Vulnerabilities > Apple > MAC OS X > 10.14.1

DATE CVE VULNERABILITY TITLE RISK
2019-03-05 CVE-2019-6202 Out-of-bounds Read vulnerability in Apple Iphone OS, mac OS X and Watchos
An out-of-bounds read was addressed with improved bounds checking.
network
apple CWE-125
6.8
2019-03-05 CVE-2019-6200 Out-of-bounds Read vulnerability in Apple Iphone OS and mac OS X
An out-of-bounds read was addressed with improved input validation.
low complexity
apple CWE-125
5.8
2019-03-04 CVE-2019-6235 Out-of-bounds Write vulnerability in Apple products
A memory corruption issue was addressed with improved validation.
network
low complexity
apple CWE-787
7.5
2019-02-18 CVE-2019-8906 Out-of-bounds Read vulnerability in multiple products
do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused.
3.6
2018-12-07 CVE-2018-18313 Out-of-bounds Read vulnerability in multiple products
Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.
network
low complexity
perl canonical debian redhat netapp apple CWE-125
critical
9.1
2018-12-07 CVE-2018-18311 Integer Overflow or Wraparound vulnerability in multiple products
Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
network
low complexity
perl canonical debian netapp redhat apple fedoraproject mcafee CWE-190
critical
9.8
2018-06-07 CVE-2018-12015 Link Following vulnerability in multiple products
In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.
network
low complexity
canonical debian perl archive apple netapp CWE-59
6.4
2016-07-23 CVE-2016-5131 Use After Free vulnerability in multiple products
Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.
8.8