Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2006-0848

EPSS 78.80% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2006-0848

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The "Open 'safe' files after downloading" option in Safari on Apple Mac OS X allows remote user-assisted attackers to execute arbitrary commands by tricking a user into downloading a __MACOSX folder that contains metadata (resource fork) that invokes the Terminal, which automatically interprets the script using bash, as demonstrated using a ZIP file that contains a script with a safe file extension.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apple Safari Shell命令执行漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apple Safari是苹果操作系统所捆绑的WEB浏览器。 Safari在处理下载文件自动打开的操作时存在问题,远程攻击者可能利用此漏洞在客户端机器上执行任意命令。Safari的默认配置允许下载完安全的文件后自动打开文件。由于这个默认的配置及Safari和OS X确定安全文件中的不一致性,如果浏览了特制的页面的话Safari可能会执行任意shell命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2006-0848

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2006-0848

登录查看更多情报信息。

Same Patch Batch · n/a · 2006-02-22 · 17 CVEs total

CVE-2006-0834Uniden UIP1868P VoIP电话和路由器web配置工具默认密码敏感信息泄露漏洞
CVE-2006-0835MitriDAT Web Calendar Pro Dropbase.PHP SQL注入漏洞
CVE-2006-0836Mozilla Thunderbird地址薄导入远程拒绝服务漏洞
CVE-2006-0837Micromuse Netcool/Neusecure NS帐户密码泄露漏洞
CVE-2006-0838Micromuse Netcool/Neusecure NS帐户密码泄露漏洞
CVE-2006-0839Snort Frag3 Processor数据包碎片逃避检测漏洞
CVE-2006-0840Mantis多个输入验证漏洞
CVE-2006-0841Mantis 多个跨站脚本攻击漏洞
CVE-2006-0842Calacode @Mail 跨站脚本攻击漏洞
CVE-2006-0843Leif M. Wright Blog信息泄露漏洞
CVE-2006-0844Leif M. Wright Blog.CGI授权绕过漏洞
CVE-2006-0845Leif M. Wright's Blog 配置邮件发送路径任意程序执行漏洞
CVE-2006-0846Leif M. Wright Blog 多个跨站脚本攻击漏洞
CVE-2006-0847CherryPy StaticFilter目录遍历漏洞
CVE-2006-0832Webpagecity WPC easy 'admin.asp'SQL注入漏洞
CVE-2006-0833Barracuda Directory多个跨站脚本攻击漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2006-0848

No comments yet


Leave a comment