Описание
Multiple vulnerabilities were found in Apple iTunes. Malicious users can exploit these vulnerabilities to execute arbitrary code, perform cross-site scripting attack, obtain sensitive information, cause denial of service.
Below is a complete list of vulnerabilities:
- A logic vulnerability in WebKit can be exploited via special crafted webpage to execute arbitrary code.
- A logic vulnerability in WebKit can be exploited via special crafted webpage to perform cross-site scripting attacks.
- A type confusion vulnerability in WebKit can be exploited via special crafted webpage to execute arbitrary code.
- An out-of-bounds read vulnerability in SQLite can be exploited to potentially cause denial of service or obtain sensitive information.
- A memory corruption vulnerability in WebKit can be exploited via special crafted webpage to execute arbitrary code.
- An out-of-bounds write vulnerability in ImageIO can be exploited via special crafted image to execute arbitrary code.
- An out-of-bounds read vulnerability in ImageIO can be exploited via special crafted image to execute arbitrary code.
- An input validation vulnerability in WebKit can be expoloited via special crafted webpage to perform cross-site scripting attacks.
- A memory corruption vulnerability in WebKit can be exploited via special crafted webpage to execute arbitrary code.
- A logic vulnerability in WebKit can be exploited remotely to execute arbitrary code.
Первичный источник обнаружения
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
Список CVE
- CVE-2020-9805 high
- CVE-2020-9802 critical
- CVE-2020-9800 critical
- CVE-2020-9794 critical
- CVE-2020-9807 critical
- CVE-2020-9789 critical
- CVE-2020-9806 critical
- CVE-2020-9790 critical
- CVE-2020-3878 critical
- CVE-2020-9843 high
- CVE-2020-9803 critical
- CVE-2020-9850 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!