Known Vulnerabilities for Afp Server by Apple

Listed below are 4 of the newest known vulnerabilities associated with "Afp Server" by "Apple".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2022-45909 drachtio-server 0.8.18 has a heap-based buffer over-read via a long Request-URI in an INVITE request. Not Provided 2022-11-26 2022-11-26
CVE-2022-45483 Lazy Mouse allows an attacker (in a man in the middle position between the server and a connected device) to see all data (in... Not Provided 2022-12-02 2022-12-02
CVE-2022-45482 Lazy Mouse server enforces weak password requirements and doesn't implement rate limiting, allowing remote unauthenticated us... Not Provided 2022-12-02 2022-12-02
CVE-2022-45480 PC Keyboard WiFi & Bluetooth allows an attacker (in a man-in-the-middle position between the server and a connected device) t... Not Provided 2022-12-02 2022-12-02
CVE-2022-45476 Tiny File Manager version 2.4.8 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. T... Not Provided 2022-11-25 2022-11-25
CVE-2022-45475 Tiny File Manager version 2.4.8 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. T... Not Provided 2022-11-25 2022-11-25
CVE-2022-45474 drachtio-server 0.8.18 has a request-handler.cpp event_cb use-after-free for any request. Not Provided 2022-11-18 2022-11-25
CVE-2022-45473 In drachtio-server 0.8.18, /var/log/drachtio has mode 0777 and drachtio.log has mode 0666. Not Provided 2022-11-18 2022-11-25
CVE-2022-45184 The Web Server in Ironman Software PowerShell Universal v3.x and v2.x allows for directory traversal outside of the configura... Not Provided 2022-11-14 2022-11-14
CVE-2022-45183 Escalation of privileges in the Web Server in Ironman Software PowerShell Universal 2.x and 3.x allows an attacker with a val... Not Provided 2022-11-14 2022-11-14

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationAppleAfp Server-AllAllAll

Popular searches for Afp Server

Apple Filing Protocol - Wikipedia

en.wikipedia.org/wiki/Apple_Filing_Protocol

The Apple m k i Filing Protocol, formerly AppleTalk Filing Protocol, is a proprietary network protocol, and part of the Apple h f d File Service, that offers file services for macOS and the classic Mac OS. In Mac OS 9 and earlier, AFP r p n was the primary protocol for file services. The protocol was deprecated starting in OS X 10.9 Mavericks, and Server - support was removed in macOS 11 Big Sur.

en.m.wikipedia.org/wiki/Apple_Filing_Protocol en.wikipedia.org/wiki/Apple_Filing_Protocol?wprov=sfti1 en.wikipedia.org/wiki/Apple_Filing_Protocol?oldformat=true en.wikipedia.org/wiki/AFPD en.wikipedia.org/wiki/AppleTalk_Filing_Protocol en.wikipedia.org/wiki/Apple_Filing_Protocol?oldid=744641820 en.wikipedia.org/wiki/Apple_Filing_Protocol?oldid=676031729 Apple Filing Protocol Communication protocol MacOS AppleTalk Server (computing) Computer file Classic Mac OS Mac OS 9 Apple Inc. Wikipedia MacOS Server Client (computing) File server AppleShare Proprietary software OS X Mavericks Deprecation File size POSIX Internet protocol suite

OS X Server: Enabling the AFP Server Activity log

support.apple.com/en-us/HT200217

5 1OS X Server: Enabling the AFP Server Activity log Learn how to enable the Server Activity log.

Apple Filing Protocol Server (computing) MacOS Server Log file Apple Inc. Troubleshooting Sudo AppleCare Command (computing) Data logger User (computing) File server Computer configuration Personal data Comment (computer programming) Terminal (macOS) Character (computing) Archive file Feedback Menu (computing)

© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report