Skip to main content
定价企业版
首页/漏洞/EDB-16870
EDB-16870remotemultiple已验证

Apple Mail.app - Image Attachment Command Execution (Metasploit)

Metasploit3/5/2011
在Exploit-DB查看在GitLab查看源代码

AI分析AI驱动

漏洞利用代码

Exploit code not available in database

在GitLab查看源代码

相关CVE (2)

CVE-2007-6165

NONE

Mail in Apple Mac OS X Leopard (10.5.1) allows user-assisted remote attackers to execute arbitrary code via an AppleDouble attachment containing an apparently-safe file type and script in a resource f

Mail in Apple Mac OS X Leopard (10.5.1) allows user-assisted remote attackers to execute arbitrary code via an AppleDouble attachment containing an apparently-safe file type and script in a resource f...

11/29/2007CWE-20, CWE-264

CVE-2006-0395

NONE

The Download Validation in Mail in Mac OS X 10.4 does not properly recognize attachment file types to warn a user of an unsafe type, which allows user-assisted remote attackers to execute arbitrary co

The Download Validation in Mail in Mac OS X 10.4 does not properly recognize attachment file types to warn a user of an unsafe type, which allows user-assisted remote attackers to execute arbitrary co...

8/5/2006

漏洞利用信息

EDB ID
16870
类型
remote
平台
multiple
已验证
是
发布日期
2011-03-05

关联的CVE

CVE-2007-6165CVE-2006-0395

快速操作

下载原始文件在Google搜索
免责声明:此漏洞利用代码仅供教育和授权的安全研究目的使用。请负责任地使用,并仅在您有权测试的系统上使用。