Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 1.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-1006
Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary web script or HTML by using the window.open function to change the security context of a web page.
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0
Apple Safari 3.0.1
Apple Safari 0.8
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 3.0.2
NA
CVE-2008-1008
Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary web script or HTML via the document.domain property.
Apple Safari 0.8
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0
Apple Safari 3.0.1
NA
CVE-2008-1009
Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary JavaScript by modifying the history object.
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0
Apple Safari 3.0.1
NA
CVE-2008-1010
Buffer overflow in WebKit, as used in Apple Safari prior to 3.1, allows remote malicious users to execute arbitrary code via crafted regular expressions in JavaScript.
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 3.0
Apple Safari 3.0.1
Apple Safari 3.0.4
NA
CVE-2008-1011
Cross-site scripting (XSS) vulnerability in WebKit, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary web script or HTML via a frame that calls a method instance in another frame.
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.0.1
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.4
NA
CVE-2008-1025
Cross-site scripting (XSS) vulnerability in Apple WebKit, as used in Safari prior to 3.1.1, allows remote malicious users to inject arbitrary web script or HTML via a crafted URL with a colon in the hostname portion.
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.4
Apple Safari 3.1
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 1.3.2
Apple Safari 2.0
Apple Webkit
NA
CVE-2009-1711
WebKit in Apple Safari prior to 4.0 does not properly initialize memory for Attr DOM objects, which allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document.
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.2
Apple Safari 0.9
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.2.3
Apple Safari
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.0.3
Apple Safari 3.0
Apple Safari 3.0.4
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 1.0.3
NA
CVE-2009-1712
WebKit in Apple Safari prior to 4.0 does not prevent remote loading of local Java applets, which allows remote malicious users to execute arbitrary code, gain privileges, or obtain sensitive information via an APPLET or OBJECT element.
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.2.3
Apple Safari
Apple Safari 3.1.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.2
Apple Safari 0.9
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.0.3
Apple Safari 3.0
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 3.0.4
Apple Safari 1.0.3
NA
CVE-2009-1715
Cross-site scripting (XSS) vulnerability in Web Inspector in WebKit in Apple Safari prior to 4.0 allows user-assisted remote malicious users to inject arbitrary web script or HTML, and read local files, via vectors related to script execution with incorrect privileges.
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
NA
CVE-2009-1689
Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to inject arbitrary web script or HTML via vectors involving submissi...
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.2
Apple Safari 0.9
Apple Safari 3.0
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.2.3
Apple Safari
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-25525
CVE-2024-4652
CVE-2024-1438
CVE-2024-4671
CVE-2024-34351
arbitrary
CVE-2024-4650
SQL injection
overflow
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »