Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 4.0 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2010-0045
Apple Safari prior to 4.0.5 on Windows does not properly validate external URL schemes, which allows remote malicious users to open local files and execute arbitrary code via a crafted HTML document.
Apple Safari 4.0
Apple Safari
Apple Safari 4.0.1
Apple Safari 4.0.2
Apple Safari 4.0.3
9.3
CVSSv2
CVE-2010-0048
Use-after-free vulnerability in WebKit in Apple Safari prior to 4.0.5 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted XML document.
Apple Safari 4.0.1
Apple Safari
Apple Safari 4.0
Apple Safari 4.0.3
Apple Safari 4.0.2
4.3
CVSSv2
CVE-2010-0042
ImageIO in Apple Safari prior to 4.0.5 and iTunes prior to 9.1 on Windows does not ensure that memory access is associated with initialized memory, which allows remote malicious users to obtain potentially sensitive information from process memory via a crafted TIFF image.
Apple Safari 4.0.1
Apple Safari 4.0.0b
Apple Safari 4.0
Apple Safari
Apple Safari 4.0.3
Apple Safari 4.0.2
9.3
CVSSv2
CVE-2010-0043
ImageIO in Apple Safari prior to 4.0.5 and iTunes prior to 9.1 on Windows allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted TIFF image.
Apple Safari 4.0.3
Apple Safari 4.0.2
Apple Safari 4.0
Apple Safari 4.0.1
Apple Safari 4.0.0b
Apple Safari
4.3
CVSSv2
CVE-2010-0051
WebKit in Apple Safari prior to 4.0.5 does not properly validate the cross-origin loading of stylesheets, which allows remote malicious users to obtain sensitive information via a crafted HTML document. NOTE: this might overlap CVE-2010-0651.
Apple Safari 4.0.2
Apple Safari 4.0.1
Apple Safari
Apple Safari 4.0.3
Apple Safari 4.0.0b
Apple Safari 4.0
2 Github repositories
9.3
CVSSv2
CVE-2010-0053
Use-after-free vulnerability in WebKit in Apple Safari prior to 4.0.5 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via vectors related to the run-in Cascading Style Sheets (CSS) display property.
Apple Safari 4.0
Apple Safari 4.0.2
Apple Safari 4.0.1
Apple Safari 4.0.0b
Apple Safari 4.0.3
Apple Safari
9.3
CVSSv2
CVE-2010-0054
Use-after-free vulnerability in WebKit in Apple Safari prior to 4.0.5 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via vectors involving HTML IMG elements.
Apple Safari 4.0
Apple Safari
Apple Safari 4.0.1
Apple Safari 4.0.0b
Apple Safari 4.0.3
Apple Safari 4.0.2
9.3
CVSSv2
CVE-2010-0040
Integer overflow in ColorSync in Apple Safari prior to 4.0.5 on Windows, and iTunes prior to 9.1, allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via an image with a crafted color profile that triggers a heap-based buffer o...
Apple Safari 4.0.0b
Apple Safari 4.0
Apple Safari
Apple Safari 4.0.3
Apple Safari 4.0.2
Apple Safari 4.0.1
4.3
CVSSv2
CVE-2010-0041
ImageIO in Apple Safari prior to 4.0.5 and iTunes prior to 9.1 on Windows does not ensure that memory access is associated with initialized memory, which allows remote malicious users to obtain potentially sensitive information from process memory via a crafted BMP image.
Apple Safari 4.0.0b
Apple Safari 4.0
Apple Safari 4.0.2
Apple Safari 4.0.1
Apple Safari
Apple Safari 4.0.3
4.3
CVSSv2
CVE-2010-0044
PubSub in Apple Safari prior to 4.0.5 does not properly implement use of the Accept Cookies preference to block cookies, which makes it easier for remote web servers to track users by setting a cookie in a (1) RSS or (2) Atom feed.
Apple Safari
Apple Safari 4.0
Apple Safari 4.0.2
Apple Safari 4.0.3
Apple Safari 4.0.0b
Apple Safari 4.0.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »