Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2006-1721
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
digestmd5.c in the CMU Cyrus Simple Authentication and Security Layer (SASL) library 2.1.18, and possibly other versions before 2.1.21, allows remote unauthenticated attackers to cause a denial of service (segmentation fault) via malformed inputs in DIGEST-MD5 negotiation.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apple Mac OS X多个命令执行及拒绝服务漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apple Mac OS X是苹果家族机器所使用的操作系统。 Apple Mac OS X的多个组件存在漏洞,攻击者可能利用这些漏洞导致执行命令或拒绝服务。 1. CFNetwork的客户端(比如Safari)允许建立匿名的SSL连接,远程非认证的SSL站可以利用这个漏洞使之看起来是认证过的。 2. Flash播放器存在漏洞,远程攻击者可能利用此漏洞执行任意命令。 3. ImageIO在处理畸形的JPEG2000图像时存在缓冲区溢出漏洞,攻击者可能利用此漏洞执行任意指令。 4. Kernel Mach中存
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2006-1721
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2006-1721
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2006-1721

No comments yet


Leave a comment