Total vulnerabilities in the database
CoreTypes in Apple Mac OS X 10.4 up to 10.4.5 allows remote attackers to bypass the same-origin policy and execute Javascript in other domains via unknown vectors involving "crafted archives."
Software | From | Fixed in |
---|---|---|
apple / mac_os_x | 10.4.3 | 10.4.3.x |
apple / mac_os_x_server | 10.4.3 | 10.4.3.x |
apple / mac_os_x | 10.4.1 | 10.4.1.x |
apple / mac_os_x_server | 10.4.2 | 10.4.2.x |
apple / mac_os_x_server | 10.4.4 | 10.4.4.x |
apple / mac_os_x_server | 10.4.1 | 10.4.1.x |
apple / mac_os_x | 10.4.4 | 10.4.4.x |
apple / mac_os_x_server | 10.4 | 10.4.x |
apple / mac_os_x_server | 10.4.5 | 10.4.5.x |
apple / mac_os_x | 10.4 | 10.4.x |
apple / mac_os_x | 10.4.5 | 10.4.5.x |
apple / mac_os_x | 10.4.2 | 10.4.2.x |