var-201912-0119
Vulnerability from variot
A validation issue existed in the entitlement verification. This issue was addressed with improved validation of the process entitlement. This issue is fixed in macOS Catalina 10.15.1. An application may be able to execute arbitrary code with system privileges. Apple Has released an update for each product.The expected impact depends on each vulnerability, but can be affected as follows: * * information leak * * User impersonation * * Arbitrary code execution * * UI Spoofing * * Insufficient access restrictions * * Service operation interruption (DoS) * * Privilege escalation * * Memory corruption * * Authentication bypass. Apple macOS Catalina is a set of dedicated operating systems developed by Apple for Mac computers. System Extensions is one of the system extensions. There is a security vulnerability in the System Extensions component of Apple macOS Catalina versions prior to 10.15.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-0119", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mac os x", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "10.15.1" }, { "model": "icloud", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "for windows 11.0 earlier" }, { "model": "icloud", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "for windows 7.15 earlier" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "13.2 earlier" }, { "model": "ipados", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "13.2 earlier" }, { "model": "itunes", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "12.10.2 for windows earlier" }, { "model": "macos catalina", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "10.15.1 earlier" }, { "model": "macos high sierra", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.13.6 (security update 2019-006 not applied )" }, { "model": "macos mojave", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.14.6 (security update 2019-001 not applied )" }, { "model": "safari", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "13.0.3 earlier" }, { "model": "tvos", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "13.2 earlier" }, { "model": "watchos", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "6.1 earlier" }, { "model": "xcode", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "11.2 earlier" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011304" }, { "db": "NVD", "id": "CVE-2019-8805" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.15.1", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-8805" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Scott Knight (@sdotknight) of VMware Carbon Black TAU", "sources": [ { "db": "CNNVD", "id": "CNNVD-201910-1747" } ], "trust": 0.6 }, "cve": "CVE-2019-8805", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-160240", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2019-8805", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-8805", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201910-1747", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-160240", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-8805", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-160240" }, { "db": "VULMON", "id": "CVE-2019-8805" }, { "db": "NVD", "id": "CVE-2019-8805" }, { "db": "CNNVD", "id": "CNNVD-201910-1747" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A validation issue existed in the entitlement verification. This issue was addressed with improved validation of the process entitlement. This issue is fixed in macOS Catalina 10.15.1. An application may be able to execute arbitrary code with system privileges. Apple Has released an update for each product.The expected impact depends on each vulnerability, but can be affected as follows: * * information leak * * User impersonation * * Arbitrary code execution * * UI Spoofing * * Insufficient access restrictions * * Service operation interruption (DoS) * * Privilege escalation * * Memory corruption * * Authentication bypass. Apple macOS Catalina is a set of dedicated operating systems developed by Apple for Mac computers. System Extensions is one of the system extensions. There is a security vulnerability in the System Extensions component of Apple macOS Catalina versions prior to 10.15.1", "sources": [ { "db": "NVD", "id": "CVE-2019-8805" }, { "db": "JVNDB", "id": "JVNDB-2019-011304" }, { "db": "VULHUB", "id": "VHN-160240" }, { "db": "VULMON", "id": "CVE-2019-8805" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-8805", "trust": 2.6 }, { "db": "JVN", "id": "JVNVU96749516", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-011304", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201910-1747", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.4010", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2020-03283", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-160240", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-8805", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-160240" }, { "db": "VULMON", "id": "CVE-2019-8805" }, { "db": "JVNDB", "id": "JVNDB-2019-011304" }, { "db": "NVD", "id": "CVE-2019-8805" }, { "db": "CNNVD", "id": "CNNVD-201910-1747" } ] }, "id": "VAR-201912-0119", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-160240" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:10:22.357000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "About the security content of iCloud for Windows 11.0", "trust": 0.8, "url": "https://support.apple.com/en-us/ht210727" }, { "title": "About the security content of iCloud for Windows 7.15", "trust": 0.8, "url": "https://support.apple.com/en-us/ht210728" }, { "title": "About the security content of iOS 13.2 and iPadOS 13.2", "trust": 0.8, "url": "https://support.apple.com/en-us/ht210721" }, { "title": "About the security content of Xcode 11.2", "trust": 0.8, "url": "https://support.apple.com/en-us/ht210729" }, { "title": "About the security content of macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006", "trust": 0.8, "url": "https://support.apple.com/en-us/ht210722" }, { "title": "About the security content of tvOS 13.2", "trust": 0.8, "url": "https://support.apple.com/en-us/ht210723" }, { "title": "About the security content of watchOS 6.1", "trust": 0.8, "url": "https://support.apple.com/en-us/ht210724" }, { "title": "About the security content of Safari 13.0.3", "trust": 0.8, "url": "https://support.apple.com/en-us/ht210725" }, { "title": "About the security content of iTunes 12.10.2 for Windows", "trust": 0.8, "url": "https://support.apple.com/en-us/ht210726" }, { "title": "Mac \u306b\u642d\u8f09\u3055\u308c\u3066\u3044\u308b macOS \u3092\u8abf\u3079\u308b", "trust": 0.8, "url": "https://support.apple.com/ja-jp/ht201260" }, { "title": "Apple macOS Catalina System Extensions Fixes for component security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=101493" }, { "title": "Apple: macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=25cf0d869bfd0e91074f5ca5a31d8ef0" }, { "title": "OSMR-CheatSheet", "trust": 0.1, "url": "https://github.com/v0lk3n/osmr-cheatsheet " } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-8805" }, { "db": "JVNDB", "id": "JVNDB-2019-011304" }, { "db": "CNNVD", "id": "CNNVD-201910-1747" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-160240" }, { "db": "NVD", "id": "CVE-2019-8805" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://support.apple.com/ht210722" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8805" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8788" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8803" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8815" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8766" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8735" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8789" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8804" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8816" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8775" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8793" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8805" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8710" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8819" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8782" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8794" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8807" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8743" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8820" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8783" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8795" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8811" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8747" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8821" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8784" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8797" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8812" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8750" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8822" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8785" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8798" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8813" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8764" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8823" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8786" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8802" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8814" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8765" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8787" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96749516/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8812" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8750" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8822" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8785" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8797" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8813" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8764" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8823" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8786" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8798" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8814" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8765" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8787" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8802" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8815" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8766" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8788" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8803" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8804" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8816" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8775" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8789" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8710" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8819" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8782" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8793" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8807" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8743" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8820" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8783" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8794" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8811" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8747" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8821" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8784" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8735" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8795" }, { "trust": 0.6, "url": "https://support.apple.com/en-au/ht201222" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/apple-macos-multiple-vulnerabilities-30747" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4010/" }, { "trust": 0.6, "url": "https://support.apple.com/en-us/ht210722" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht210722" } ], "sources": [ { "db": "VULHUB", "id": "VHN-160240" }, { "db": "VULMON", "id": "CVE-2019-8805" }, { "db": "JVNDB", "id": "JVNDB-2019-011304" }, { "db": "NVD", "id": "CVE-2019-8805" }, { "db": "CNNVD", "id": "CNNVD-201910-1747" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-160240" }, { "db": "VULMON", "id": "CVE-2019-8805" }, { "db": "JVNDB", "id": "JVNDB-2019-011304" }, { "db": "NVD", "id": "CVE-2019-8805" }, { "db": "CNNVD", "id": "CNNVD-201910-1747" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-18T00:00:00", "db": "VULHUB", "id": "VHN-160240" }, { "date": "2019-12-18T00:00:00", "db": "VULMON", "id": "CVE-2019-8805" }, { "date": "2019-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011304" }, { "date": "2019-12-18T18:15:43.083000", "db": "NVD", "id": "CVE-2019-8805" }, { "date": "2019-10-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201910-1747" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-23T00:00:00", "db": "VULHUB", "id": "VHN-160240" }, { "date": "2021-07-21T00:00:00", "db": "VULMON", "id": "CVE-2019-8805" }, { "date": "2020-01-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011304" }, { "date": "2021-07-21T11:39:23.747000", "db": "NVD", "id": "CVE-2019-8805" }, { "date": "2021-10-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201910-1747" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201910-1747" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Apple Updates to product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011304" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201910-1747" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.