Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redirection project redirection 1.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-1580
Multiple cross-site request forgery (CSRF) vulnerabilities in the Redirection Page plugin 1.2 for WordPress allow remote malicious users to hijack the authentication of administrators for requests that (1) change plugin settings or conduct cross-site scripting (XSS) attacks via t...
Redirection Project Redirection 1.2
NA
CVE-2009-1695
Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to inject arbitrary web script or HTML via vectors involving access t...
Apple Safari 1.1
Apple Safari 1.3.1
Apple Safari 3.2.3
Apple Safari 2.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 3.0
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 1.3.2
Apple Safari 1.2
Apple Safari
Apple Safari 3.2.1
Apple Safari 3.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.0.3
Apple Safari 1.0
Apple Safari 1.3
NA
CVE-2009-1697
CRLF injection vulnerability in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to inject HTTP headers and bypass the Same Origin Policy via a crafted HTML docum...
Apple Safari 1.1
Apple Safari 1.3.1
Apple Safari 3.2.3
Apple Safari 2.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 3.0
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 1.3.2
Apple Safari 1.2
Apple Safari
Apple Safari 3.2.1
Apple Safari 3.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.0.3
Apple Safari 1.0
Apple Safari 1.3
NA
CVE-2009-1712
WebKit in Apple Safari prior to 4.0 does not prevent remote loading of local Java applets, which allows remote malicious users to execute arbitrary code, gain privileges, or obtain sensitive information via an APPLET or OBJECT element.
Apple Safari 1.1
Apple Safari 1.3.1
Apple Safari 3.2.3
Apple Safari 2.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 3.0
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 1.3.2
Apple Safari 1.2
Apple Safari
Apple Safari 3.2.1
Apple Safari 3.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.0.3
Apple Safari 1.0
Apple Safari 1.3
NA
CVE-2009-1710
WebKit in Apple Safari prior to 4.0 allows remote malicious users to spoof the browser's display of (1) the host name, (2) security indicators, and unspecified other UI elements via a custom cursor in conjunction with a modified CSS3 hotspot property.
Apple Safari 3.1.2
Apple Safari 3.2.1
Apple Safari 0.9
Apple Safari 1.3.2
Apple Safari 1.2
Apple Safari 3.0.4
Apple Safari 3.0.3
Apple Safari 1.3.1
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.2.3
Apple Safari 1.1
Apple Safari
Apple Safari 3.1
Apple Safari 2.0
Apple Safari 3.0.2
Apple Safari 1.0.3
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 0.8
NA
CVE-2009-1711
WebKit in Apple Safari prior to 4.0 does not properly initialize memory for Attr DOM objects, which allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document.
Apple Safari 1.1
Apple Safari 1.3.1
Apple Safari 3.2.3
Apple Safari 2.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 3.0
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 1.3.2
Apple Safari 1.2
Apple Safari
Apple Safari 3.2.1
Apple Safari 3.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.0.3
Apple Safari 1.0
Apple Safari 1.3
NA
CVE-2009-1714
Cross-site scripting (XSS) vulnerability in Web Inspector in WebKit in Apple Safari prior to 4.0 allows user-assisted remote malicious users to inject arbitrary web script or HTML, and read local files, via vectors related to the improper escaping of HTML attributes.
Apple Safari 3.1.2
Apple Safari 3.2.1
Apple Safari 0.9
Apple Safari 1.3.2
Apple Safari 1.2
Apple Safari 3.0.4
Apple Safari 3.0.3
Apple Safari 1.3.1
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.2.3
Apple Safari 1.1
Apple Safari
Apple Safari 3.1
Apple Safari 2.0
Apple Safari 3.0.2
Apple Safari 1.0.3
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 0.8
NA
CVE-2009-1690
Use-after-free vulnerability in WebKit, as used in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, iPhone OS for iPod touch 1.1 up to and including 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows remote malicious users to execute arbitrary...
Apple Safari 1.1
Apple Safari 1.3.1
Apple Safari 3.2.3
Apple Safari 2.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 3.0
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 1.3.2
Apple Safari 1.2
Apple Safari
Apple Safari 3.2.1
Apple Safari 3.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.0.3
Apple Safari 1.0
Apple Safari 1.3
NA
CVE-2009-1693
WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to read images from arbitrary web sites via a CANVAS element with an SVG image, related to a "cross-site ima...
Apple Safari 3.1.2
Apple Safari 3.2.1
Apple Safari 0.9
Apple Safari 1.3.2
Apple Safari 1.2
Apple Safari 3.0.4
Apple Safari 3.0.3
Apple Safari 1.3.1
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.2.3
Apple Safari 1.1
Apple Safari
Apple Safari 3.1
Apple Safari 2.0
Apple Safari 3.0.2
Apple Safari 1.0.3
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 0.8
NA
CVE-2009-1694
WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not properly handle redirects, which allows remote malicious users to read images from arbitrary web sites via vectors involving a CANVAS ...
Apple Safari 1.1
Apple Safari 1.3.1
Apple Safari 3.2.3
Apple Safari 2.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 3.0
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 1.3.2
Apple Safari 1.2
Apple Safari
Apple Safari 3.2.1
Apple Safari 3.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.0.3
Apple Safari 1.0
Apple Safari 1.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »