CVE-2018-4350
A memory corruption issue was addressed with improved input validation. This issue affected versions prior to macOS Mojave 10.14.
Source: CVE-2018-4350
CVE-2018-4350
A memory corruption issue was addressed with improved input validation. This issue affected versions prior to macOS Mojave 10.14.
Source: CVE-2018-4350
CVE-2018-4346
A validation issue existed which allowed local file access. This was addressed with input sanitization. This issue affected versions prior to macOS Mojave 10.14.
Source: CVE-2018-4346
CVE-2018-4357
A memory corruption issue was addressed with improved input validation. This issue affected versions prior to Xcode 10.
Source: CVE-2018-4357
CVE-2018-4347
A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5, iTunes 12.9 for Windows, iCloud for Windows 7.7.
Source: CVE-2018-4347
CVE-2018-4352
A consistency issue existed in the handling of application snapshots. The issue was addressed with improved handling of notes deletions. This issue affected versions prior to iOS 12.
Source: CVE-2018-4352
CVE-2018-4345
A cross-site scripting issue existed in Safari. This issue was addressed with improved URL validation. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
Source: CVE-2018-4345
CVE-2018-4343
A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5.
Source: CVE-2018-4343
CVE-2018-4342
A configuration issue was addressed with additional restrictions. This issue affected versions prior to macOS Mojave 10.14.1.
Source: CVE-2018-4342
CVE-2019-10261
CentOS Web Panel (CWP) 0.9.8.789 is vulnerable to Stored/Persistent XSS for the "Name Server 1" and "Name Server 2" fields via a "DNS Functions" "Edit Nameservers IPs" action.
Source: CVE-2019-10261
CVE-2019-5422
XSS in buttle npm package version 0.2.0 causes execution of attacker-provided code in the victim’s browser when an attacker creates an arbitrary file on the server.
Source: CVE-2019-5422