Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 4 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-1233
Apple Safari 3.2.2 and 4 Beta on Windows allows remote malicious users to cause a denial of service (application crash) via an XML document containing many nested A elements.
Apple Safari 3.2.2
Apple Safari 4
1 EDB exploit
NA
CVE-2011-0241
Heap-based buffer overflow in ImageIO in Apple Safari prior to 5.0.6 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF image with CCITT Group 4 encoding.
Apple Safari 1.2.4
Apple Safari 1.2.2
Apple Safari 1.1.1
Apple Safari 1.0
Apple Safari 1.0.1
Apple Safari 1.0.0
Apple Safari 3.0.0
Apple Safari 2.0.4
Apple Safari 2
Apple Safari 1.2
Apple Safari 2.0
Apple Safari 3.0.1b
Apple Safari 1.1
Apple Safari 3.2.0
Apple Safari 3.1.0
Apple Safari 5.0.4
Apple Safari
Apple Imageio
Apple Safari 2.0.1
Apple Safari 2.0.3
Apple Safari 2.0.2
Apple Safari 1.2.0
NA
CVE-2009-0162
Cross-site scripting (XSS) vulnerability in Safari prior to 3.2.3, and 4 Public Beta, on Apple Mac OS X 10.5 prior to 10.5.7 and Windows allows remote malicious users to inject arbitrary web script or HTML via a crafted feed: URL.
Apple Safari 1.0
Apple Safari 1.0.0b1
Apple Safari 1.2
Apple Safari 1.0.3
Apple Safari 1.2.4
Apple Safari 1.2.5
Apple Safari 2
Apple Safari 2.0.3
Apple Safari 3.0
Apple Safari 3.0.0
Apple Safari 3.1.1
Apple Safari 3.1.2
Apple Safari 1.0.1
Apple Safari 1.0.0b2
Apple Safari 1.2.2
Apple Safari 1.2.3
Apple Safari 2.0.1
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3
Apple Safari 3.1.0
Apple Safari 3.1
1 EDB exploit
NA
CVE-2009-1709
Use-after-free vulnerability in the garbage-collection implementation in WebCore in WebKit in Apple Safari prior to 4.0 allows remote malicious users to execute arbitrary code or cause a denial of service (heap corruption and application crash) via an SVG animation element, relat...
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.0
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.2.3
Apple Safari
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.2
Apple Safari 0.9
NA
CVE-2010-1806
Use-after-free vulnerability in Apple Safari 4.x prior to 4.1.2 and 5.x prior to 5.0.2 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via run-in styling in an element, related to object pointers.
Apple Safari 4.0.0b
Apple Safari 4.0
Apple Safari 5.0
Apple Safari 5.0.1
Apple Safari 4.0.5
Apple Safari 4.1
Apple Safari 4.0.3
Apple Safari 4.0.4
Apple Safari 4.0.1
Apple Safari 4.0.2
NA
CVE-2009-0945
Array index error in the insertItemBefore method in WebKit, as used in Apple Safari prior to 3.2.3 and 4 Public Beta, iPhone OS 1.0 up to and including 2.2.1, iPhone OS for iPod touch 1.1 up to and including 2.2.1, Google Chrome Stable prior to 1.0.154.65, and possibly other prod...
Apple Safari 0.9
Apple Safari 1.0.2
Apple Safari 1.1.0
Apple Safari 1.1
Apple Safari 0.8
Apple Safari 1.0.3
Apple Safari 1.0.0
Apple Safari 1.2.0
Apple Safari 1.1.1
Apple Safari 1.3.0
Apple Safari 1.3.2
Apple Safari 1.3
Apple Safari 2.0.3
Apple Safari 3.0.1
Apple Safari 3.0.2
Apple Safari 3.2
Apple Safari 3.2.0
Apple Safari 1.0
Apple Safari 1.0.0b1
Apple Safari 1.2
Apple Safari 1.2.4
Apple Safari 1.2.5
NA
CVE-2010-1805
Untrusted search path vulnerability in Apple Safari 4.x prior to 4.1.2 and 5.x prior to 5.0.2 on Windows allows local users to gain privileges via a Trojan horse explorer.exe (aka Windows Explorer) program in a directory containing a file that had been downloaded by Safari.
Apple Safari 4.0.3
Apple Safari 4.0.4
Apple Safari 4.0.1
Apple Safari 4.0.2
Apple Safari 4.0.0b
Apple Safari 4.0
Apple Safari 5.0
Apple Safari 5.0.1
Apple Safari 4.0.5
Apple Safari 4.1
NA
CVE-2015-1119
WebKit, as used in Apple iOS prior to 8.3, Apple TV prior to 7.2, and Apple Safari prior to 6.2.5, 7.x prior to 7.1.5, and 8.x prior to 8.0.5, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a craf...
Apple Iphone Os
Apple Tvos
Apple Safari 7.0.5
Apple Safari 7.0.6
Apple Safari 8.0.2
Apple Safari 8.0.3
Apple Safari 7.0.1
Apple Safari 7.0.2
Apple Safari 7.1.2
Apple Safari 7.1.3
Apple Safari
Apple Safari 7.0
Apple Safari 7.1.0
Apple Safari 7.1.1
Apple Safari 8.0.4
Apple Safari 7.0.3
Apple Safari 7.0.4
Apple Safari 7.1.4
Apple Safari 8.0.0
Apple Safari 8.0.1
Apple Itunes
NA
CVE-2015-1124
WebKit, as used in Apple iOS prior to 8.3, Apple TV prior to 7.2, and Apple Safari prior to 6.2.5, 7.x prior to 7.1.5, and 8.x prior to 8.0.5, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a craf...
Apple Itunes
Apple Tvos
Apple Iphone Os
Apple Safari 7.0.1
Apple Safari 7.0.2
Apple Safari 7.1.2
Apple Safari 7.1.3
Apple Safari 7.0.5
Apple Safari 7.0.6
Apple Safari 8.0.2
Apple Safari 8.0.3
Apple Safari
Apple Safari 7.0
Apple Safari 7.1.0
Apple Safari 7.1.1
Apple Safari 8.0.4
Apple Safari 7.0.3
Apple Safari 7.0.4
Apple Safari 7.1.4
Apple Safari 8.0.0
Apple Safari 8.0.1
NA
CVE-2015-1121
WebKit, as used in Apple iOS prior to 8.3, Apple TV prior to 7.2, and Apple Safari prior to 6.2.5, 7.x prior to 7.1.5, and 8.x prior to 8.0.5, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a craf...
Apple Tvos
Apple Iphone Os
Apple Itunes
Apple Safari 7.0.1
Apple Safari 7.0.2
Apple Safari 7.1.2
Apple Safari 7.1.3
Apple Safari 7.0.5
Apple Safari 7.0.6
Apple Safari 8.0.1
Apple Safari 8.0.2
Apple Safari
Apple Safari 7.0
Apple Safari 7.1.0
Apple Safari 7.1.1
Apple Safari 8.0.3
Apple Safari 8.0.4
Apple Safari 7.0.3
Apple Safari 7.0.4
Apple Safari 7.1.4
Apple Safari 8.0.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »