CVE-2020-9925

A logic issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may lead to universal cross site scripting.
References
Link Resource
https://support.apple.com/HT211288 Release Notes Vendor Advisory
https://support.apple.com/HT211290 Release Notes Vendor Advisory
https://support.apple.com/HT211291 Release Notes Vendor Advisory
https://support.apple.com/HT211292 Release Notes Vendor Advisory
https://support.apple.com/HT211293 Release Notes Vendor Advisory
https://support.apple.com/HT211294 Release Notes Vendor Advisory
https://support.apple.com/HT211295 Release Notes Vendor Advisory
https://support.apple.com/HT211288 Release Notes Vendor Advisory
https://support.apple.com/HT211290 Release Notes Vendor Advisory
https://support.apple.com/HT211291 Release Notes Vendor Advisory
https://support.apple.com/HT211292 Release Notes Vendor Advisory
https://support.apple.com/HT211293 Release Notes Vendor Advisory
https://support.apple.com/HT211294 Release Notes Vendor Advisory
https://support.apple.com/HT211295 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*
cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*
cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:41

Type Values Removed Values Added
References () https://support.apple.com/HT211288 - Release Notes, Vendor Advisory () https://support.apple.com/HT211288 - Release Notes, Vendor Advisory
References () https://support.apple.com/HT211290 - Release Notes, Vendor Advisory () https://support.apple.com/HT211290 - Release Notes, Vendor Advisory
References () https://support.apple.com/HT211291 - Release Notes, Vendor Advisory () https://support.apple.com/HT211291 - Release Notes, Vendor Advisory
References () https://support.apple.com/HT211292 - Release Notes, Vendor Advisory () https://support.apple.com/HT211292 - Release Notes, Vendor Advisory
References () https://support.apple.com/HT211293 - Release Notes, Vendor Advisory () https://support.apple.com/HT211293 - Release Notes, Vendor Advisory
References () https://support.apple.com/HT211294 - Release Notes, Vendor Advisory () https://support.apple.com/HT211294 - Release Notes, Vendor Advisory
References () https://support.apple.com/HT211295 - Release Notes, Vendor Advisory () https://support.apple.com/HT211295 - Release Notes, Vendor Advisory

Information

Published : 2020-10-16 17:15

Updated : 2024-11-21 05:41


NVD link : CVE-2020-9925

Mitre link : CVE-2020-9925

CVE.ORG link : CVE-2020-9925


JSON object : View

Products Affected

apple

  • icloud
  • watchos
  • itunes
  • iphone_os
  • ipados
  • safari
  • tvos
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')