Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 3.2.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-1705
CoreGraphics in Apple Safari prior to 4.0 on Windows does not properly use arithmetic during automatic hinting of TrueType fonts, which allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted font ...
Apple Safari 3.2
Apple Safari 3.0.3
Apple Safari 3.0.1
Apple Safari 3.1.2
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.1
Apple Safari 3.1.1
Apple Safari 3.0
Apple Safari 3.2.2
Apple Safari 3.2.1
Apple Safari 3.0.4
NA
CVE-2009-1706
The Private Browsing feature in Apple Safari prior to 4.0 on Windows does not remove cookies from the alternate cookie store in unspecified circumstances upon (1) disabling of the feature or (2) exit of the application, which makes it easier for remote web servers to track users ...
Apple Safari 3.2
Apple Safari 3.0.3
Apple Safari 3.0.1
Apple Safari 3.1.2
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.1
Apple Safari 3.1.1
Apple Safari 3.0
Apple Safari 3.2.2
Apple Safari 3.2.1
Apple Safari 3.0.4
NA
CVE-2009-1707
Race condition in the Reset Safari implementation in Apple Safari prior to 4.0 on Windows might allow local users to read stored web-site passwords via unspecified vectors.
Apple Safari 3.0.1
Apple Safari 3.2
Apple Safari 3.1.2
Apple Safari
Apple Safari 3.0.3
Apple Safari 3.0.2
Apple Safari 3.1.1
Apple Safari 3.0
Apple Safari 3.1
Apple Safari 3.2.2
Apple Safari 3.2.1
Apple Safari 3.0.4
NA
CVE-2009-2027
The Installer in Apple Safari prior to 4.0 on Windows allows local users to gain privileges by checking a box that specifies an immediate launch of the application after installation, related to an unspecified compression method.
Apple Safari 3.2
Apple Safari 3.0.1
Apple Safari 3.1.2
Apple Safari
Apple Safari 3.0.3
Apple Safari 3.0.2
Apple Safari 3.1.1
Apple Safari 3.0
Apple Safari 3.1
Apple Safari 3.2.2
Apple Safari 3.2.1
Apple Safari 3.0.4
NA
CVE-2009-0321
Apple Safari 3.2.1 (aka AppVer 3.525.27.1) on Windows allows remote malicious users to cause a denial of service (infinite loop or access violation) via a link to an http URI in which the authority (aka hostname) portion is either a (1) . (dot) or (2) .. (dot dot) sequence.
Apple Safari 3.2.1
1 EDB exploit
NA
CVE-2009-1684
Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to inject arbitrary web script or HTML via an event handler that trig...
Apple Safari 1.1
Apple Safari 1.3.1
Apple Safari 3.2.3
Apple Safari 2.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 3.0
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 1.3.2
Apple Safari 1.2
Apple Safari
Apple Safari 3.2.1
Apple Safari 3.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.0.3
Apple Safari 1.0
Apple Safari 1.3
1 EDB exploit
NA
CVE-2009-1685
Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to inject arbitrary web script or HTML by overwriting the document.im...
Apple Safari 1.1
Apple Safari 1.3.1
Apple Safari 3.2.3
Apple Safari 2.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 3.0
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 1.3.2
Apple Safari 1.2
Apple Safari
Apple Safari 3.2.1
Apple Safari 3.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.0.3
Apple Safari 1.0
Apple Safari 1.3
NA
CVE-2009-1687
The JavaScript garbage collector in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not properly handle allocation failures, which allows remote malicious users to execute arbitrary code...
Apple Safari 1.1
Apple Safari 1.3.1
Apple Safari 3.2.3
Apple Safari 2.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 3.0
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 1.3.2
Apple Safari 1.2
Apple Safari
Apple Safari 3.2.1
Apple Safari 3.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.0.3
Apple Safari 1.0
Apple Safari 1.3
NA
CVE-2009-1693
WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to read images from arbitrary web sites via a CANVAS element with an SVG image, related to a "cross-site ima...
Apple Safari 3.1.2
Apple Safari 3.2.1
Apple Safari 0.9
Apple Safari 1.3.2
Apple Safari 1.2
Apple Safari 3.0.4
Apple Safari 3.0.3
Apple Safari 1.3.1
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.2.3
Apple Safari 1.1
Apple Safari
Apple Safari 3.1
Apple Safari 2.0
Apple Safari 3.0.2
Apple Safari 1.0.3
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 0.8
NA
CVE-2009-1694
WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not properly handle redirects, which allows remote malicious users to read images from arbitrary web sites via vectors involving a CANVAS ...
Apple Safari 1.1
Apple Safari 1.3.1
Apple Safari 3.2.3
Apple Safari 2.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 3.0
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 1.3.2
Apple Safari 1.2
Apple Safari
Apple Safari 3.2.1
Apple Safari 3.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.0.3
Apple Safari 1.0
Apple Safari 1.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »