Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 3.0 vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2008-1011
Cross-site scripting (XSS) vulnerability in WebKit, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary web script or HTML via a frame that calls a method instance in another frame.
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.0.1
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.4
383
VMScore
CVE-2008-1025
Cross-site scripting (XSS) vulnerability in Apple WebKit, as used in Safari prior to 3.1.1, allows remote malicious users to inject arbitrary web script or HTML via a crafted URL with a colon in the hostname portion.
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.4
Apple Safari 3.1
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 1.3.2
Apple Safari 2.0
Apple Webkit
668
VMScore
CVE-2007-3187
Multiple unspecified vulnerabilities in Apple Safari for Windows allow remote malicious users to cause a denial of service or execute arbitrary code, possibly involving memory corruption, and a different issue from CVE-2007-3185 and CVE-2007-3186. NOTE: as of 20070612, the origin...
Apple Safari 3.0
668
VMScore
CVE-2007-3718
Multiple unspecified vulnerabilities in the SVG parsing engine in Apple Safari 3 Beta for Windows have unspecified remote attack vectors and impact. NOTE: this issue contains no actionable information, but it was released by a reliable researcher.
Apple Safari 3.0
828
VMScore
CVE-2009-1704
CFNetwork in Apple Safari prior to 4.0 misinterprets downloaded image files as local HTML documents in unspecified circumstances, which allows remote malicious users to execute arbitrary JavaScript code by placing it in an image file.
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.2.3
Apple Safari
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 3.1.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.2
Apple Safari 0.9
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.0.3
Apple Safari 3.0
383
VMScore
CVE-2009-1682
Apple Safari prior to 4.0 does not properly check for revoked Extended Validation (EV) certificates, which makes it easier for remote malicious users to trick a user into accepting an invalid certificate.
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 3.0
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 0.9
828
VMScore
CVE-2009-1686
WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not properly handle constant (aka const) declarations in a type-conversion operation during JavaScript exception handling, which allows re...
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 0.9
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.0
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.2.3
Apple Safari 3.2
828
VMScore
CVE-2009-1687
The JavaScript garbage collector in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not properly handle allocation failures, which allows remote malicious users to execute arbitrary code...
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 3.0
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
445
VMScore
CVE-2009-1696
WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 uses predictable random numbers in JavaScript applications, which makes it easier for remote web servers to track the behavior of a Safari user...
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 1.0.3
Apple Safari 1.2
Apple Safari 1.3
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.4
632
VMScore
CVE-2009-1703
WebKit in Apple Safari prior to 4.0 does not prevent references to file: URLs within (1) audio and (2) video elements, which allows remote malicious users to determine the existence of arbitrary files via a crafted HTML document.
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 3.0
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »