Vulnerabilities > Apple > Iphone OS > 12.1

DATE CVE VULNERABILITY TITLE RISK
2019-04-03 CVE-2018-4439 Improper Input Validation vulnerability in Apple products
A logic issue was addressed with improved validation.
4.3
2019-04-03 CVE-2018-4438 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products
A logic issue existed resulting in memory corruption.
6.8
2019-04-03 CVE-2018-4437 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Apple products
Multiple memory corruption issues were addressed with improved memory handling.
6.8
2019-04-03 CVE-2018-4436 Improper Certificate Validation vulnerability in Apple Iphone OS, Tvos and Watchos
A certificate validation issue existed in configuration profiles.
network
low complexity
apple CWE-295
5.0
2019-04-03 CVE-2018-4435 Improper Input Validation vulnerability in Apple products
A logic issue was addressed with improved restrictions.
network
apple CWE-20
6.8
2019-04-03 CVE-2018-4431 Information Exposure vulnerability in Apple products
A memory initialization issue was addressed with improved memory handling.
local
low complexity
apple CWE-200
4.9
2019-04-03 CVE-2018-4430 Information Exposure vulnerability in Apple Iphone OS
A lock screen issue allowed access to contacts on a locked device.
local
low complexity
apple CWE-200
2.1
2019-04-03 CVE-2018-4429 Improper Input Validation vulnerability in Apple Iphone OS and Watchos
A spoofing issue existed in the handling of URLs.
network
apple CWE-20
4.3
2019-04-03 CVE-2018-4303 Improper Input Validation vulnerability in Apple products
An input validation issue was addressed with improved input validation.
network
apple CWE-20
6.8
2019-04-03 CVE-2018-20506 Integer Overflow or Wraparound vulnerability in multiple products
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).
6.8