Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 2.0 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2008-1005
WebCore, as used in Apple Safari prior to 3.1, does not properly mask the password field when reverse conversion is used with the Kotoeri input method, which allows physically proximate malicious users to read the password.
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.0.1
Apple Safari 3.0.2
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.3
Apple Safari 3.0.4
4.3
CVSSv2
CVE-2008-1011
Cross-site scripting (XSS) vulnerability in WebKit, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary web script or HTML via a frame that calls a method instance in another frame.
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.0.1
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.4
4.3
CVSSv2
CVE-2008-1006
Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary web script or HTML by using the window.open function to change the security context of a web page.
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0
Apple Safari 3.0.1
Apple Safari 0.8
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 3.0.2
4.3
CVSSv2
CVE-2008-1008
Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary web script or HTML via the document.domain property.
Apple Safari 0.8
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0
Apple Safari 3.0.1
4.3
CVSSv2
CVE-2008-1009
Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary JavaScript by modifying the history object.
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0
Apple Safari 3.0.1
6.8
CVSSv2
CVE-2008-1010
Buffer overflow in WebKit, as used in Apple Safari prior to 3.1, allows remote malicious users to execute arbitrary code via crafted regular expressions in JavaScript.
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 3.0
Apple Safari 3.0.1
Apple Safari 3.0.4
4.3
CVSSv2
CVE-2008-1025
Cross-site scripting (XSS) vulnerability in Apple WebKit, as used in Safari prior to 3.1.1, allows remote malicious users to inject arbitrary web script or HTML via a crafted URL with a colon in the hostname portion.
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.4
Apple Safari 3.1
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 1.3.2
Apple Safari 2.0
Apple Webkit
2.6
CVSSv2
CVE-2005-2272
Safari version 2.0 (412) does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote malicious users to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability.&quo...
Apple Safari 2.0
10
CVSSv2
CVE-2010-1119
Use-after-free vulnerability in WebKit in Apple Safari prior to 5.0 on Mac OS X 10.5 up to and including 10.6 and Windows, Safari prior to 4.1 on Mac OS X 10.4, and Safari on Apple iPhone OS allows remote malicious users to execute arbitrary code or cause a denial of service (app...
Apple Safari 4.0.4
Apple Safari
Apple Safari 3.0.1
Apple Safari 3.0.1b
Apple Safari 3.1
Apple Safari 3.1.0
Apple Safari 3.2.3
Apple Safari 2
Apple Safari 2.0.3
Apple Safari 1.0.2
Apple Safari 1.0.3
Apple Safari 1.1.1
Apple Safari 1.2
Apple Safari 1.3.0
Apple Safari 1.3.1
Apple Safari 4.0.0b
Apple Safari 4.0
Apple Safari 4.1
Apple Safari 3.0.2
Apple Safari 3.0.2b
Apple Safari 3.1.0b
Apple Safari 3.1.1
1 EDB exploit
4.3
CVSSv2
CVE-2009-1684
Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to inject arbitrary web script or HTML via an event handler that trig...
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.2
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.2.3
Apple Safari
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.0.3
Apple Safari 3.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-25525
CVE-2024-4652
CVE-2024-1438
CVE-2024-4671
CVE-2024-34351
arbitrary
CVE-2024-4650
SQL injection
overflow
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »