When we use the Sarafi browser in the Apple Computer, we sometimes jump out of the prompts to ask if we trust the XX plugin, and when we open any new website, we will be prompted to get mad. This is because some software that does not reach Apple's security standards is restricted and security prompts are made to users. Some of the software is very common in Wind
Earlier this week, Apple released corresponding security patches for its Safari browser for various platforms, and foreign media conducted benchmark tests on Apple Safari 4 Beta, compared with IE7 in Windows Vista, Safari 4 Beta h
Apple Safari WebKit PDF Vulnerability (CVE-2015-3660)Apple Safari WebKit PDF Vulnerability (CVE-2015-3660)
Release date:Updated on:Affected Systems:
Apple Safari Apple
Apple Safari information leakage (CVE-2015-1155)Apple Safari information leakage (CVE-2015-1155)
Release date:Updated on:Affected Systems:
Apple Safari Apple
Release date: 2012-03-12Updated on: 2012-03-13
Affected Systems:Apple Safari Unaffected system:Apple Safari 5.1.4 for WindowsDescription:--------------------------------------------------------------------------------Bugtraq id: 52419Cve id: CVE-2012-0584
Safari is the browser in Mac OS X, the latest operating system of App
Release date:Updated on:
Affected Systems:Apple Safari 5.1.5 for WindowsDescription:--------------------------------------------------------------------------------Bugtraq id: 52746
Safari is the browser in Mac OS X, the latest operating system of Apple Computer. It uses KDE's KHTML as the core of browser computing.
The URI Spoofing vulnerability exists in
Phenomenon: In the process of doing the project, using window.open to open a new window, testing on the Windows system's Ie,firefox,chrome browser is no problem, In the Apple System Safari browser found some window.open can open tabs, some can not openThe first option is to open the tabThe second type does not open the tabSolution: Baidu found that "there is no way to execute window.open in the callback fun
Release date:Updated on:
Affected Systems:Apple MacOS X Server 10.xApple iOSUnaffected system:Apple MacOS X Server 10.6.7Apple iOS 4.3.2Apple iOS 4.2.7Description:--------------------------------------------------------------------------------Bugtraq id: 46832Cve id: CVE-2011-1417
Safari is the browser in Mac OS X, the latest operating system of Apple Computer. It uses KDE's KHTML as the core of browser c
Apple Safari HSTS mechanism Bypass Vulnerability (CVE-2015-7094)Apple Safari HSTS mechanism Bypass Vulnerability (CVE-2015-7094)
Release date:Updated on:Affected Systems:
Apple iOS
Description:
CVE (CAN) ID: CVE-2015-7094IOS is an operating system developed by
The safari-only mode in Lion can be used as a security precaution against Mac. After the Find my Mac is turned on, Apple allows only the guest user to use Safari and no other user can log on. This technique can help users find out where the MAC is currently located (IP address).
The Lion browser-based model is very si
Release date:Updated on:
Affected Systems:Apple Safari 5.1.2 (7534.52.7) For WindowsDescription:--------------------------------------------------------------------------------Bugtraq id: 52323Cve id: CVE-2011-3844
Safari is the browser in Mac OS X, the latest operating system of Apple Computer. It uses KDE's KHTML as the core of browser computing.
Release date: 2011-10-17Updated on: 2011-10-17
Affected Systems:Apple Mac OS X 10.6.8Apple Mac OS X Server v10.6.8Description:--------------------------------------------------------------------------------Cve id: CVE-2011-3230
Safari is the browser in Mac OS X, the latest operating system of Apple Computer. It uses KDE's KHTML as the core of browser computing.
Safar
SPI Labs security researchers warned iPhone users not to use a special feature to use the iPhone's Safari browser to call phone numbers over the Web.
This feature is intended to provide iPhone users with an easy way to dial phone numbers displayed on Web pages, but it may be abused, according to SPI.
A flaw in this feature allows hackers to trick users into making expensive "900" calls, or even tracking u
Six major security risks of Apple iOS devices
1. iOS monitoring and remote access Trojan
Some Apple jailbreak tools can remove all built-in security mechanisms in iOS, and install monitoring software and remote access Trojans to facilitate attackers to track devices and access the information stored on them. The jailbr
Multiple security vulnerabilities in earlier versions of Apple iOS 7.1.2
Release date:Updated on:
Affected Systems:Apple iOS Description:--------------------------------------------------------------------------------Bugtraq id: 68276CVE (CAN) ID: CVE-2014-1354, CVE-2014-1360, CVE-2014-1352, CVE-2014-1353, CVE-2014-1348, CVE-2014-1349, CVE-2014-1350, CVE-2014-1351IOS is an operating system developed by
Release date:Updated on: 2013-01-31
Affected Systems:Apple iPhone 4.xApple iPhone 3.xApple iOS 3.xApple iOS 2.xApple TV 5.xApple TV 4.xDescription:--------------------------------------------------------------------------------Bugtraq id: 57597CVE (CAN) ID: CVE-2013-0974Apple iOS is an operating system developed by Apple.
The StoreKit of Apple iOS does not correctly disable JS in Mobile
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.