{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T17:17:39.684","vulnerabilities":[{"cve":{"id":"CVE-2020-10005","sourceIdentifier":"product-security@apple.com","published":"2021-10-28T19:15:08.470","lastModified":"2024-11-21T04:54:38.233","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A resource exhaustion issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1. An attacker in a privileged network position may be able to perform denial of service."},{"lang":"es","value":"Se abordó un problema de agotamiento de recursos con una comprobación de entrada mejorada. Este problema se corrigió en macOS Big Sur versión 11.0.1. Un atacante en una posición de red privilegiada puede llevar a cabo una denegación de servicio"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionEndExcluding":"11.0.1","matchCriteriaId":"F2EE75CC-3796-416A-9E58-64788BB89240"}]}]}],"references":[{"url":"https://support.apple.com/en-us/HT211931","source":"product-security@apple.com","tags":["Vendor Advisory"]},{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2021-1246","source":"product-security@apple.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://support.apple.com/en-us/HT211931","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2021-1246","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}