The host is installed with Apple iTunes before 12.9 or Apple iCloud before 7.7 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fail to properly handle URL validation issue. Successful exploitation could allow attackers to exfiltrate image data cross-origin through a malicious website.
The host is installed with Apple iTunes before 12.9 or Apple iCloud before 7.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fail to properly handle crafted content. Successful exploitation could allow attackers to cause an ASSERT failure.
The host is installed with Apple iTunes before 12.9 or Apple iCloud before 7.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fail to properly handle crafted content. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple iTunes before 12.9 or Apple iCloud before 7.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fail to properly handle crafted content. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple iTunes before 12.9 or Apple iCloud before 7.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fail to properly handle crafted content. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple iTunes before 12.9 or Apple iCloud before 7.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fail to properly handle crafted content. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple iTunes before 12.9 or Apple iCloud before 7.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fail to properly handle crafted content. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple iTunes before 12.9 or Apple iCloud before 7.7 and is prone to a use after free vulnerability. A flaw is present in the application, which fail to properly handle crafted content. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple iTunes before 12.9 or Apple iCloud before 7.7 and is prone to a use after free vulnerability. A flaw is present in the application, which fail to properly handle crafted content. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Safari before 5.1.4 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via vectors involving a drag-and-drop operation.