{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T17:00:40.629","vulnerabilities":[{"cve":{"id":"CVE-2020-27904","sourceIdentifier":"product-security@apple.com","published":"2020-12-08T21:15:13.077","lastModified":"2024-11-21T05:22:01.267","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A logic issue existed resulting in memory corruption. This was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges."},{"lang":"es","value":"Se presentó un problema lógico resultando en una corrupción de la memoria.&#xa0;Esto se abordó con una administración de estado mejorada.&#xa0;Este problema se corrigió en macOS Big Sur versión 11.0.1.&#xa0;Una aplicación puede ejecutar código arbitrario con privilegios de kernel"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionEndExcluding":"11.0.1","matchCriteriaId":"F2EE75CC-3796-416A-9E58-64788BB89240"}]}]}],"references":[{"url":"http://seclists.org/fulldisclosure/2020/Dec/32","source":"product-security@apple.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http://seclists.org/fulldisclosure/2021/Feb/14","source":"product-security@apple.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https://support.apple.com/en-us/HT211931","source":"product-security@apple.com","tags":["Vendor Advisory"]},{"url":"https://support.apple.com/kb/HT212147","source":"product-security@apple.com","tags":["Vendor Advisory"]},{"url":"http://seclists.org/fulldisclosure/2020/Dec/32","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://seclists.org/fulldisclosure/2021/Feb/14","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://support.apple.com/en-us/HT211931","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://support.apple.com/kb/HT212147","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}