Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 1.2.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-1121
Apple Safari 1.0 up to and including 1.2.3 allows remote malicious users to spoof the URL displayed in the status bar via TABLE tags.
Apple Safari 1.2.2
Apple Safari 1.0
Apple Safari 1.2.1
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 1.2.3
1 EDB exploit
NA
CVE-2004-1199
Safari 1.2.4 on Mac OS X 10.3.6 allows remote malicious users to cause a denial of service (application crash from memory exhaustion), as demonstrated using Javascript code that continuously creates nested arrays and then sorts the newly created arrays.
Apple Safari 1.2.2
Apple Safari 1.0
Apple Safari 1.2.1
Apple Safari 1.1
Apple Safari 1.2
Apple Safari Beta2
Apple Safari 1.2.3
NA
CVE-2004-1314
Safari 1.x allows remote malicious users to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection"...
Apple Safari 1.2.2
Apple Safari 1.0
Apple Safari 1.2.1
Apple Safari 1.1
Apple Safari 1.2
Apple Safari Beta2
Apple Safari 1.2.3
NA
CVE-2005-3018
Apple Safari allows remote malicious users to cause a denial of service (application crash) via a crafted data:// URL.
Apple Safari 1.2.2
Apple Safari 2.0.1
Apple Safari 1.0
Apple Safari 1.3
Apple Safari 2.0
Apple Safari 1.2.1
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 1.2.3
1 EDB exploit
NA
CVE-2004-1122
Safari 1.x to 1.2.4, and possibly other versions, allows inactive windows to launch dialog boxes, which can allow remote malicious users to spoof the dialog boxes from web sites in other windows, aka the "Dialog Box Spoofing Vulnerability," a different vulnerability tha...
Apple Safari 1.2.3
NA
CVE-2008-3644
Apple Safari prior to 3.2 does not properly prevent caching of form data for form fields that have autocomplete disabled, which allows local users to obtain sensitive information by reading the browser's page cache.
Apple Safari 1.3.2
Apple Safari 2
Apple Safari 1.1.1
Apple Safari 3.0.4
Apple Safari 1.2.2
Apple Safari 2.0.1
Apple Safari 3.0.1
Apple Safari 2.0.3
Apple Safari 1.0.3
Apple Safari 2.0.2
Apple Safari 3.0.2
Apple Safari 1.0
Apple Safari 2.0.4 419.3
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 3.0.3
Apple Safari 3.1
Apple Safari 1.2.5
Apple Safari 3.0
Apple Safari 2.0
Apple Safari 1.2.4
Apple Safari 1.2.1
NA
CVE-2008-3623
Heap-based buffer overflow in CoreGraphics in Apple Safari prior to 3.2 on Windows, in iPhone OS 1.0 up to and including 2.2.1, and in iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to execute arbitrary code or cause a denial of service (appl...
Apple Safari
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 1.1.1
Apple Safari 1.2
Apple Safari 1.2.1
Apple Safari 1.2.2
Apple Safari 1.2.3
Apple Safari 1.2.4
Apple Safari 1.2.5
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 2
Apple Safari 2.0
Apple Safari 2.0.1
Apple Safari 2.0.2
Apple Safari 2.0.3
Apple Safari 2.0.3 417.9.3
NA
CVE-2008-4216
The plug-in interface in WebKit in Apple Safari prior to 3.2 does not prevent plug-ins from accessing local URLs, which allows remote malicious users to obtain sensitive information via vectors that "launch local files."
Apple Safari 1.3.2
Apple Safari 2
Apple Safari 1.1.1
Apple Safari 3.0.4
Apple Safari 1.2.2
Apple Safari 2.0.1
Apple Safari 3.0.1
Apple Safari 2.0.3
Apple Safari 1.0.3
Apple Safari 2.0.2
Apple Safari 3.0.2
Apple Safari 1.0
Apple Safari 2.0.4 419.3
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 3.0.3
Apple Safari 3.1
Apple Safari 1.2.5
Apple Safari 3.0
Apple Safari 2.0
Apple Safari 1.2.4
Apple Safari 1.2.1
NA
CVE-2009-3455
Apple Safari, possibly prior to 4.0.3, on Mac OS X does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle malicious users to spoof arbitrary SSL servers via a crafte...
Apple Safari 3.1.2
Apple Safari 2.0.3
Apple Safari 4.0.1
Apple Safari 2.0.1
Apple Safari 1.2.0
Apple Safari 3.2.3
Apple Safari 3.2.1
Apple Safari 0.9
Apple Safari 1.2.3
Apple Safari 1.2.1
Apple Safari 1.3.2
Apple Safari
Apple Safari 3.1.0
Apple Safari 1.2
Apple Safari 4.0
Apple Safari 3.1
Apple Safari 4.0.0b
Apple Safari 3.0.4
Apple Safari 4.0 Beta
Apple Safari 1.0.0
Apple Safari 3.2
Apple Safari 3.0.3
NA
CVE-2010-1807
WebKit in Apple Safari 4.x prior to 4.1.2 and 5.x prior to 5.0.2; Android prior to 2.2; and webkitgtk prior to 1.2.6; does not properly validate floating-point data, which allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via...
Apple Safari 4.0.2
Apple Safari 4.0.1
Apple Safari 4.0.5
Apple Safari 4.0
Apple Safari 4.0.3
Apple Safari 4.1.1
Apple Safari 4.1
Apple Safari 4.0.0b
Apple Safari 4.0.4
Apple Safari 5.0.1
Apple Safari 5.0
Google Android
Google Android 1.0
Google Android 1.6
Google Android 2.0
Google Android 1.5
Google Android 1.1
Webkitgtk Webkitgtk 1.2.3
Webkitgtk Webkitgtk 1.2.0
Webkitgtk Webkitgtk 1.2.2
Webkitgtk Webkitgtk
Webkitgtk Webkitgtk 1.2.4
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »