{"api_version":"1","generated_at":"2026-04-23T02:35:01+00:00","cve":"CVE-2020-27918","urls":{"html":"https://cve.report/CVE-2020-27918","api":"https://cve.report/api/cve/CVE-2020-27918.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-27918","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-27918"},"summary":{"title":"CVE-2020-27918","description":"A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, Safari 14.0.1, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.","state":"PUBLIC","assigner":"product-security@apple.com","published_at":"2020-12-08 22:15:00","updated_at":"2023-11-07 03:21:00"},"problem_types":["CWE-416"],"metrics":[],"references":[{"url":"https://support.apple.com/en-us/HT211928","name":"https://support.apple.com/en-us/HT211928","refsource":"MISC","tags":["Vendor Advisory"],"title":"About the security content of watchOS 7.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ3U3VBSOJB46WCO66TEWE5OAXLTU3YW/","name":"FEDORA-2021-8070916f7a","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: webkit2gtk3-2.32.0-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/en-us/HT211929","name":"https://support.apple.com/en-us/HT211929","refsource":"MISC","tags":["Vendor Advisory"],"title":"About the security content of iOS 14.2 and iPadOS 14.2 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.debian.org/security/2021/dsa-4877","name":"DSA-4877","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-4877-1 webkit2gtk","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2020/Dec/32","name":"20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1","refsource":"FULLDISC","tags":[],"title":"Full Disclosure: APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202104-03","name":"GLSA-202104-03","refsource":"GENTOO","tags":[],"title":"WebkitGTK+: Multiple vulnerabilities (GLSA 202104-03) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/en-us/HT211931","name":"https://support.apple.com/en-us/HT211931","refsource":"MISC","tags":["Vendor Advisory"],"title":"About the security content of macOS Big Sur 11.0.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/","name":"FEDORA-2021-864dc37032","refsource":"","tags":[],"title":"[SECURITY] Fedora 33 Update: webkit2gtk3-2.32.0-1.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/","name":"FEDORA-2021-864dc37032","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 33 Update: webkit2gtk3-2.32.0-1.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/en-us/HT211930","name":"https://support.apple.com/en-us/HT211930","refsource":"MISC","tags":["Vendor Advisory"],"title":"About the security content of tvOS 14.2 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT211935","name":"https://support.apple.com/en-us/HT211935","refsource":"MISC","tags":["Vendor Advisory"],"title":"About the security content of iCloud for Windows 11.5 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EQ3U3VBSOJB46WCO66TEWE5OAXLTU3YW/","name":"FEDORA-2021-8070916f7a","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: webkit2gtk3-2.32.0-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/","name":"FEDORA-2021-619711d709","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 32 Update: webkit2gtk3-2.30.6-1.fc32 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2021/03/22/1","name":"[oss-security] 20210322 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0002","refsource":"MLIST","tags":[],"title":"oss-security - WebKitGTK and WPE WebKit Security Advisory WSA-2021-0002","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/","name":"FEDORA-2021-619711d709","refsource":"","tags":[],"title":"[SECURITY] Fedora 32 Update: webkit2gtk3-2.30.6-1.fc32 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT211933","name":"https://support.apple.com/en-us/HT211933","refsource":"MISC","tags":["Vendor Advisory"],"title":"About the security content of iTunes 12.11 for Windows - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT211934","name":"https://support.apple.com/en-us/HT211934","refsource":"MISC","tags":["Vendor Advisory"],"title":"About the security content of Safari 14.0.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-27918","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27918","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"icloud","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"windows","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"icloud","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"windows","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipados","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipad_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipad_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"iphone_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"iphone_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"itunes","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"windows","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"itunes","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"windows","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"safari","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"safari","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"tvos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"tvos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"watchos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"watchos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"32","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"33","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"27918","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"webkitgtk","cpe5":"webkitgtk\\+","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-27918","qid":"159499","title":"Oracle Enterprise Linux Security Update for GNOME (ELSA-2021-4381)"},{"cve":"CVE-2020-27918","qid":"174960","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2021:1430-1)"},{"cve":"CVE-2020-27918","qid":"174986","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2021:1499-1)"},{"cve":"CVE-2020-27918","qid":"178515","title":"Debian Security Update for webkit2gtk (DSA 4877-1)"},{"cve":"CVE-2020-27918","qid":"198312","title":"Ubuntu Security Notification for Webkit2gtk Vulnerabilities (USN-4894-1)"},{"cve":"CVE-2020-27918","qid":"239811","title":"Red Hat Update for gnome security (RHSA-2021:4381)"},{"cve":"CVE-2020-27918","qid":"281404","title":"Fedora Security Update for webkit2gtk3 (FEDORA-2021-619711d709)"},{"cve":"CVE-2020-27918","qid":"281405","title":"Fedora Security Update for webkit2gtk3 (FEDORA-2021-864dc37032)"},{"cve":"CVE-2020-27918","qid":"281406","title":"Fedora Security Update for webkit2gtk3 (FEDORA-2021-8070916f7a)"},{"cve":"CVE-2020-27918","qid":"296067","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 33.94.0 Missing (CPUAPR2021)"},{"cve":"CVE-2020-27918","qid":"355438","title":"Amazon Linux Security Advisory for webkitgtk4 : ALAS2-2023-2088"},{"cve":"CVE-2020-27918","qid":"501711","title":"Alpine Linux Security Update for webkit2gtk"},{"cve":"CVE-2020-27918","qid":"501939","title":"Alpine Linux Security Update for webkit2gtk"},{"cve":"CVE-2020-27918","qid":"505518","title":"Alpine Linux Security Update for webkit2gtk"},{"cve":"CVE-2020-27918","qid":"710013","title":"Gentoo Linux WebkitGTK+ Multiple Vulnerabilities (GLSA 202104-03)"},{"cve":"CVE-2020-27918","qid":"750239","title":"OpenSUSE Security Update for webkit2gtk3 (openSUSE-SU-2021:0637-1)"},{"cve":"CVE-2020-27918","qid":"750655","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2021:1990-1)"},{"cve":"CVE-2020-27918","qid":"751623","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2022:0142-1)"},{"cve":"CVE-2020-27918","qid":"751646","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2022:0183-1)"},{"cve":"CVE-2020-27918","qid":"751648","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2022:0182-1)"},{"cve":"CVE-2020-27918","qid":"751659","title":"OpenSUSE Security Update for webkit2gtk3 (openSUSE-SU-2022:0182-1)"},{"cve":"CVE-2020-27918","qid":"751755","title":"OpenSUSE Security Update for webkit2gtk3 (openSUSE-SU-2022:0182-2)"},{"cve":"CVE-2020-27918","qid":"940070","title":"AlmaLinux Security Update for GNOME (ALSA-2021:4381)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2020-27918","ASSIGNER":"product-security@apple.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apple","product":{"product_data":[{"product_name":"watchOS","version":{"version_data":[{"version_affected":"<","version_value":"7.1"}]}},{"product_name":"iOS and iPadOS","version":{"version_data":[{"version_affected":"<","version_value":"14.2"}]}},{"product_name":"tvOS","version":{"version_data":[{"version_affected":"<","version_value":"14.2"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"11.0"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"12.11"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"14.0"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"11.5"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"11.5"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Processing maliciously crafted web content may lead to arbitrary code execution"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://support.apple.com/en-us/HT211931","name":"https://support.apple.com/en-us/HT211931"},{"refsource":"MISC","url":"https://support.apple.com/en-us/HT211935","name":"https://support.apple.com/en-us/HT211935"},{"refsource":"MISC","url":"https://support.apple.com/en-us/HT211934","name":"https://support.apple.com/en-us/HT211934"},{"refsource":"MISC","url":"https://support.apple.com/en-us/HT211928","name":"https://support.apple.com/en-us/HT211928"},{"refsource":"MISC","url":"https://support.apple.com/en-us/HT211929","name":"https://support.apple.com/en-us/HT211929"},{"refsource":"MISC","url":"https://support.apple.com/en-us/HT211930","name":"https://support.apple.com/en-us/HT211930"},{"refsource":"MISC","url":"https://support.apple.com/en-us/HT211933","name":"https://support.apple.com/en-us/HT211933"},{"refsource":"FULLDISC","name":"20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1","url":"http://seclists.org/fulldisclosure/2020/Dec/32"},{"refsource":"MLIST","name":"[oss-security] 20210322 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0002","url":"http://www.openwall.com/lists/oss-security/2021/03/22/1"},{"refsource":"FEDORA","name":"FEDORA-2021-8070916f7a","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ3U3VBSOJB46WCO66TEWE5OAXLTU3YW/"},{"refsource":"DEBIAN","name":"DSA-4877","url":"https://www.debian.org/security/2021/dsa-4877"},{"refsource":"FEDORA","name":"FEDORA-2021-864dc37032","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/"},{"refsource":"FEDORA","name":"FEDORA-2021-619711d709","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/"},{"refsource":"GENTOO","name":"GLSA-202104-03","url":"https://security.gentoo.org/glsa/202104-03"}]},"description":{"description_data":[{"lang":"eng","value":"A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, Safari 14.0.1, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution."}]}},"nvd":{"publishedDate":"2020-12-08 22:15:00","lastModifiedDate":"2023-11-07 03:21:00","problem_types":["CWE-416"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","versionEndExcluding":"14.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*","versionEndExcluding":"12.11","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndExcluding":"14.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","versionEndExcluding":"7.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*","versionEndExcluding":"11.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionEndExcluding":"14.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*","versionEndExcluding":"14.0.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionEndExcluding":"11.0.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*","versionEndExcluding":"2.30.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"27918","Ordinal":"189654","Title":"CVE-2020-27918","CVE":"CVE-2020-27918","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"27918","Ordinal":"1","NoteData":"A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, Safari 14.0.1, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"27918","Ordinal":"2","NoteData":"2020-12-08","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"27918","Ordinal":"3","NoteData":"2021-04-30","Type":"Other","Title":"Modified"}]}}}