Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.813635
Categoría:Mac OS X Local Security Checks
Título:Apple Mac OS X Security Updates (HT208937)-02
Resumen:Apple Mac OS X is prone to multiple vulnerabilities.
Descripción:Summary:
Apple Mac OS X is prone to multiple vulnerabilities.

Vulnerability Insight:
Multiple flaws exist due to:

- A spoofing issue existed in the handling of URLs.

- A vulnerable code which leads to information disclosure.

- An out-of-bounds read issue due to improper input validation.

- A cookie management issue.

- A memory corruption issue due to poor memory handling.

- A type confusion issue due to poor memory handling.

Vulnerability Impact:
Successful exploitation will allow remote
attackers to conduct address bar spoofing, obtain sensitive information,
execute arbitrary code, escalate privileges and cause denial of service condition.

Affected Software/OS:
Apple Mac OS X versions 10.13.x through 10.13.5.

Solution:
Upgrade to Apple Mac OS X 10.13.6 or
later. Please see the references for more information.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2018-4277
http://www.securitytracker.com/id/1041232
Common Vulnerability Exposure (CVE) ID: CVE-2018-4289
https://support.apple.com/kb/HT208937
Common Vulnerability Exposure (CVE) ID: CVE-2018-4248
https://support.apple.com/kb/HT208935
https://support.apple.com/kb/HT208936
https://support.apple.com/kb/HT208938
Common Vulnerability Exposure (CVE) ID: CVE-2018-4283
Common Vulnerability Exposure (CVE) ID: CVE-2018-4293
https://support.apple.com/kb/HT208932
https://support.apple.com/kb/HT208933
Common Vulnerability Exposure (CVE) ID: CVE-2018-4268
Common Vulnerability Exposure (CVE) ID: CVE-2018-4285
CopyrightCopyright (C) 2018 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.