Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 3.2.3 vulnerabilities and exploits
(subscribe to this query)
505
VMScore
CVE-2009-3272
Stack consumption vulnerability in WebKit.dll in WebKit in Apple Safari 3.2.3, and possibly other versions prior to 4.1.2, allows remote malicious users to cause a denial of service (application crash) via JavaScript code that calls eval on a long string composed of A/ sequences.
Apple Safari 4.0.3
Apple Safari 4.0
Apple Safari 3.2.3
Apple Safari 4.0.0b
Apple Safari 4.0.2
1 EDB exploit
516
VMScore
CVE-2009-2420
Apple Safari 3.2.3 does not properly implement the file: protocol handler, which allows remote malicious users to read arbitrary files or cause a denial of service (launch of multiple Windows Explorer instances) via vectors involving an unspecified HTML tag, possibly a related is...
Apple Safari 3.2.3
445
VMScore
CVE-2009-2421
The CFCharacterSetInitInlineBuffer method in CoreFoundation.dll in Apple Safari 3.2.3 allows remote malicious users to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via a "high-bit character" in a URL fragm...
Apple Safari 3.2.3
383
VMScore
CVE-2009-1682
Apple Safari prior to 4.0 does not properly check for revoked Extended Validation (EV) certificates, which makes it easier for remote malicious users to trick a user into accepting an invalid certificate.
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 3.0
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 0.9
383
VMScore
CVE-2009-1685
Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to inject arbitrary web script or HTML by overwriting the document.im...
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.3
Apple Safari
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.0.3
Apple Safari 3.0
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.2
Apple Safari 0.9
383
VMScore
CVE-2009-1689
Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to inject arbitrary web script or HTML via vectors involving submissi...
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.2
Apple Safari 0.9
Apple Safari 3.0
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.2.3
Apple Safari
632
VMScore
CVE-2009-1713
The XSLT functionality in WebKit in Apple Safari prior to 4.0 does not properly implement the document function, which allows remote malicious users to read (1) arbitrary local files and (2) files from different security zones via unspecified vectors.
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.4
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 1.0.3
Apple Safari 1.2
Apple Safari 1.3
Apple Safari
Apple Safari 3.0.2
383
VMScore
CVE-2009-1715
Cross-site scripting (XSS) vulnerability in Web Inspector in WebKit in Apple Safari prior to 4.0 allows user-assisted remote malicious users to inject arbitrary web script or HTML, and read local files, via vectors related to script execution with incorrect privileges.
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
187
VMScore
CVE-2009-1716
CFNetwork in Apple Safari prior to 4.0 on Windows does not properly protect the temporary files created for downloads, which allows local users to obtain sensitive information by reading these files.
Apple Safari 3.0.4
Apple Safari 3.1.1
Apple Safari 1.2
Apple Safari 1.3
Apple Safari
Apple Safari 3.0.2
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 0.9
Apple Safari 3.0
Apple Safari 3.0.3
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 3.2.3
383
VMScore
CVE-2009-1681
WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not prevent web sites from loading third-party content into a subframe, which allows remote malicious users to bypass the Same Origin Poli...
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.4
Apple Safari 1.2
Apple Safari 1.3
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 1.0.3
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »