Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 1.0 vulnerabilities and exploits
(subscribe to this query)
187
VMScore
CVE-2008-1005
WebCore, as used in Apple Safari prior to 3.1, does not properly mask the password field when reverse conversion is used with the Kotoeri input method, which allows physically proximate malicious users to read the password.
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.0.1
Apple Safari 3.0.2
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.3
Apple Safari 3.0.4
383
VMScore
CVE-2008-1006
Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary web script or HTML by using the window.open function to change the security context of a web page.
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0
Apple Safari 3.0.1
Apple Safari 0.8
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 3.0.2
383
VMScore
CVE-2008-1009
Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary JavaScript by modifying the history object.
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0
Apple Safari 3.0.1
605
VMScore
CVE-2008-1010
Buffer overflow in WebKit, as used in Apple Safari prior to 3.1, allows remote malicious users to execute arbitrary code via crafted regular expressions in JavaScript.
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 3.0
Apple Safari 3.0.1
Apple Safari 3.0.4
383
VMScore
CVE-2008-1011
Cross-site scripting (XSS) vulnerability in WebKit, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary web script or HTML via a frame that calls a method instance in another frame.
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.0.1
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.4
383
VMScore
CVE-2008-1025
Cross-site scripting (XSS) vulnerability in Apple WebKit, as used in Safari prior to 3.1.1, allows remote malicious users to inject arbitrary web script or HTML via a crafted URL with a colon in the hostname portion.
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.4
Apple Safari 3.1
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 1.3.2
Apple Safari 2.0
Apple Webkit
383
VMScore
CVE-2009-1682
Apple Safari prior to 4.0 does not properly check for revoked Extended Validation (EV) certificates, which makes it easier for remote malicious users to trick a user into accepting an invalid certificate.
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 3.0
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 0.9
435
VMScore
CVE-2009-1684
Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to inject arbitrary web script or HTML via an event handler that trig...
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.2
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.2.3
Apple Safari
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.0.3
Apple Safari 3.0
1 EDB exploit
828
VMScore
CVE-2009-1686
WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not properly handle constant (aka const) declarations in a type-conversion operation during JavaScript exception handling, which allows re...
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 0.9
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.0
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.2.3
Apple Safari 3.2
383
VMScore
CVE-2009-1681
WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not prevent web sites from loading third-party content into a subframe, which allows remote malicious users to bypass the Same Origin Poli...
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.4
Apple Safari 1.2
Apple Safari 1.3
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 1.0.3
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »