説明
Multiple vulnerabilities were found in iCloud. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges.
Below is a complete list of vulnerabilities:
- An out-of-bounds read vulnerability in WebKit can be exploited remotely to obtain sensitive information;
- Multiple memory corruption vulnerabilities in WebKit can be exploited remotely to execute arbitrary code;
- An input validation issue in SQLite can be exploited remotely to gain privileges;
- A memory corruption vulnerability in SQLite can be exploited to execute arbitrary code;
- An input validation issue in SQLite can be exploited remotely to obtain sensitive information;
- A memory corruption vulnerability in SQLite can be exploited to gain privileges;
- An out-of-bounds read vulnerability in CoreText can be exploited remotely to obtain sensitive information;
オリジナルアドバイザリー
エクスプロイテーション
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
関連製品
CVEリスト
- CVE-2019-8601 critical
- CVE-2019-8628 critical
- CVE-2019-8597 high
- CVE-2019-8610 critical
- CVE-2019-8622 critical
- CVE-2019-8607 high
- CVE-2019-8571 critical
- CVE-2019-8586 critical
- CVE-2019-8583 critical
- CVE-2019-8611 critical
- CVE-2019-8615 high
- CVE-2019-8594 critical
- CVE-2019-8595 critical
- CVE-2019-8584 critical
- CVE-2019-6237 critical
- CVE-2019-8577 critical
- CVE-2019-8600 critical
- CVE-2019-8623 critical
- CVE-2019-8598 high
- CVE-2019-8608 high
- CVE-2019-8619 critical
- CVE-2019-8602 critical
- CVE-2019-8587 critical
- CVE-2019-8596 critical
- CVE-2019-8609 critical
- CVE-2019-8582 high
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!