Show filters
139 Total Results
Displaying 41-50 of 139
Sort by:
Attacker Value
Unknown

CVE-2021-1799

Disclosure Date: April 02, 2021 (last updated November 08, 2023)
A port redirection issue was addressed with additional port validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. A malicious website may be able to access restricted ports on arbitrary servers.
Attacker Value
Unknown

CVE-2020-29623

Disclosure Date: April 02, 2021 (last updated November 08, 2023)
"Clear History and Website Data" did not clear the history. The issue was addressed with improved data deletion. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. A user may be unable to fully delete browsing history.
Attacker Value
Unknown

CVE-2021-1765

Disclosure Date: April 02, 2021 (last updated November 08, 2023)
This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Maliciously crafted web content may violate iframe sandboxing policy.
Attacker Value
Unknown

CVE-2020-13558

Disclosure Date: March 03, 2021 (last updated November 28, 2024)
A code execution vulnerability exists in the AudioSourceProviderGStreamer functionality of Webkit WebKitGTK 2.30.1. A specially crafted web page can lead to a use after free.
Attacker Value
Unknown

CVE-2020-27918

Disclosure Date: December 08, 2020 (last updated February 22, 2025)
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, Safari 14.0.1, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.
Attacker Value
Unknown

CVE-2020-13584

Disclosure Date: December 03, 2020 (last updated February 22, 2025)
An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.
Attacker Value
Unknown

CVE-2020-9952

Disclosure Date: October 16, 2020 (last updated February 22, 2025)
An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.
Attacker Value
Unknown

CVE-2020-9951

Disclosure Date: October 16, 2020 (last updated February 22, 2025)
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.
Attacker Value
Unknown

CVE-2020-9948

Disclosure Date: October 16, 2020 (last updated February 22, 2025)
A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.
Attacker Value
Unknown

CVE-2020-13753

Disclosure Date: July 14, 2020 (last updated February 21, 2025)
The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.