Логотип exploitDog
bind:CVE-2013-0967
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2013-0967

Количество 2

Количество 2

nvd логотип

CVE-2013-0967

почти 13 лет назад

CoreTypes in Apple Mac OS X before 10.8.3 includes JNLP files in the list of safe file types, which allows remote attackers to bypass a Java plug-in disabled setting, and trigger the launch of Java Web Start applications, via a crafted web site.

CVSS2: 4.3
EPSS: Низкий
github логотип

GHSA-xfgj-jr9c-j9q8

больше 3 лет назад

CoreTypes in Apple Mac OS X before 10.8.3 includes JNLP files in the list of safe file types, which allows remote attackers to bypass a Java plug-in disabled setting, and trigger the launch of Java Web Start applications, via a crafted web site.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2013-0967

CoreTypes in Apple Mac OS X before 10.8.3 includes JNLP files in the list of safe file types, which allows remote attackers to bypass a Java plug-in disabled setting, and trigger the launch of Java Web Start applications, via a crafted web site.

CVSS2: 4.3
0%
Низкий
почти 13 лет назад
github логотип
GHSA-xfgj-jr9c-j9q8

CoreTypes in Apple Mac OS X before 10.8.3 includes JNLP files in the list of safe file types, which allows remote attackers to bypass a Java plug-in disabled setting, and trigger the launch of Java Web Start applications, via a crafted web site.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу