Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 1.2.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-1121
Apple Safari 1.0 up to and including 1.2.3 allows remote malicious users to spoof the URL displayed in the status bar via TABLE tags.
Apple Safari 1.2.2
Apple Safari 1.0
Apple Safari 1.2.1
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 1.2.3
1 EDB exploit
NA
CVE-2004-1199
Safari 1.2.4 on Mac OS X 10.3.6 allows remote malicious users to cause a denial of service (application crash from memory exhaustion), as demonstrated using Javascript code that continuously creates nested arrays and then sorts the newly created arrays.
Apple Safari 1.2.2
Apple Safari 1.0
Apple Safari 1.2.1
Apple Safari 1.1
Apple Safari 1.2
Apple Safari Beta2
Apple Safari 1.2.3
NA
CVE-2004-1314
Safari 1.x allows remote malicious users to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection"...
Apple Safari 1.2.2
Apple Safari 1.0
Apple Safari 1.2.1
Apple Safari 1.1
Apple Safari 1.2
Apple Safari Beta2
Apple Safari 1.2.3
NA
CVE-2005-3018
Apple Safari allows remote malicious users to cause a denial of service (application crash) via a crafted data:// URL.
Apple Safari 1.2.2
Apple Safari 2.0.1
Apple Safari 1.0
Apple Safari 1.3
Apple Safari 2.0
Apple Safari 1.2.1
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 1.2.3
1 EDB exploit
NA
CVE-2004-0720
Safari 1.2.2 does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.
Apple Safari 1.2.2
NA
CVE-2008-3623
Heap-based buffer overflow in CoreGraphics in Apple Safari prior to 3.2 on Windows, in iPhone OS 1.0 up to and including 2.2.1, and in iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to execute arbitrary code or cause a denial of service (appl...
Apple Safari
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 1.1.1
Apple Safari 1.2
Apple Safari 1.2.1
Apple Safari 1.2.2
Apple Safari 1.2.3
Apple Safari 1.2.4
Apple Safari 1.2.5
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 2
Apple Safari 2.0
Apple Safari 2.0.1
Apple Safari 2.0.2
Apple Safari 2.0.3
Apple Safari 2.0.3 417.9.3
NA
CVE-2008-4216
The plug-in interface in WebKit in Apple Safari prior to 3.2 does not prevent plug-ins from accessing local URLs, which allows remote malicious users to obtain sensitive information via vectors that "launch local files."
Apple Safari 1.3.2
Apple Safari 2
Apple Safari 1.1.1
Apple Safari 3.0.4
Apple Safari 1.2.2
Apple Safari 2.0.1
Apple Safari 3.0.1
Apple Safari 2.0.3
Apple Safari 1.0.3
Apple Safari 2.0.2
Apple Safari 3.0.2
Apple Safari 1.0
Apple Safari 2.0.4 419.3
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 3.0.3
Apple Safari 3.1
Apple Safari 1.2.5
Apple Safari 3.0
Apple Safari 2.0
Apple Safari 1.2.4
Apple Safari 1.2.1
NA
CVE-2008-3644
Apple Safari prior to 3.2 does not properly prevent caching of form data for form fields that have autocomplete disabled, which allows local users to obtain sensitive information by reading the browser's page cache.
Apple Safari 1.3.2
Apple Safari 2
Apple Safari 1.1.1
Apple Safari 3.0.4
Apple Safari 1.2.2
Apple Safari 2.0.1
Apple Safari 3.0.1
Apple Safari 2.0.3
Apple Safari 1.0.3
Apple Safari 2.0.2
Apple Safari 3.0.2
Apple Safari 1.0
Apple Safari 2.0.4 419.3
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 3.0.3
Apple Safari 3.1
Apple Safari 1.2.5
Apple Safari 3.0
Apple Safari 2.0
Apple Safari 1.2.4
Apple Safari 1.2.1
NA
CVE-2009-3455
Apple Safari, possibly prior to 4.0.3, on Mac OS X does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle malicious users to spoof arbitrary SSL servers via a crafte...
Apple Safari 3.1.2
Apple Safari 2.0.3
Apple Safari 4.0.1
Apple Safari 2.0.1
Apple Safari 1.2.0
Apple Safari 3.2.3
Apple Safari 3.2.1
Apple Safari 0.9
Apple Safari 1.2.3
Apple Safari 1.2.1
Apple Safari 1.3.2
Apple Safari
Apple Safari 3.1.0
Apple Safari 1.2
Apple Safari 4.0
Apple Safari 3.1
Apple Safari 4.0.0b
Apple Safari 3.0.4
Apple Safari 4.0 Beta
Apple Safari 1.0.0
Apple Safari 3.2
Apple Safari 3.0.3
NA
CVE-2010-1807
WebKit in Apple Safari 4.x prior to 4.1.2 and 5.x prior to 5.0.2; Android prior to 2.2; and webkitgtk prior to 1.2.6; does not properly validate floating-point data, which allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via...
Apple Safari 4.0.2
Apple Safari 4.0.1
Apple Safari 4.0.5
Apple Safari 4.0
Apple Safari 4.0.3
Apple Safari 4.1.1
Apple Safari 4.1
Apple Safari 4.0.0b
Apple Safari 4.0.4
Apple Safari 5.0.1
Apple Safari 5.0
Google Android
Google Android 1.0
Google Android 1.6
Google Android 2.0
Google Android 1.5
Google Android 1.1
Webkitgtk Webkitgtk 1.2.3
Webkitgtk Webkitgtk 1.2.0
Webkitgtk Webkitgtk 1.2.2
Webkitgtk Webkitgtk
Webkitgtk Webkitgtk 1.2.4
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »