Vulnerabilities > Apple > Iphone OS > 10.3.4

DATE CVE VULNERABILITY TITLE RISK
2019-04-03 CVE-2018-4261 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products
Multiple memory corruption issues were addressed with improved memory handling.
6.8
2019-04-03 CVE-2018-4260 Improper Input Validation vulnerability in Apple Iphone OS and Safari
An inconsistent user interface issue was addressed with improved state management.
network
apple CWE-20
4.3
2019-04-03 CVE-2018-4248 Out-of-bounds Read vulnerability in Apple products
An out-of-bounds read was addressed with improved input validation.
network
low complexity
apple CWE-125
5.0
2019-04-03 CVE-2018-4216 Unspecified vulnerability in Apple Iphone OS
A logic issue existed in the handling of call URLs.
network
apple
4.3
2019-04-03 CVE-2018-4203 Out-of-bounds Read vulnerability in Apple products
An out-of-bounds read was addressed with improved bounds checking.
network
low complexity
apple CWE-125
5.0
2019-04-03 CVE-2018-4197 Use After Free vulnerability in Apple products
A use after free issue was addressed with improved memory management.
6.8
2019-04-03 CVE-2018-4191 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products
A memory corruption issue was addressed with improved validation.
6.8
2019-04-03 CVE-2018-4145 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products
Multiple memory corruption issues were addressed with improved memory handling.
6.8
2019-04-03 CVE-2018-4126 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products
A memory corruption issue was addressed with improved memory handling.
network
apple microsoft CWE-119
critical
9.3
2019-04-03 CVE-2018-20506 Integer Overflow or Wraparound vulnerability in multiple products
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).
6.8