From d3183a2e014f68285992d43ad1ed78c874f58fba Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 27 Oct 2020 20:02:18 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/4xxx/CVE-2018-4296.json | 59 ++++++++++++-- 2018/4xxx/CVE-2018-4339.json | 59 ++++++++++++-- 2018/4xxx/CVE-2018-4381.json | 75 ++++++++++++++++-- 2018/4xxx/CVE-2018-4390.json | 91 +++++++++++++++++++-- 2018/4xxx/CVE-2018-4391.json | 91 +++++++++++++++++++-- 2018/4xxx/CVE-2018-4428.json | 59 ++++++++++++-- 2018/4xxx/CVE-2018-4433.json | 123 +++++++++++++++++++++++++++-- 2018/4xxx/CVE-2018-4444.json | 107 +++++++++++++++++++++++-- 2018/4xxx/CVE-2018-4448.json | 123 +++++++++++++++++++++++++++-- 2018/4xxx/CVE-2018-4451.json | 59 ++++++++++++-- 2018/4xxx/CVE-2018-4452.json | 75 ++++++++++++++++-- 2018/4xxx/CVE-2018-4467.json | 75 ++++++++++++++++-- 2018/4xxx/CVE-2018-4468.json | 59 ++++++++++++-- 2018/4xxx/CVE-2018-4474.json | 139 +++++++++++++++++++++++++++++++-- 2019/16xxx/CVE-2019-16729.json | 5 ++ 2019/6xxx/CVE-2019-6238.json | 59 ++++++++++++-- 2019/7xxx/CVE-2019-7288.json | 75 ++++++++++++++++-- 2019/8xxx/CVE-2019-8509.json | 75 ++++++++++++++++-- 2019/8xxx/CVE-2019-8525.json | 107 +++++++++++++++++++++++-- 2019/8xxx/CVE-2019-8532.json | 75 ++++++++++++++++-- 2020/11xxx/CVE-2020-11996.json | 5 ++ 2020/27xxx/CVE-2020-27888.json | 58 ++------------ 22 files changed, 1469 insertions(+), 184 deletions(-) diff --git a/2018/4xxx/CVE-2018-4296.json b/2018/4xxx/CVE-2018-4296.json index a8c39b8c2a3..2d3e1ce5d06 100644 --- a/2018/4xxx/CVE-2018-4296.json +++ b/2018/4xxx/CVE-2018-4296.json @@ -1,17 +1,62 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-4296", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-4296", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.14" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Description: A permissions issue existed in DiskArbitration. This was addressed with additional ownership checks." + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209139", + "name": "https://support.apple.com/en-us/HT209139" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This issue is fixed in macOS Mojave 10.14. A permissions issue existed in DiskArbitration. This was addressed with additional ownership checks." } ] } diff --git a/2018/4xxx/CVE-2018-4339.json b/2018/4xxx/CVE-2018-4339.json index 48c003c690a..c9a9027f3c5 100644 --- a/2018/4xxx/CVE-2018-4339.json +++ b/2018/4xxx/CVE-2018-4339.json @@ -1,17 +1,62 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-4339", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-4339", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "iOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "A local user may be able to read a persistent device identifier" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209192", + "name": "https://support.apple.com/en-us/HT209192" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This issue was addressed with a new entitlement. This issue is fixed in iOS 12.1. A local user may be able to read a persistent device identifier." } ] } diff --git a/2018/4xxx/CVE-2018-4381.json b/2018/4xxx/CVE-2018-4381.json index 5a746bd9c0d..04d8daa746f 100644 --- a/2018/4xxx/CVE-2018-4381.json +++ b/2018/4xxx/CVE-2018-4381.json @@ -1,17 +1,78 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-4381", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-4381", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "iOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.1" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Processing a maliciously crafted message may lead to a denial of service" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209192", + "name": "https://support.apple.com/en-us/HT209192" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209194", + "name": "https://support.apple.com/en-us/HT209194" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A resource exhaustion issue was addressed with improved input validation. This issue is fixed in tvOS 12.1, iOS 12.1. Processing a maliciously crafted message may lead to a denial of service." } ] } diff --git a/2018/4xxx/CVE-2018-4390.json b/2018/4xxx/CVE-2018-4390.json index 4b12a1c460c..216d1c14a04 100644 --- a/2018/4xxx/CVE-2018-4390.json +++ b/2018/4xxx/CVE-2018-4390.json @@ -1,17 +1,94 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-4390", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-4390", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.13" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "4.3" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Processing a maliciously crafted text message may lead to UI spoofing" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209192", + "name": "https://support.apple.com/en-us/HT209192" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT208221", + "name": "https://support.apple.com/en-us/HT208221" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT208696", + "name": "https://support.apple.com/en-us/HT208696" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An inconsistent user interface issue was addressed with improved state management. This issue is fixed in macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan, watchOS 4.3, iOS 12.1. Processing a maliciously crafted text message may lead to UI spoofing." } ] } diff --git a/2018/4xxx/CVE-2018-4391.json b/2018/4xxx/CVE-2018-4391.json index b5b784c2a52..83d4df95669 100644 --- a/2018/4xxx/CVE-2018-4391.json +++ b/2018/4xxx/CVE-2018-4391.json @@ -1,17 +1,94 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-4391", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-4391", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.13" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "4.3" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Processing a maliciously crafted text message may lead to UI spoofing" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209192", + "name": "https://support.apple.com/en-us/HT209192" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT208221", + "name": "https://support.apple.com/en-us/HT208221" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT208696", + "name": "https://support.apple.com/en-us/HT208696" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An inconsistent user interface issue was addressed with improved state management. This issue is fixed in macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan, watchOS 4.3, iOS 12.1. Processing a maliciously crafted text message may lead to UI spoofing." } ] } diff --git a/2018/4xxx/CVE-2018-4428.json b/2018/4xxx/CVE-2018-4428.json index 14a91583514..2c01ccbc102 100644 --- a/2018/4xxx/CVE-2018-4428.json +++ b/2018/4xxx/CVE-2018-4428.json @@ -1,17 +1,62 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-4428", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-4428", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "iOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "A local attacker may be able to share items from the lock screen" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209340", + "name": "https://support.apple.com/en-us/HT209340" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A lock screen issue allowed access to the share function on a locked device. This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 12.1.1. A local attacker may be able to share items from the lock screen." } ] } diff --git a/2018/4xxx/CVE-2018-4433.json b/2018/4xxx/CVE-2018-4433.json index 1eb97f3f9bb..0f1f14e4fbd 100644 --- a/2018/4xxx/CVE-2018-4433.json +++ b/2018/4xxx/CVE-2018-4433.json @@ -1,17 +1,126 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-4433", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-4433", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "iOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.14" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.14" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "A malicious application may be able to modify protected parts of the file system" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209139", + "name": "https://support.apple.com/en-us/HT209139" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209106", + "name": "https://support.apple.com/en-us/HT209106" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209107", + "name": "https://support.apple.com/en-us/HT209107" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209108", + "name": "https://support.apple.com/en-us/HT209108" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209600", + "name": "https://support.apple.com/en-us/HT209600" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A configuration issue was addressed with additional restrictions. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, watchOS 5, iOS 12, tvOS 12, macOS Mojave 10.14. A malicious application may be able to modify protected parts of the file system." } ] } diff --git a/2018/4xxx/CVE-2018-4444.json b/2018/4xxx/CVE-2018-4444.json index 6650101fa6d..ae3765f8865 100644 --- a/2018/4xxx/CVE-2018-4444.json +++ b/2018/4xxx/CVE-2018-4444.json @@ -1,17 +1,110 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-4444", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-4444", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "iOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.1" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.1" + } + ] + } + }, + { + "product_name": "Safari", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.0" + } + ] + } + }, + { + "product_name": "iTunes for Windows", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.9" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Processing maliciously crafted web content may disclose sensitive user information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209340", + "name": "https://support.apple.com/en-us/HT209340" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209342", + "name": "https://support.apple.com/en-us/HT209342" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209344", + "name": "https://support.apple.com/en-us/HT209344" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209345", + "name": "https://support.apple.com/en-us/HT209345" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A logic issue was addressed with improved state management. This issue is fixed in Safari 12.0.2, iOS 12.1.1, tvOS 12.1.1, iTunes 12.9.2 for Windows. Processing maliciously crafted web content may disclose sensitive user information." } ] } diff --git a/2018/4xxx/CVE-2018-4448.json b/2018/4xxx/CVE-2018-4448.json index c6ca2b725ab..8db8f4e9a5f 100644 --- a/2018/4xxx/CVE-2018-4448.json +++ b/2018/4xxx/CVE-2018-4448.json @@ -1,17 +1,126 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-4448", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-4448", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "iOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.1" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.14" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.1" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "5.1" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.14" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "A local user may be able to read kernel memory" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209340", + "name": "https://support.apple.com/en-us/HT209340" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209342", + "name": "https://support.apple.com/en-us/HT209342" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209600", + "name": "https://support.apple.com/en-us/HT209600" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209341", + "name": "https://support.apple.com/en-us/HT209341" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209343", + "name": "https://support.apple.com/en-us/HT209343" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.1.1, watchOS 5.1.2, macOS Mojave 10.14.2, Security Update 2018-003 High Sierra, Security Update 2018-006 Sierra, tvOS 12.1.1. A local user may be able to read kernel memory." } ] } diff --git a/2018/4xxx/CVE-2018-4451.json b/2018/4xxx/CVE-2018-4451.json index a92fcbaaa06..d0fbfaed9cc 100644 --- a/2018/4xxx/CVE-2018-4451.json +++ b/2018/4xxx/CVE-2018-4451.json @@ -1,17 +1,62 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-4451", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-4451", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.14" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Description: A memory corruption issue was addressed with improved input validation." + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209139", + "name": "https://support.apple.com/en-us/HT209139" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This issue is fixed in macOS Mojave 10.14. A memory corruption issue was addressed with improved input validation." } ] } diff --git a/2018/4xxx/CVE-2018-4452.json b/2018/4xxx/CVE-2018-4452.json index 8ef696f6996..08743956d9b 100644 --- a/2018/4xxx/CVE-2018-4452.json +++ b/2018/4xxx/CVE-2018-4452.json @@ -1,17 +1,78 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-4452", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-4452", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.14" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.14" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "A malicious application may be able to execute arbitrary code with system privileges" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209341", + "name": "https://support.apple.com/en-us/HT209341" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209446", + "name": "https://support.apple.com/en-us/HT209446" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A memory consumption issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.3, Security Update 2019-001 High Sierra, Security Update 2019-001 Sierra, macOS Mojave 10.14.2, Security Update 2018-003 High Sierra, Security Update 2018-006 Sierra. A malicious application may be able to execute arbitrary code with system privileges." } ] } diff --git a/2018/4xxx/CVE-2018-4467.json b/2018/4xxx/CVE-2018-4467.json index 51ea668ae1a..fb4915954a9 100644 --- a/2018/4xxx/CVE-2018-4467.json +++ b/2018/4xxx/CVE-2018-4467.json @@ -1,17 +1,78 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-4467", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-4467", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.14" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.14" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "A malicious application may be able to elevate privileges" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209341", + "name": "https://support.apple.com/en-us/HT209341" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209446", + "name": "https://support.apple.com/en-us/HT209446" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.3, Security Update 2019-001 High Sierra, Security Update 2019-001 Sierra, macOS Mojave 10.14.2, Security Update 2018-003 High Sierra, Security Update 2018-006 Sierra. A malicious application may be able to elevate privileges." } ] } diff --git a/2018/4xxx/CVE-2018-4468.json b/2018/4xxx/CVE-2018-4468.json index 50786690a37..9fc6adcbf2a 100644 --- a/2018/4xxx/CVE-2018-4468.json +++ b/2018/4xxx/CVE-2018-4468.json @@ -1,17 +1,62 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-4468", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-4468", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.14" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "A malicious application may be able to access restricted files" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209193", + "name": "https://support.apple.com/en-us/HT209193" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This issue was addressed by removing additional entitlements. This issue is fixed in macOS Mojave 10.14.1, Security Update 2018-002 High Sierra, Security Update 2018-005 Sierra. A malicious application may be able to access restricted files." } ] } diff --git a/2018/4xxx/CVE-2018-4474.json b/2018/4xxx/CVE-2018-4474.json index cfe1fa6d27d..07f403eb647 100644 --- a/2018/4xxx/CVE-2018-4474.json +++ b/2018/4xxx/CVE-2018-4474.json @@ -1,17 +1,142 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-4474", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-4474", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "iOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "5" + } + ] + } + }, + { + "product_name": "Safari", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12" + } + ] + } + }, + { + "product_name": "iTunes for Windows", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.9" + } + ] + } + }, + { + "product_name": "iCloud for Windows", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "7.7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Unexpected interaction causes an ASSERT failure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209106", + "name": "https://support.apple.com/en-us/HT209106" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209107", + "name": "https://support.apple.com/en-us/HT209107" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209108", + "name": "https://support.apple.com/en-us/HT209108" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209109", + "name": "https://support.apple.com/en-us/HT209109" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209140", + "name": "https://support.apple.com/en-us/HT209140" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209141", + "name": "https://support.apple.com/en-us/HT209141" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A memory consumption issue was addressed with improved memory handling. This issue is fixed in iCloud for Windows 7.7, watchOS 5, Safari 12, iOS 12, iTunes 12.9 for Windows, tvOS 12. Unexpected interaction causes an ASSERT failure." } ] } diff --git a/2019/16xxx/CVE-2019-16729.json b/2019/16xxx/CVE-2019-16729.json index 3d29b3bed10..b0757ee74ef 100644 --- a/2019/16xxx/CVE-2019-16729.json +++ b/2019/16xxx/CVE-2019-16729.json @@ -81,6 +81,11 @@ "refsource": "UBUNTU", "name": "USN-4552-1", "url": "https://usn.ubuntu.com/4552-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4552-2", + "url": "https://usn.ubuntu.com/4552-2/" } ] } diff --git a/2019/6xxx/CVE-2019-6238.json b/2019/6xxx/CVE-2019-6238.json index c4c78c57832..0962cdc6f41 100644 --- a/2019/6xxx/CVE-2019-6238.json +++ b/2019/6xxx/CVE-2019-6238.json @@ -1,17 +1,62 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6238", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6238", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.14" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Processing a maliciously crafted package may lead to arbitrary code execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209600", + "name": "https://support.apple.com/en-us/HT209600" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. Processing a maliciously crafted package may lead to arbitrary code execution." } ] } diff --git a/2019/7xxx/CVE-2019-7288.json b/2019/7xxx/CVE-2019-7288.json index 4a36268d7df..6cf67a2dc6c 100644 --- a/2019/7xxx/CVE-2019-7288.json +++ b/2019/7xxx/CVE-2019-7288.json @@ -1,17 +1,78 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-7288", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-7288", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "iOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.1" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.14" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "A thorough security audit of the FaceTime service uncovered an issue with Live Photos\u00a0" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209520", + "name": "https://support.apple.com/en-us/HT209520" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209521", + "name": "https://support.apple.com/en-us/HT209521" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The issue was addressed with improved validation on the FaceTime server. This issue is fixed in macOS Mojave 10.14.3 Supplemental Update, iOS 12.1.4. A thorough security audit of the FaceTime service uncovered an issue with Live Photos ." } ] } diff --git a/2019/8xxx/CVE-2019-8509.json b/2019/8xxx/CVE-2019-8509.json index 54adbc0c423..ac6aeb59185 100644 --- a/2019/8xxx/CVE-2019-8509.json +++ b/2019/8xxx/CVE-2019-8509.json @@ -1,17 +1,78 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-8509", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-8509", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.15" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.15" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "A malicious application may be able to elevate privileges" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT210634", + "name": "https://support.apple.com/en-us/HT210634" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT210722", + "name": "https://support.apple.com/en-us/HT210722" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Catalina 10.15. A malicious application may be able to elevate privileges." } ] } diff --git a/2019/8xxx/CVE-2019-8525.json b/2019/8xxx/CVE-2019-8525.json index 4905c7213fd..00c0a9073a9 100644 --- a/2019/8xxx/CVE-2019-8525.json +++ b/2019/8xxx/CVE-2019-8525.json @@ -1,17 +1,110 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-8525", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-8525", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "iOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.2" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.14" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "5.2" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "10.14" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An application may be able to execute arbitrary code with kernel privileges" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209600", + "name": "https://support.apple.com/en-us/HT209600" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209599", + "name": "https://support.apple.com/en-us/HT209599" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209602", + "name": "https://support.apple.com/en-us/HT209602" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT210119", + "name": "https://support.apple.com/en-us/HT210119" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. An application may be able to execute arbitrary code with kernel privileges." } ] } diff --git a/2019/8xxx/CVE-2019-8532.json b/2019/8xxx/CVE-2019-8532.json index f33343e44c8..514ab8bd4f1 100644 --- a/2019/8xxx/CVE-2019-8532.json +++ b/2019/8xxx/CVE-2019-8532.json @@ -1,17 +1,78 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-8532", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-8532", + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "iOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.2" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "A malicious application may be able to access restricted files" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209599", + "name": "https://support.apple.com/en-us/HT209599" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT209602", + "name": "https://support.apple.com/en-us/HT209602" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A permissions issue was addressed by removing vulnerable code and adding additional checks. This issue is fixed in watchOS 5.2, iOS 12.2. A malicious application may be able to access restricted files." } ] } diff --git a/2020/11xxx/CVE-2020-11996.json b/2020/11xxx/CVE-2020-11996.json index 1fe9f851adb..d1b6d5024e6 100644 --- a/2020/11xxx/CVE-2020-11996.json +++ b/2020/11xxx/CVE-2020-11996.json @@ -154,6 +154,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200709-0002/", "url": "https://security.netapp.com/advisory/ntap-20200709-0002/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4596-1", + "url": "https://usn.ubuntu.com/4596-1/" } ] }, diff --git a/2020/27xxx/CVE-2020-27888.json b/2020/27xxx/CVE-2020-27888.json index c4b704c453d..67aca2fce69 100644 --- a/2020/27xxx/CVE-2020-27888.json +++ b/2020/27xxx/CVE-2020-27888.json @@ -1,61 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2020-27888", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-27888", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, "description": { "description_data": [ { "lang": "eng", - "value": "An issue was discovered on Ubiquiti UniFi Meshing Access Point UAP-AC-M 4.3.21.11325 and UniFi Controller 6.0.28 devices. Cached credentials are not erased from an access point returning wirelessly from a disconnected state. This may provide unintended network access." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://community.ui.com/questions/Possible-authentication-bypass-for-access-into-LAN/7965adb2-5d70-4410-8467-4c7bec76bc00", - "refsource": "MISC", - "name": "https://community.ui.com/questions/Possible-authentication-bypass-for-access-into-LAN/7965adb2-5d70-4410-8467-4c7bec76bc00" + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." } ] }