![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.10756 |
Categoría: | Web application abuses |
Título: | MacOS X Finder '.DS_Store' Information Disclosure |
Resumen: | MacOS X creates a hidden file '.DS_Store', in each directory that has been viewed; with the 'Finder'. This file contains a list of the contents of the directory, giving an attacker; information on the structure and contents of your website. |
Descripción: | Summary: MacOS X creates a hidden file '.DS_Store', in each directory that has been viewed with the 'Finder'. This file contains a list of the contents of the directory, giving an attacker information on the structure and contents of your website. Solution: Block access to hidden files (starting with a dot) within your webservers configuration CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-1776 http://lists.apple.com/archives/security-announce/2016/Mar/msg00006.html BugTraq ID: 85054 http://www.securityfocus.com/bid/85054 http://www.securitytracker.com/id/1035342 Common Vulnerability Exposure (CVE) ID: CVE-2018-6470 https://github.com/dignajar/nibbleblog/issues/120 |
Copyright | Copyright (C) 2001 Matt Moore |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |