Описание
Multiple vulnerabilities were found in Apple iCloud. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service, execute arbitrary code, perform cross-site scripting attack, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A logic vulnerability in WebKit can be exploited to bypass security restrictions.
- Buffer overflow vulnerability in libxml2 can be exploited to cause denial of service.
- Memory corruption vulnerability in WebKit can be exploited via a specially crafted webpage to execute arbitrary code.
- A type confusion vulnerability in WebKit can be exploited via a specially crafted webpage to execute arbitrary code.
- An input validation vulnerability in WebKit can be exploited via specially crafted webpage to perform cross-site scripting attacks.
- A race condition vulnerability in WebKit can be exploited to obtain sensitive information.
- A type confusion vulnerability in WebKit can be exploited remotely to execute arbitrary code.
- Use after free vulnerability in WebKit can be exploited via a specially crafted webpage to execute arbitrary code.
- A memory consumption vulnerability in WebKit can be exploited remotely to execute arbitrary code.
- A logic vulnerability in WebKit Loading Page can be exploited to bypass security restrictions.
Первичный источник обнаружения
- About the security content of iCloud for Windows 7.18
About the security content of iCloud for Windows 10.9.3
Эксплуатация
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
Список CVE
- CVE-2020-9783 high
- CVE-2020-3909 critical
- CVE-2020-3910 critical
- CVE-2020-3887 warning
- CVE-2020-3895 critical
- CVE-2020-3894 warning
- CVE-2020-3901 high
- CVE-2020-3899 critical
- CVE-2020-3900 high
- CVE-2020-3897 critical
- CVE-2020-3902 warning
- CVE-2020-3885 warning
- CVE-2020-3911 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!