng",
"value": "The issue was addressed with improved handling of icon caches. This issue is fixed in iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, tvOS 13.4, watchOS 6.2. A malicious application may be able to identify what other applications a user has installed."
"value": "The issue was addressed with improved handling of icon caches. This issue is fixed in iOS 14.0 and iPadOS 14.0. A malicious application may be able to identify what other applications a user has installed."
}
]
}

View File

@ -111,16 +111,16 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211171",
"refsource": "MISC",

View File

@ -111,16 +111,16 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211171",
"refsource": "MISC",

View File

@ -78,16 +78,16 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211171",
"refsource": "MISC",

View File

@ -56,15 +56,15 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
}
]
},

View File

@ -111,16 +111,16 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211171",
"refsource": "MISC",

View File

@ -78,16 +78,16 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211171",
"refsource": "MISC",

View File

@ -78,16 +78,16 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211171",
"refsource": "MISC",

View File

@ -4,14 +4,59 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-9799",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "product-security@apple.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apple",
"product": {
"product_data": [
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "macOS Catalina 10.15.6"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "A malicious application may be able to execute arbitrary code with kernel privileges"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211289",
"refsource": "MISC",
"name": "https://support.apple.com/HT211289"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.6. A malicious application may be able to execute arbitrary code with kernel privileges."
}
]
}

View File

@ -49,11 +49,6 @@
"url": "https://support.apple.com/HT211177",
"refsource": "MISC",
"name": "https://support.apple.com/HT211177"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/159447/Safari-Type-Confusion-Sandbox-Escape.html",
"url": "http://packetstormsecurity.com/files/159447/Safari-Type-Confusion-Sandbox-Escape.html"
}
]
},

View File

@ -145,41 +145,6 @@
"url": "https://support.apple.com/HT211177",
"refsource": "MISC",
"name": "https://support.apple.com/HT211177"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200710 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0006",
"url": "http://www.openwall.com/lists/oss-security/2020/07/10/1"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-ab074c6cdf",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDBXQ2XA6X4DP4YTPXBOMKSLWUED2KAR/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4724",
"url": "https://www.debian.org/security/2020/dsa-4724"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-d2736ee493",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GER2ATKZXDHM7FFYJH67ZPNZZX5VOUVM/"
},
{
"refsource": "UBUNTU",
"name": "USN-4422-1",
"url": "https://usn.ubuntu.com/4422-1/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1064",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-11",
"url": "https://security.gentoo.org/glsa/202007-11"
}
]
},

View File

@ -145,41 +145,6 @@
"url": "https://support.apple.com/HT211177",
"refsource": "MISC",
"name": "https://support.apple.com/HT211177"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200710 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0006",
"url": "http://www.openwall.com/lists/oss-security/2020/07/10/1"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-ab074c6cdf",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDBXQ2XA6X4DP4YTPXBOMKSLWUED2KAR/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4724",
"url": "https://www.debian.org/security/2020/dsa-4724"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-d2736ee493",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GER2ATKZXDHM7FFYJH67ZPNZZX5VOUVM/"
},
{
"refsource": "UBUNTU",
"name": "USN-4422-1",
"url": "https://usn.ubuntu.com/4422-1/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1064",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-11",
"url": "https://security.gentoo.org/glsa/202007-11"
}
]
},

View File

@ -145,41 +145,6 @@
"url": "https://support.apple.com/HT211177",
"refsource": "MISC",
"name": "https://support.apple.com/HT211177"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200710 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0006",
"url": "http://www.openwall.com/lists/oss-security/2020/07/10/1"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-ab074c6cdf",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDBXQ2XA6X4DP4YTPXBOMKSLWUED2KAR/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4724",
"url": "https://www.debian.org/security/2020/dsa-4724"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-d2736ee493",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GER2ATKZXDHM7FFYJH67ZPNZZX5VOUVM/"
},
{
"refsource": "UBUNTU",
"name": "USN-4422-1",
"url": "https://usn.ubuntu.com/4422-1/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1064",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-11",
"url": "https://security.gentoo.org/glsa/202007-11"
}
]
},

View File

@ -145,41 +145,6 @@
"url": "https://support.apple.com/HT211177",
"refsource": "MISC",
"name": "https://support.apple.com/HT211177"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200710 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0006",
"url": "http://www.openwall.com/lists/oss-security/2020/07/10/1"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-ab074c6cdf",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDBXQ2XA6X4DP4YTPXBOMKSLWUED2KAR/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4724",
"url": "https://www.debian.org/security/2020/dsa-4724"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-d2736ee493",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GER2ATKZXDHM7FFYJH67ZPNZZX5VOUVM/"
},
{
"refsource": "UBUNTU",
"name": "USN-4422-1",
"url": "https://usn.ubuntu.com/4422-1/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1064",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-11",
"url": "https://security.gentoo.org/glsa/202007-11"
}
]
},

View File

@ -145,41 +145,6 @@
"url": "https://support.apple.com/HT211177",
"refsource": "MISC",
"name": "https://support.apple.com/HT211177"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200710 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0006",
"url": "http://www.openwall.com/lists/oss-security/2020/07/10/1"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-ab074c6cdf",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDBXQ2XA6X4DP4YTPXBOMKSLWUED2KAR/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4724",
"url": "https://www.debian.org/security/2020/dsa-4724"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-d2736ee493",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GER2ATKZXDHM7FFYJH67ZPNZZX5VOUVM/"
},
{
"refsource": "UBUNTU",
"name": "USN-4422-1",
"url": "https://usn.ubuntu.com/4422-1/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1064",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-11",
"url": "https://security.gentoo.org/glsa/202007-11"
}
]
},

View File

@ -78,16 +78,16 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211171",
"refsource": "MISC",

View File

@ -78,16 +78,16 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211171",
"refsource": "MISC",

View File

@ -78,16 +78,16 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211171",
"refsource": "MISC",

View File

@ -78,16 +78,16 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211171",
"refsource": "MISC",

View File

@ -78,16 +78,16 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211171",
"refsource": "MISC",

View File

@ -72,15 +72,15 @@
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211169",
"refsource": "MISC",
"name": "https://support.apple.com/HT211169"
},
{
"url": "https://support.apple.com/HT211175",
"refsource": "MISC",
"name": "https://support.apple.com/HT211175"
},
{
"url": "https://support.apple.com/HT211169",
"refsource": "MISC",
"name": "https://support.apple.com/HT211169"
}
]
},

View File

@ -78,25 +78,25 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211176",
"refsource": "MISC",
"name": "https://support.apple.com/HT211176"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211175",
"refsource": "MISC",
"name": "https://support.apple.com/HT211175"
},
{
"url": "https://support.apple.com/HT211169",
"refsource": "MISC",
"name": "https://support.apple.com/HT211169"
},
{
"url": "https://support.apple.com/HT211175",
"url": "https://support.apple.com/HT211176",
"refsource": "MISC",
"name": "https://support.apple.com/HT211175"
"name": "https://support.apple.com/HT211176"
}
]
},

View File

@ -78,16 +78,16 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211171",
"refsource": "MISC",

View File

@ -56,15 +56,15 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
}
]
},

View File

@ -56,15 +56,15 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
}
]
},

View File

@ -78,16 +78,16 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211171",
"refsource": "MISC",

View File

@ -14,6 +14,17 @@
"vendor_name": "Apple",
"product": {
"product_data": [
{
"product_name": "iOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "iOS 13.5 and iPadOS 13.5"
}
]
}
},
{
"product_name": "macOS",
"version": {
@ -45,11 +56,6 @@
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT211168",
"url": "https://support.apple.com/kb/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
@ -61,7 +67,7 @@
"description_data": [
{
"lang": "eng",
"value": "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15.5. An application may be able to execute arbitrary code with kernel privileges."
"value": "A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5. An application may be able to execute arbitrary code with kernel privileges."
}
]
}

View File

@ -67,16 +67,16 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211171",
"refsource": "MISC",

View File

@ -78,16 +78,16 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211171",
"refsource": "MISC",
@ -97,11 +97,6 @@
"url": "https://support.apple.com/HT211175",
"refsource": "MISC",
"name": "https://support.apple.com/HT211175"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/159084/macOS-cfprefsd-Arbitrary-File-Write-Local-Privilege-Escalation.html",
"url": "http://packetstormsecurity.com/files/159084/macOS-cfprefsd-Arbitrary-File-Write-Local-Privilege-Escalation.html"
}
]
},

View File

@ -70,7 +70,7 @@
"description": [
{
"lang": "eng",
"value": "An application may be able to use arbitrary entitlements"
"value": "A malicious application could interact with system processes to access private information and perform privileged actions"
}
]
}
@ -78,16 +78,16 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211171",
"refsource": "MISC",
@ -104,7 +104,7 @@
"description_data": [
{
"lang": "eng",
"value": "This issue was addressed with improved checks. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5. An application may be able to use arbitrary entitlements."
"value": "An entitlement parsing issue was addressed with improved parsing. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5. A malicious application could interact with system processes to access private information and perform privileged actions."
}
]
}

View File

@ -145,41 +145,6 @@
"url": "https://support.apple.com/HT211177",
"refsource": "MISC",
"name": "https://support.apple.com/HT211177"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200710 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0006",
"url": "http://www.openwall.com/lists/oss-security/2020/07/10/1"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-ab074c6cdf",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDBXQ2XA6X4DP4YTPXBOMKSLWUED2KAR/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4724",
"url": "https://www.debian.org/security/2020/dsa-4724"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-d2736ee493",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GER2ATKZXDHM7FFYJH67ZPNZZX5VOUVM/"
},
{
"refsource": "UBUNTU",
"name": "USN-4422-1",
"url": "https://usn.ubuntu.com/4422-1/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1064",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-11",
"url": "https://security.gentoo.org/glsa/202007-11"
}
]
},

View File

@ -56,20 +56,15 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/158225/iOS-macOS-Wifi-Proximity-Kernel-Double-Free.html",
"url": "http://packetstormsecurity.com/files/158225/iOS-macOS-Wifi-Proximity-Kernel-Double-Free.html"
"name": "https://support.apple.com/HT211170"
}
]
},

View File

@ -145,46 +145,6 @@
"url": "https://support.apple.com/HT211177",
"refsource": "MISC",
"name": "https://support.apple.com/HT211177"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200710 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0006",
"url": "http://www.openwall.com/lists/oss-security/2020/07/10/1"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-ab074c6cdf",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDBXQ2XA6X4DP4YTPXBOMKSLWUED2KAR/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4724",
"url": "https://www.debian.org/security/2020/dsa-4724"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-d2736ee493",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GER2ATKZXDHM7FFYJH67ZPNZZX5VOUVM/"
},
{
"refsource": "UBUNTU",
"name": "USN-4422-1",
"url": "https://usn.ubuntu.com/4422-1/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1064",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-11",
"url": "https://security.gentoo.org/glsa/202007-11"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/159447/Safari-Type-Confusion-Sandbox-Escape.html",
"url": "http://packetstormsecurity.com/files/159447/Safari-Type-Confusion-Sandbox-Escape.html"
}
]
},

View File

@ -78,16 +78,16 @@
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211168",
"refsource": "MISC",
"name": "https://support.apple.com/HT211168"
},
{
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"url": "https://support.apple.com/HT211171",
"refsource": "MISC",

View File

@ -49,11 +49,6 @@
"url": "https://support.apple.com/HT211170",
"refsource": "MISC",
"name": "https://support.apple.com/HT211170"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/159447/Safari-Type-Confusion-Sandbox-Escape.html",
"url": "http://packetstormsecurity.com/files/159447/Safari-Type-Confusion-Sandbox-Escape.html"
}
]
},

View File

@ -4,14 +4,155 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-9862",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "product-security@apple.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apple",
"product": {
"product_data": [
{
"product_name": "iOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "iOS 13.6 and iPadOS 13.6"
}
]
}
},
{
"product_name": "tvOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "tvOS 13.4.8"
}
]
}
},
{
"product_name": "watchOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "watchOS 6.2.8"
}
]
}
},
{
"product_name": "Safari",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "Safari 13.1.2"
}
]
}
},
{
"product_name": "iTunes for Windows",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "iTunes 12.10.8 for Windows"
}
]
}
},
{
"product_name": "iCloud for Windows",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "iCloud for Windows 11.3"
}
]
}
},
{
"product_name": "iCloud for Windows (Legacy)",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "iCloud for Windows 7.20"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Copying a URL from Web Inspector may lead to command injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211288",
"refsource": "MISC",
"name": "https://support.apple.com/HT211288"
},
{
"url": "https://support.apple.com/HT211290",
"refsource": "MISC",
"name": "https://support.apple.com/HT211290"
},
{
"url": "https://support.apple.com/HT211291",
"refsource": "MISC",
"name": "https://support.apple.com/HT211291"
},
{
"url": "https://support.apple.com/HT211292",
"refsource": "MISC",
"name": "https://support.apple.com/HT211292"
},
{
"url": "https://support.apple.com/HT211293",
"refsource": "MISC",
"name": "https://support.apple.com/HT211293"
},
{
"url": "https://support.apple.com/HT211294",
"refsource": "MISC",
"name": "https://support.apple.com/HT211294"
},
{
"url": "https://support.apple.com/HT211295",
"refsource": "MISC",
"name": "https://support.apple.com/HT211295"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection."
}
]
}

View File

@ -4,14 +4,59 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-9864",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "product-security@apple.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apple",
"product": {
"product_data": [
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "macOS Catalina 10.15.6"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "An application may be able to execute arbitrary code with kernel privileges"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211289",
"refsource": "MISC",
"name": "https://support.apple.com/HT211289"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Catalina 10.15.6. An application may be able to execute arbitrary code with kernel privileges."
}
]
}

View File

@ -4,14 +4,107 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-9865",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "product-security@apple.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apple",
"product": {
"product_data": [
{
"product_name": "iOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "iOS 13.6 and iPadOS 13.6"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "macOS Catalina 10.15.6"
}
]
}
},
{
"product_name": "tvOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "tvOS 13.4.8"
}
]
}
},
{
"product_name": "watchOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "watchOS 6.2.8"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "A malicious application may be able to break out of its sandbox"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211289",
"refsource": "MISC",
"name": "https://support.apple.com/HT211289"
},
{
"url": "https://support.apple.com/HT211288",
"refsource": "MISC",
"name": "https://support.apple.com/HT211288"
},
{
"url": "https://support.apple.com/HT211290",
"refsource": "MISC",
"name": "https://support.apple.com/HT211290"
},
{
"url": "https://support.apple.com/HT211291",
"refsource": "MISC",
"name": "https://support.apple.com/HT211291"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A memory corruption issue was addressed by removing the vulnerable code. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A malicious application may be able to break out of its sandbox."
}
]
}

View File

@ -4,14 +4,91 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-9870",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "product-security@apple.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apple",
"product": {
"product_data": [
{
"product_name": "iOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "iOS 13.6 and iPadOS 13.6"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "macOS Catalina 10.15.6"
}
]
}
},
{
"product_name": "tvOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "tvOS 13.4.8"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "An attacker with memory write capability may be able to bypass pointer authentication codes and run arbitrary code"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211289",
"refsource": "MISC",
"name": "https://support.apple.com/HT211289"
},
{
"url": "https://support.apple.com/HT211288",
"refsource": "MISC",
"name": "https://support.apple.com/HT211288"
},
{
"url": "https://support.apple.com/HT211290",
"refsource": "MISC",
"name": "https://support.apple.com/HT211290"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A logic issue was addressed with improved validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8. An attacker with memory write capability may be able to bypass pointer authentication codes and run arbitrary code."
}
]
}

View File

@ -4,14 +4,102 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-9878",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "product-security@apple.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apple",
"product": {
"product_data": [
{
"product_name": "iOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "iOS 13.6 and iPadOS 13.6"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "macOS Catalina 10.15.6"
}
]
}
},
{
"product_name": "tvOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "tvOS 13.4.8"
}
]
}
},
{
"product_name": "watchOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "watchOS 6.2.8"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211289",
"refsource": "MISC",
"name": "https://support.apple.com/HT211289"
},
{
"url": "https://support.apple.com/HT211288",
"refsource": "MISC",
"name": "https://support.apple.com/HT211288"
},
{
"url": "https://support.apple.com/HT211291",
"refsource": "MISC",
"name": "https://support.apple.com/HT211291"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution."
}
]
}

View File

@ -4,14 +4,92 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-9884",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "product-security@apple.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apple",
"product": {
"product_data": [
{
"product_name": "iOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "iOS 13.6 and iPadOS 13.6"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "macOS Catalina 10.15.6"
}
]
}
},
{
"product_name": "tvOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "tvOS 13.4.8"
}
]
}
},
{
"product_name": "watchOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "watchOS 6.2.8"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Processing a maliciously crafted audio file may lead to arbitrary code execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211289",
"refsource": "MISC",
"name": "https://support.apple.com/HT211289"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted audio file may lead to arbitrary code execution."
}
]
}

View File

@ -4,14 +4,107 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-9885",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "product-security@apple.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apple",
"product": {
"product_data": [
{
"product_name": "iOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "iOS 13.6 and iPadOS 13.6"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "macOS Catalina 10.15.6"
}
]
}
},
{
"product_name": "tvOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "tvOS 13.4.8"
}
]
}
},
{
"product_name": "watchOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "watchOS 6.2.8"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "A user that is removed from an iMessage group could rejoin the group"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211289",
"refsource": "MISC",
"name": "https://support.apple.com/HT211289"
},
{
"url": "https://support.apple.com/HT211288",
"refsource": "MISC",
"name": "https://support.apple.com/HT211288"
},
{
"url": "https://support.apple.com/HT211290",
"refsource": "MISC",
"name": "https://support.apple.com/HT211290"
},
{
"url": "https://support.apple.com/HT211291",
"refsource": "MISC",
"name": "https://support.apple.com/HT211291"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue existed in the handling of iMessage tapbacks. The issue was resolved with additional verification. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A user that is removed from an iMessage group could rejoin the group."
}
]
}

View File

@ -4,14 +4,107 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-9888",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "product-security@apple.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apple",
"product": {
"product_data": [
{
"product_name": "iOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "iOS 13.6 and iPadOS 13.6"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "macOS Catalina 10.15.6"
}
]
}
},
{
"product_name": "tvOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "tvOS 13.4.8"
}
]
}
},
{
"product_name": "watchOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "watchOS 6.2.8"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Processing a maliciously crafted audio file may lead to arbitrary code execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211289",
"refsource": "MISC",
"name": "https://support.apple.com/HT211289"
},
{
"url": "https://support.apple.com/HT211288",
"refsource": "MISC",
"name": "https://support.apple.com/HT211288"
},
{
"url": "https://support.apple.com/HT211290",
"refsource": "MISC",
"name": "https://support.apple.com/HT211290"
},
{
"url": "https://support.apple.com/HT211291",
"refsource": "MISC",
"name": "https://support.apple.com/HT211291"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted audio file may lead to arbitrary code execution."
}
]
}

View File

@ -4,14 +4,107 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-9889",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "product-security@apple.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apple",
"product": {
"product_data": [
{
"product_name": "iOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "iOS 13.6 and iPadOS 13.6"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "macOS Catalina 10.15.6"
}
]
}
},
{
"product_name": "tvOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "tvOS 13.4.8"
}
]
}
},
{
"product_name": "watchOS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "watchOS 6.2.8"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Processing a maliciously crafted audio file may lead to arbitrary code execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.apple.com/HT211289",
"refsource": "MISC",
"name": "https://support.apple.com/HT211289"
},
{
"url": "https://support.apple.com/HT211288",
"refsource": "MISC",
"name": "https://support.apple.com/HT211288"
},
{
"url": "https://support.apple.com/HT211290",
"refsource": "MISC",
"name": "https://support.apple.com/HT211290"
},
{
"url": "https://support.apple.com/HT211291",
"refsource": "MISC",
"name": "https://support.apple.com/HT211291"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted audio file may lead to arbitrary code execution."
}
]
}