Description
Multiple vulnerabilities were found in Apple iCloud. Malicious users can exploit these vulnerabilities to perform cross-site scripting attack, execute arbitrary code, obtain sensitive information, cause denial of service.
Below is a complete list of vulnerabilities:
- A logic vulnerability in WebKit can be exploited via special crafted webpage to perform cross-site scripting attacks.
- A logic vulnerability in WebKit can be exploited via special crafted webpage to execute arbitrary code.
- A type confusion vulnerability in WebKit can be exploited via special crafted webpage to execute arbitrary code.
- An out-of-bounds read vulnerability in SQLite can be exploited to potentially cause denial of service or obtain sensitive information.
- A memory corruption vulnerability in WebKit can be exploited via special crafted webpage to execute arbitrary code.
- An out-of-bounds write vulnerability in ImageIO can be exploited via special crafted image to execute arbitrary code.
- An out-of-bounds read vulnerability in ImageIO can be exploited via special crafted image to execute arbitrary code.
- An input validation vulnerability in WebKit can be expoloited via special crafted webpage to perform cross-site scripting attacks.
- A memory corruption vulnerability in WebKit can be exploited via special crafted webpage to execute arbitrary code.
- A logic vulnerability in WebKit can be exploited remotely to execute arbitrary code.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2020-9805 high
- CVE-2020-9802 critical
- CVE-2020-9800 critical
- CVE-2020-9794 critical
- CVE-2020-9807 critical
- CVE-2020-9789 critical
- CVE-2020-9806 critical
- CVE-2020-9790 critical
- CVE-2020-3878 critical
- CVE-2020-9843 high
- CVE-2020-9803 critical
- CVE-2020-9850 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!