mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
158 lines
6.2 KiB
JSON
158 lines
6.2 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2020-3902",
|
|
"ASSIGNER": "product-security@apple.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Apple",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "iOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "iOS 13.4 and iPadOS 13.4"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "tvOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "tvOS 13.4"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Safari",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "Safari 13.1"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "iTunes for Windows",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "iTunes for Windows 12.10.5"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "iCloud for Windows",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "iCloud for Windows 10.9.3"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "iCloud for Windows (Legacy)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "iCloud for Windows 7.18"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Processing maliciously crafted web content may lead to a cross site scripting attack"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://support.apple.com/HT211102",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/HT211102"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/HT211101",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/HT211101"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/HT211104",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/HT211104"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/HT211105",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/HT211105"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/HT211106",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/HT211106"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/HT211107",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/HT211107"
|
|
},
|
|
{
|
|
"refsource": "MLIST",
|
|
"name": "[oss-security] 20200427 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0005",
|
|
"url": "http://www.openwall.com/lists/oss-security/2020/04/27/3"
|
|
},
|
|
{
|
|
"refsource": "DEBIAN",
|
|
"name": "DSA-4681",
|
|
"url": "https://www.debian.org/security/2020/dsa-4681"
|
|
},
|
|
{
|
|
"refsource": "GENTOO",
|
|
"name": "GLSA-202006-08",
|
|
"url": "https://security.gentoo.org/glsa/202006-08"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to a cross site scripting attack."
|
|
}
|
|
]
|
|
}
|
|
} |