Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 5.0.1 vulnerabilities and exploits
(subscribe to this query)
6.9
CVSSv2
CVE-2010-1805
Untrusted search path vulnerability in Apple Safari 4.x prior to 4.1.2 and 5.x prior to 5.0.2 on Windows allows local users to gain privileges via a Trojan horse explorer.exe (aka Windows Explorer) program in a directory containing a file that had been downloaded by Safari.
Apple Safari 4.0.3
Apple Safari 4.0.4
Apple Safari 4.0.1
Apple Safari 4.0.2
Apple Safari 4.0.0b
Apple Safari 4.0
Apple Safari 5.0
Apple Safari 5.0.1
Apple Safari 4.0.5
Apple Safari 4.1
9.3
CVSSv2
CVE-2010-1806
Use-after-free vulnerability in Apple Safari 4.x prior to 4.1.2 and 5.x prior to 5.0.2 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via run-in styling in an element, related to object pointers.
Apple Safari 4.0.0b
Apple Safari 4.0
Apple Safari 5.0
Apple Safari 5.0.1
Apple Safari 4.0.5
Apple Safari 4.1
Apple Safari 4.0.3
Apple Safari 4.0.4
Apple Safari 4.0.1
Apple Safari 4.0.2
4.3
CVSSv2
CVE-2011-0217
Apple Safari prior to 5.0.6 provides AutoFill information to scripts that execute before HTML form submission, which allows remote malicious users to obtain Address Book information via a crafted form, as demonstrated by a form that includes non-visible fields.
Apple Safari 1.3.1
Apple Safari 1.2.2
Apple Safari 1.3.2
Apple Safari 1.1.1
Apple Safari 1.0.0b2
Apple Safari 1.0.1
Apple Safari 5.0.1
Apple Safari 2.0.4
Apple Safari 3.0.3b
Apple Safari 2
Apple Safari 3.1.1
Apple Safari 3.0.1b
Apple Safari 3.1.0b
Apple Safari 3.1.0
Apple Safari 3.1.2
Apple Safari 5.0.4
Apple Safari 2.0.1
Apple Safari 2.0.3
Apple Safari 1.3.0
Apple Safari 1.0.3
Apple Safari 1.0.2
Apple Safari 1.0
9.3
CVSSv2
CVE-2011-0216
Off-by-one error in libxml in Apple Safari prior to 5.0.6 allows remote malicious users to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via a crafted web site.
Apple Safari 2.0.1
Apple Safari 1.2.2
Apple Safari 2.0.2
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 1.0.2
Apple Safari 1.0.0
Apple Safari 2.0.3
Apple Safari 2.0.4
Apple Safari 2.0
Apple Safari 1.1
Apple Safari 3.2.1
Apple Safari 3.1.0
Apple Safari 3.0.4b
Apple Safari 1.2.0
Apple Safari 1.2.1
Apple Safari 1.2.5
Apple Safari 1.3
Apple Safari 3.0
Apple Safari 3.0.3
Apple Safari 5.0
Apple Safari 1.3.2
5.8
CVSSv2
CVE-2011-0166
The HTML5 drag and drop functionality in WebKit in Apple Safari prior to 5.0.4 allows user-assisted remote malicious users to bypass the Same Origin Policy and obtain sensitive information via vectors related to the dragging of content. NOTE: this might overlap CVE-2011-0778.
Apple Safari 2.0.3
Apple Safari 1.3.2
Apple Safari 1.2.0
Apple Safari 1.0.3
Apple Safari 1.0.2
Apple Safari 4.1.2
Apple Safari 1.0.0
Apple Safari 3
Apple Safari 2.0.4
Apple Safari 3.0.2
Apple Safari 3.0.4b
Apple Safari 3.0.1b
Apple Safari 3.1.0b
Apple Safari 2.0.0
Apple Safari 2
Apple Safari 1.2.5
Apple Safari 2.0.2
Apple Safari 1.0
Apple Safari 5.0.1
Apple Safari 3.0.1
Apple Safari 3.0.0b
Apple Safari 3.0.2b
4.3
CVSSv2
CVE-2011-0167
The windows functionality in WebKit in Apple Safari prior to 5.0.4 allows remote malicious users to bypass the Same Origin Policy, and force the upload of arbitrary local files from a client computer, via a crafted web site.
Apple Safari 2.0
Apple Safari 2.0.1
Apple Safari 2.0.3
Apple Safari 1.2.3
Apple Safari 1.3.1
Apple Safari 1.2.1
Apple Safari 1.2
Apple Safari 1.0.0b1
Apple Safari 1.0.0b2
Apple Safari 3.0
Apple Webkit
Apple Safari 3.0.3
Apple Safari 3.1.2
Apple Safari 3.2.0
Apple Safari 1.1
Apple Safari 4.1
Apple Safari 1.3.2
Apple Safari 2.0.2
Apple Safari 1.0.3
Apple Safari 4.1.2
Apple Safari 1.0.0
Apple Safari 3.0.0b
1 EDB exploit
2.6
CVSSv2
CVE-2011-0169
WebKit in Apple Safari prior to 5.0.4, when the Web Inspector is used, does not properly handle the window.console._inspectorCommandLineAPI property, which allows user-assisted remote malicious users to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks ...
Apple Safari 2.0.3
Apple Safari 1.3.2
Apple Safari 1.3.0
Apple Safari 1.2.0
Apple Safari 1.1.1
Apple Safari 1.0.2
Apple Safari 1.1.0
Apple Safari 1.0.0
Apple Safari 1.0.1
Apple Safari 1.3
Apple Safari 2.0.4
Apple Safari 5.0
Apple Safari 3.0.4b
Apple Safari 3.1.0
Apple Safari 2.0.0
Apple Safari 3.2.1
Apple Safari 2
Apple Safari 2.0.2
Apple Safari 1.0.3
Apple Safari 5.0.1
Apple Safari 4.1.2
Apple Safari 3.0.0b
9.3
CVSSv2
CVE-2010-3823
Use-after-free vulnerability in WebKit in Apple Safari prior to 5.0.3 on Mac OS X 10.5 up to and including 10.6 and Windows, and prior to 4.1.3 on Mac OS X 10.4, allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via vectors i...
Apple Safari
Apple Safari 5.0.1
Apple Safari 5.0
Apple Safari 4.1.1
Apple Safari 3.1.0b
Apple Safari 3.1.0
Apple Safari 3.0.1
Apple Safari 3.0.0b
Apple Safari 2.0.3
Apple Safari 1.3.2
Apple Safari 1.2.2
Apple Safari 1.2.1
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 1.0.0
Apple Webkit
Apple Safari 3.2.1
Apple Safari 3.2.0
Apple Safari 3.0.3
Apple Safari 3.0.2b
Apple Safari 3
Apple Safari 2.0.4
9.3
CVSSv2
CVE-2010-3803
Integer overflow in WebKit in Apple Safari prior to 5.0.3 on Mac OS X 10.5 up to and including 10.6 and Windows, and prior to 4.1.3 on Mac OS X 10.4, allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted string.
Apple Safari 5.0
Apple Safari
Apple Safari 5.0.1
Apple Safari 4.1
Apple Safari 3.2.2
Apple Safari 3.0.4b
Apple Safari 3.0.4
Apple Safari 3.0.0b
Apple Safari 3.0.0
Apple Safari 2.0.3
Apple Safari 4.1.1
Apple Safari 3.1.0b
Apple Safari 3.1.0
Apple Safari 3.0.1b
Apple Safari 3.0.1
Apple Safari 1.3.2
Apple Safari 1.2.3
Apple Safari 1.2.2
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 1.0.0
Apple Safari 3.1.2
9.3
CVSSv2
CVE-2010-3805
Integer underflow in WebKit in Apple Safari prior to 5.0.3 on Mac OS X 10.5 up to and including 10.6 and Windows, and prior to 4.1.3 on Mac OS X 10.4, allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via vectors involving We...
Apple Safari
Apple Safari 5.0.1
Apple Safari 5.0
Apple Safari 3.2.1
Apple Safari 3.2.0
Apple Safari 3.0.3b
Apple Safari 3.0.3
Apple Safari 3.0.2b
Apple Safari 3
Apple Safari 2.0.4
Apple Safari 2.0.1
Apple Safari 2.0.0
Apple Safari 1.3
Apple Safari 1.2.5
Apple Safari 1.1.1
Apple Safari 4.1.1
Apple Safari 3.1.0b
Apple Safari 3.1.0
Apple Safari 3.0.1
Apple Safari 3.0.0b
Apple Safari 2.0.3
Apple Safari 1.3.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »