A type confusion issue in iOS and related platforms, potentially leading to arbitrary code execution, was fixed by improved memory handling
Reporter | Title | Published | Views | Family All 83 |
---|---|---|---|---|
Cvelist | CVE-2020-3901 | 1 Apr 202017:50 | – | cvelist |
NVD | CVE-2020-3901 | 1 Apr 202018:15 | – | nvd |
CVE | CVE-2020-3901 | 1 Apr 202018:15 | – | cve |
RedhatCVE | CVE-2020-3901 | 7 Sep 202010:19 | – | redhatcve |
Veracode | Arbitrary Code Execution | 1 Oct 202003:53 | – | veracode |
Prion | Type confusion | 1 Apr 202018:15 | – | prion |
Debian CVE | CVE-2020-3901 | 1 Apr 202018:15 | – | debiancve |
Tenable Nessus | Debian DSA-4681-1 : webkit2gtk - security update | 8 May 202000:00 | – | nessus |
Tenable Nessus | GLSA-202006-08 : WebKitGTK+: Multiple vulnerabilities | 17 Jun 202000:00 | – | nessus |
Tenable Nessus | Apple iTunes < 12.10.5 Multiple Vulnerabilities (credentialed check) (HT211105) | 31 Mar 202000:00 | – | nessus |
Source | Link |
---|---|
cve | www.cve.org/CVERecord |
nvd | www.nvd.nist.gov/vuln/detail/CVE-2020-3901 |
launchpad | www.launchpad.net/bugs/cve/CVE-2020-3901 |
security-tracker | www.security-tracker.debian.org/tracker/CVE-2020-3901 |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | webkit2gtk | 2.28.0-0ubuntu0.18.04.3 | UNKNOWN |
ubuntu | 19.10 | noarch | webkit2gtk | 2.28.0-0ubuntu0.19.10.2 | UNKNOWN |
ubuntu | 20.04 | noarch | webkit2gtk | 2.28.0-1ubuntu2 | UNKNOWN |
ubuntu | 20.10 | noarch | webkit2gtk | 2.28.0-1ubuntu2 | UNKNOWN |
ubuntu | 21.04 | noarch | webkit2gtk | 2.28.0-1ubuntu2 | UNKNOWN |
ubuntu | 21.10 | noarch | webkit2gtk | 2.28.0-1ubuntu2 | UNKNOWN |
ubuntu | 22.04 | noarch | webkit2gtk | 2.28.0-1ubuntu2 | UNKNOWN |
ubuntu | 22.10 | noarch | webkit2gtk | 2.28.0-1ubuntu2 | UNKNOWN |
ubuntu | 23.04 | noarch | webkit2gtk | 2.28.0-1ubuntu2 | UNKNOWN |
ubuntu | 23.10 | noarch | webkit2gtk | 2.28.0-1ubuntu2 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo