Vulnerabilities > Apple > Icloud > 7.8

DATE CVE VULNERABILITY TITLE RISK
2019-04-03 CVE-2018-4464 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products
Multiple memory corruption issues were addressed with improved memory handling.
6.8
2019-04-03 CVE-2018-4443 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products
A memory corruption issue was addressed with improved memory handling.
6.8
2019-04-03 CVE-2018-4442 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products
A memory corruption issue was addressed with improved memory handling.
6.8
2019-04-03 CVE-2018-4441 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products
A memory corruption issue was addressed with improved memory handling.
6.8
2019-04-03 CVE-2018-4440 Improper Input Validation vulnerability in Apple products
A logic issue was addressed with improved state management.
4.3
2019-04-03 CVE-2018-4439 Improper Input Validation vulnerability in Apple products
A logic issue was addressed with improved validation.
4.3
2019-04-03 CVE-2018-4438 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products
A logic issue existed resulting in memory corruption.
6.8
2019-04-03 CVE-2018-4437 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products
Multiple memory corruption issues were addressed with improved memory handling.
6.8
2019-04-03 CVE-2018-20506 Integer Overflow or Wraparound vulnerability in multiple products
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).
6.8
2019-04-03 CVE-2018-20505 SQL Injection vulnerability in multiple products
SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).
network
low complexity
sqlite apple microsoft CWE-89
5.0