Detect date
?
|
09/16/2015 |
Severity
?
|
Critical |
Description
|
Multiple serious vulnerabilities have been found in iTunes. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code or obtain sensitive information. Below is a complete list of vulnerabilities
Technical details (3) can be exploited to obtain encrypted SMB credentials. |
Affected products
|
Apple iTunes versions earlier than 12.3 |
Solution
|
Update to the latest version |
Original advisories
|
|
Impacts
?
|
ACE [?] OSI [?] DoS [?] SB [?] RLF [?] SUI [?] |
Related products
|
Apple iTunes |
CVE-IDS
?
|
CVE-2015-11526.8High
CVE-2015-11536.8High CVE-2015-37416.8High CVE-2015-37466.8High CVE-2015-37436.8High CVE-2015-57556.8High CVE-2015-36886.8High CVE-2015-12057.5Critical CVE-2015-37476.8High CVE-2015-37446.8High CVE-2015-58066.8High CVE-2015-37346.8High CVE-2015-37486.8High CVE-2015-37426.8High CVE-2015-37386.8High CVE-2015-37406.8High CVE-2015-37336.8High CVE-2015-58226.8High CVE-2015-58036.8High CVE-2015-58236.8High CVE-2015-58046.8High CVE-2015-57976.8High CVE-2015-57966.8High CVE-2015-11577.8Critical CVE-2015-37456.8High CVE-2015-57906.8High CVE-2015-58106.8High CVE-2015-58116.8High CVE-2015-57956.8High CVE-2015-57946.8High CVE-2015-57936.8High CVE-2015-57926.8High CVE-2015-59204.3Warning CVE-2015-58056.8High CVE-2015-37306.8High CVE-2015-57616.8High CVE-2015-58136.8High CVE-2015-58126.8High CVE-2015-57916.8High CVE-2015-57896.8High CVE-2015-58146.8High CVE-2015-58196.8High CVE-2015-57996.8High CVE-2015-36866.8High CVE-2015-36876.8High CVE-2015-58156.8High CVE-2015-58076.8High CVE-2015-58176.8High CVE-2015-58166.8High CVE-2015-37356.8High CVE-2015-37366.8High CVE-2015-58016.8High CVE-2015-58026.8High CVE-2015-57986.8High CVE-2015-58086.8High CVE-2015-58186.8High CVE-2015-37496.8High CVE-2015-37376.8High CVE-2015-37316.8High CVE-2015-37396.8High CVE-2014-81467.5Critical CVE-2010-31909.3Critical CVE-2015-58006.8High CVE-2015-58216.8High CVE-2015-58747.5Critical CVE-2015-58096.8High |
Exploitation
|
Public exploits exist for this vulnerability. |
Find out the statistics of the vulnerabilities spreading in your region |