Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 3.0.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-1005
WebCore, as used in Apple Safari prior to 3.1, does not properly mask the password field when reverse conversion is used with the Kotoeri input method, which allows physically proximate malicious users to read the password.
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.0.1
Apple Safari 3.0.2
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.3
Apple Safari 3.0.4
NA
CVE-2008-1011
Cross-site scripting (XSS) vulnerability in WebKit, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary web script or HTML via a frame that calls a method instance in another frame.
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.0.1
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.4
NA
CVE-2008-1006
Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary web script or HTML by using the window.open function to change the security context of a web page.
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0
Apple Safari 3.0.1
Apple Safari 0.8
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 3.0.2
NA
CVE-2008-1008
Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary web script or HTML via the document.domain property.
Apple Safari 0.8
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0
Apple Safari 3.0.1
NA
CVE-2008-1009
Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary JavaScript by modifying the history object.
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0
Apple Safari 3.0.1
NA
CVE-2008-1010
Buffer overflow in WebKit, as used in Apple Safari prior to 3.1, allows remote malicious users to execute arbitrary code via crafted regular expressions in JavaScript.
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 3.0
Apple Safari 3.0.1
Apple Safari 3.0.4
NA
CVE-2009-1684
Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to inject arbitrary web script or HTML via an event handler that trig...
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.2
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.2.3
Apple Safari
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.0.3
Apple Safari 3.0
1 EDB exploit
NA
CVE-2009-1687
The JavaScript garbage collector in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not properly handle allocation failures, which allows remote malicious users to execute arbitrary code...
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 3.0
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
NA
CVE-2009-1693
WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to read images from arbitrary web sites via a CANVAS element with an SVG image, related to a "cross-site ima...
Apple Safari 3.0.4
Apple Safari 3.1.1
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.0
Apple Safari 3.0.3
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
NA
CVE-2009-1694
WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not properly handle redirects, which allows remote malicious users to read images from arbitrary web sites via vectors involving a CANVAS ...
Apple Safari 3.1.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.2
Apple Safari 0.9
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.0.3
Apple Safari 3.0
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.2.3
Apple Safari
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
brute force
CVE-2024-24908
open redirect
CVE-2024-31497
CVE-2023-45866
CVE-2024-4135
CVE-2024-25523
cache poisoning
CVE-2024-4649
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »