Popis
Multiple vulnerabilities were found in iCloud. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges.
Below is a complete list of vulnerabilities:
- An out-of-bounds read vulnerability in WebKit can be exploited remotely to obtain sensitive information;
- Multiple memory corruption vulnerabilities in WebKit can be exploited remotely to execute arbitrary code;
- An input validation issue in SQLite can be exploited remotely to gain privileges;
- A memory corruption vulnerability in SQLite can be exploited to execute arbitrary code;
- An input validation issue in SQLite can be exploited remotely to obtain sensitive information;
- A memory corruption vulnerability in SQLite can be exploited to gain privileges;
- An out-of-bounds read vulnerability in CoreText can be exploited remotely to obtain sensitive information;
Oficiální doporučení
Vykořisťování
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Související produkty
seznam CVE
- CVE-2019-8601 critical
- CVE-2019-8628 critical
- CVE-2019-8597 high
- CVE-2019-8610 critical
- CVE-2019-8622 critical
- CVE-2019-8607 high
- CVE-2019-8571 critical
- CVE-2019-8586 critical
- CVE-2019-8583 critical
- CVE-2019-8611 critical
- CVE-2019-8615 high
- CVE-2019-8594 critical
- CVE-2019-8595 critical
- CVE-2019-8584 critical
- CVE-2019-6237 critical
- CVE-2019-8577 critical
- CVE-2019-8600 critical
- CVE-2019-8623 critical
- CVE-2019-8598 high
- CVE-2019-8608 high
- CVE-2019-8619 critical
- CVE-2019-8602 critical
- CVE-2019-8587 critical
- CVE-2019-8596 critical
- CVE-2019-8609 critical
- CVE-2019-8582 high
Zobrazit více
Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com
Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!