Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 4.0.3 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2010-0045
Apple Safari prior to 4.0.5 on Windows does not properly validate external URL schemes, which allows remote malicious users to open local files and execute arbitrary code via a crafted HTML document.
Apple Safari 4.0
Apple Safari
Apple Safari 4.0.1
Apple Safari 4.0.2
Apple Safari 4.0.3
9.3
CVSSv2
CVE-2010-0048
Use-after-free vulnerability in WebKit in Apple Safari prior to 4.0.5 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted XML document.
Apple Safari 4.0.1
Apple Safari
Apple Safari 4.0
Apple Safari 4.0.3
Apple Safari 4.0.2
5
CVSSv2
CVE-2010-0924
cfnetwork.dll 1.450.5.0 in CFNetwork, as used by safari.exe 531.21.10 in Apple Safari 4.0.3 and 4.0.4 on Windows, allows remote malicious users to cause a denial of service (application crash) via a long string in the BACKGROUND attribute of a BODY element.
Apple Safari 4.0.3
Apple Safari 4.0.4
5
CVSSv2
CVE-2009-3272
Stack consumption vulnerability in WebKit.dll in WebKit in Apple Safari 3.2.3, and possibly other versions prior to 4.1.2, allows remote malicious users to cause a denial of service (application crash) via JavaScript code that calls eval on a long string composed of A/ sequences.
Apple Safari 4.0.3
Apple Safari 4.0
Apple Safari 3.2.3
Apple Safari 4.0.0b
Apple Safari 4.0.2
1 EDB exploit
9.3
CVSSv2
CVE-2010-0040
Integer overflow in ColorSync in Apple Safari prior to 4.0.5 on Windows, and iTunes prior to 9.1, allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via an image with a crafted color profile that triggers a heap-based buffer o...
Apple Safari 4.0.0b
Apple Safari 4.0
Apple Safari
Apple Safari 4.0.3
Apple Safari 4.0.2
Apple Safari 4.0.1
4.3
CVSSv2
CVE-2010-0041
ImageIO in Apple Safari prior to 4.0.5 and iTunes prior to 9.1 on Windows does not ensure that memory access is associated with initialized memory, which allows remote malicious users to obtain potentially sensitive information from process memory via a crafted BMP image.
Apple Safari 4.0.0b
Apple Safari 4.0
Apple Safari 4.0.2
Apple Safari 4.0.1
Apple Safari
Apple Safari 4.0.3
9.3
CVSSv2
CVE-2010-0043
ImageIO in Apple Safari prior to 4.0.5 and iTunes prior to 9.1 on Windows allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted TIFF image.
Apple Safari 4.0.3
Apple Safari 4.0.2
Apple Safari 4.0
Apple Safari 4.0.1
Apple Safari 4.0.0b
Apple Safari
9.3
CVSSv2
CVE-2010-0046
The Cascading Style Sheets (CSS) implementation in WebKit in Apple Safari prior to 4.0.5 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted format arguments.
Apple Safari 4.0.0b
Apple Safari 4.0.1
Apple Safari 4.0.2
Apple Safari 4.0.3
Apple Safari
Apple Safari 4.0
9.3
CVSSv2
CVE-2010-0049
Use-after-free vulnerability in WebKit in Apple Safari prior to 4.0.5 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via HTML elements with right-to-left (RTL) text directionality.
Apple Safari 4.0.2
Apple Safari 4.0.3
Apple Safari 4.0.0b
Apple Safari 4.0
Apple Safari
Apple Safari 4.0.1
1 EDB exploit
4.3
CVSSv2
CVE-2010-0051
WebKit in Apple Safari prior to 4.0.5 does not properly validate the cross-origin loading of stylesheets, which allows remote malicious users to obtain sensitive information via a crafted HTML document. NOTE: this might overlap CVE-2010-0651.
Apple Safari 4.0.2
Apple Safari 4.0.1
Apple Safari
Apple Safari 4.0.3
Apple Safari 4.0.0b
Apple Safari 4.0
2 Github repositories
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
spoof
CVE-2024-34928
CVE-2024-5291
deserialization
CVE-2024-4471
CVE-2024-4956
CVE-2024-32002
CVE-2024-5227
unspecified
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »