Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 18 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2016-10222
runtime/JSONObject.cpp in JavaScriptCore in WebKit, as distributed in Safari Technology Preview Release 18, allows remote malicious users to cause a denial of service (segmentation violation and application crash) via crafted JavaScript code that triggers a "type confusion&q...
Apple Safari 18
5
CVSSv2
CVE-2016-10226
JavaScriptCore in WebKit, as distributed in Safari Technology Preview Release 18, allows remote malicious users to cause a denial of service (bitfield out-of-bounds read and application crash) via crafted JavaScript code that is mishandled in the operatorString function, related ...
Apple Safari 18
4.3
CVSSv2
CVE-2008-1002
Cross-site scripting (XSS) vulnerability in Apple Safari prior to 3.1 allows remote malicious users to inject arbitrary web script or HTML via a crafted javascript: URL.
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 3.0
Apple Safari 3.0.1
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.4
6.8
CVSSv2
CVE-2013-1039
WebKit, as used in Apple iOS prior to 7, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.
Apple Itunes
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.1
Apple Iphone Os 2.0
Apple Iphone Os 2.0.1
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1.2
Apple Iphone Os 4.0.2
Apple Iphone Os 4.2.1
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.5
Apple Iphone Os 6.0.2
Apple Iphone Os 6.1.2
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os 3.2
Apple Iphone Os 3.2.1
Apple Iphone Os 3.2.2
Apple Iphone Os 4.0
Apple Iphone Os 5.0.1
6.8
CVSSv2
CVE-2013-1041
WebKit, as used in Apple iOS prior to 7, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.2
Apple Iphone Os 2.0
Apple Iphone Os 2.0.1
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0.1
Apple Iphone Os 4.0
Apple Iphone Os 4.0.2
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.5
Apple Iphone Os 6.0
Apple Iphone Os 6.0.2
Apple Iphone Os 6.1.5
Apple Iphone Os 6.1.6
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 2.2
Apple Iphone Os 4.2.1
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 4.3.0
6.8
CVSSv2
CVE-2013-1037
WebKit, as used in Apple iOS prior to 7, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.
Apple Safari
Apple Iphone Os 6.1.5
Apple Iphone Os 6.1.4
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.5
Apple Iphone Os 2.1
Apple Iphone Os 2.2
Apple Iphone Os 3.2
Apple Iphone Os 3.2.2
Apple Iphone Os 4.2.1
Apple Iphone Os 4.2.8
Apple Iphone Os 4.3.1
Apple Iphone Os 5.0.1
Apple Iphone Os 5.1.1
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 3.1
6.8
CVSSv2
CVE-2013-1038
WebKit, as used in Apple iOS prior to 7, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.
Apple Safari
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.2
Apple Iphone Os 2.0
Apple Iphone Os 2.0.1
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0.1
Apple Iphone Os 4.0
Apple Iphone Os 4.0.2
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.5
Apple Iphone Os 6.0
Apple Iphone Os 6.0.2
Apple Iphone Os 1.1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 1.1.4
Apple Iphone Os 3.1.2
Apple Iphone Os 3.1.3
Apple Iphone Os 3.2
Apple Iphone Os 3.2.1
6.8
CVSSv2
CVE-2013-1040
WebKit, as used in Apple iOS prior to 7, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.
Apple Itunes
Apple Safari
Apple Iphone Os 6.1.6
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.2
Apple Iphone Os 1.1.4
Apple Iphone Os 2.0
Apple Iphone Os 2.2.1
Apple Iphone Os 3.0.1
Apple Iphone Os 3.2.1
Apple Iphone Os 4.0
Apple Iphone Os 4.0.2
Apple Iphone Os 4.3.0
Apple Iphone Os 4.3.2
Apple Iphone Os 6.0
Apple Iphone Os 6.0.2
Apple Iphone Os 6.1.5
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 4.1
6.8
CVSSv2
CVE-2013-1047
WebKit, as used in Apple iOS prior to 7, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.3
Apple Iphone Os 2.0.1
Apple Iphone Os 2.1
Apple Iphone Os 3.1.2
Apple Iphone Os 3.2
Apple Iphone Os 4.2.1
Apple Iphone Os 4.2.8
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0.1
Apple Iphone Os 6.1.2
Apple Iphone Os 1.1.4
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 3.2.2
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.0.2
Apple Iphone Os 5.1.1
Apple Iphone Os 6.0
Apple Iphone Os 6.0.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started