Description
Multiple vulnerabilities were found in iCloud. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges.
Below is a complete list of vulnerabilities:
- An out-of-bounds read vulnerability in WebKit can be exploited remotely to obtain sensitive information;
- Multiple memory corruption vulnerabilities in WebKit can be exploited remotely to execute arbitrary code;
- An input validation issue in SQLite can be exploited remotely to gain privileges;
- A memory corruption vulnerability in SQLite can be exploited to execute arbitrary code;
- An input validation issue in SQLite can be exploited remotely to obtain sensitive information;
- A memory corruption vulnerability in SQLite can be exploited to gain privileges;
- An out-of-bounds read vulnerability in CoreText can be exploited remotely to obtain sensitive information;
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2019-8601 critical
- CVE-2019-8628 critical
- CVE-2019-8597 high
- CVE-2019-8610 critical
- CVE-2019-8622 critical
- CVE-2019-8607 high
- CVE-2019-8571 critical
- CVE-2019-8586 critical
- CVE-2019-8583 critical
- CVE-2019-8611 critical
- CVE-2019-8615 high
- CVE-2019-8594 critical
- CVE-2019-8595 critical
- CVE-2019-8584 critical
- CVE-2019-6237 critical
- CVE-2019-8577 critical
- CVE-2019-8600 critical
- CVE-2019-8623 critical
- CVE-2019-8598 high
- CVE-2019-8608 high
- CVE-2019-8619 critical
- CVE-2019-8602 critical
- CVE-2019-8587 critical
- CVE-2019-8596 critical
- CVE-2019-8609 critical
- CVE-2019-8582 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!