mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
152 lines
5.9 KiB
JSON
152 lines
5.9 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2021-30984",
|
|
"ASSIGNER": "product-security@apple.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Apple",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "watchOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "8.3"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "iOS and iPadOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "15.2"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "macOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "12.1"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "macOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "15.2"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "macOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "15.2"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Processing maliciously crafted web content may lead to arbitrary code execution"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://support.apple.com/en-us/HT212975",
|
|
"name": "https://support.apple.com/en-us/HT212975"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://support.apple.com/en-us/HT212976",
|
|
"name": "https://support.apple.com/en-us/HT212976"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://support.apple.com/en-us/HT212978",
|
|
"name": "https://support.apple.com/en-us/HT212978"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://support.apple.com/en-us/HT212980",
|
|
"name": "https://support.apple.com/en-us/HT212980"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://support.apple.com/en-us/HT212982",
|
|
"name": "https://support.apple.com/en-us/HT212982"
|
|
},
|
|
{
|
|
"refsource": "MLIST",
|
|
"name": "[oss-security] 20220121 WebKitGTK and WPE WebKit Security Advisory WSA-2022-0001",
|
|
"url": "http://www.openwall.com/lists/oss-security/2022/01/21/2"
|
|
},
|
|
{
|
|
"refsource": "FEDORA",
|
|
"name": "FEDORA-2022-25a98f5d55",
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/"
|
|
},
|
|
{
|
|
"refsource": "DEBIAN",
|
|
"name": "DSA-5061",
|
|
"url": "https://www.debian.org/security/2022/dsa-5061"
|
|
},
|
|
{
|
|
"refsource": "DEBIAN",
|
|
"name": "DSA-5060",
|
|
"url": "https://www.debian.org/security/2022/dsa-5060"
|
|
},
|
|
{
|
|
"refsource": "FEDORA",
|
|
"name": "FEDORA-2022-f7366e60cb",
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution."
|
|
}
|
|
]
|
|
}
|
|
} |