Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 6.0.5 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2014-1346
WebKit, as used in Apple Safari prior to 6.1.4 and 7.x prior to 7.0.4, does not properly interpret Unicode encoding, which allows remote malicious users to spoof a postMessage origin, and bypass intended restrictions on sending a message to a connected frame or window, via crafte...
Apple Safari 7.0.3
Apple Safari
Apple Safari 6.0.1
Apple Safari 6.0.2
Apple Safari 6.0.3
Apple Safari 6.0.4
Apple Safari 7.0.2
Apple Safari 7.0
Apple Safari 6.1
Apple Safari 6.1.2
Apple Safari 7.0.1
Apple Safari 6.0
Apple Safari 6.0.5
Apple Safari 6.1.1
2.1
CVSSv2
CVE-2013-7127
Apple Safari 6.0.5 on Mac OS X 10.7.5 and 10.8.5 stores cleartext credentials in LastSession.plist, which allows local users to obtain sensitive information by reading this file.
Apple Safari 6.0.5
Apple Mac Os X 10.8.5
Apple Mac Os X 10.7.5
6.8
CVSSv2
CVE-2014-1340
WebKit, as used in Apple Safari prior to 6.1.5 and 7.x prior to 7.0.5, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in...
Apple Safari 7.0.2
Apple Safari 7.0.3
Apple Safari 7.0.4
Apple Safari 7.0
Apple Safari 7.0.1
Apple Safari 6.0.3
Apple Safari 6.0.2
Apple Safari 6.1.2
Apple Safari 6.1.1
Apple Safari
Apple Safari 6.1
Apple Safari 6.0.5
Apple Safari 6.0.4
Apple Safari 6.1.3
Apple Safari 6.0.1
Apple Safari 6.0
4.3
CVSSv2
CVE-2014-1369
WebKit in Apple Safari prior to 6.1.5 and 7.x prior to 7.0.5 allows user-assisted remote malicious users to access file: URLs by leveraging a URL drag operation that originates at a crafted web site.
Apple Safari 6.1.2
Apple Safari 6.1
Apple Safari 6.0.1
Apple Safari
Apple Safari 6.0.5
Apple Safari 6.0.4
Apple Safari 6.0.3
Apple Safari 6.0.2
Apple Safari 6.1.3
Apple Safari 6.1.1
Apple Safari 6.0
Apple Safari 7.0.4
Apple Safari 7.0
Apple Safari 7.0.1
Apple Safari 7.0.2
Apple Safari 7.0.3
6.8
CVSSv2
CVE-2014-1384
WebKit, as used in Apple Safari prior to 6.1.6 and 7.x prior to 7.0.6, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in...
Apple Safari 6.1.3
Apple Safari 6.1.2
Apple Safari 6.0
Apple Safari 6.1.4
Apple Safari 6.0.5
Apple Safari 6.0.4
Apple Safari 6.1.1
Apple Safari 6.1
Apple Safari
Apple Safari 6.0.3
Apple Safari 6.0.2
Apple Safari 6.0.1
Apple Safari 7.0.3
Apple Safari 7.0.4
Apple Safari 7.0
Apple Safari 7.0.5
Apple Safari 7.0.1
Apple Safari 7.0.2
6.8
CVSSv2
CVE-2014-1385
WebKit, as used in Apple Safari prior to 6.1.6 and 7.x prior to 7.0.6, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in...
Apple Safari 6.0.4
Apple Safari 6.0.3
Apple Safari 6.1.2
Apple Safari 6.1.1
Apple Safari 6.0
Apple Safari 6.1.4
Apple Safari
Apple Safari 6.1.3
Apple Safari 6.0.2
Apple Safari 6.0.1
Apple Safari 6.1
Apple Safari 6.0.5
Apple Safari 7.0
Apple Safari 7.0.1
Apple Safari 7.0.2
Apple Safari 7.0.3
Apple Safari 7.0.5
Apple Safari 7.0.4
6.8
CVSSv2
CVE-2014-1386
WebKit, as used in Apple Safari prior to 6.1.6 and 7.x prior to 7.0.6, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in...
Apple Safari 7.0
Apple Safari 7.0.1
Apple Safari 7.0.2
Apple Safari 7.0.3
Apple Safari 7.0.5
Apple Safari 7.0.4
Apple Safari 6.1.1
Apple Safari 6.1
Apple Safari 6.0.5
Apple Safari 6.0.4
Apple Safari
Apple Safari 6.0.3
Apple Safari 6.0.2
Apple Safari 6.0.1
Apple Safari 6.1.3
Apple Safari 6.1.2
Apple Safari 6.0
Apple Safari 6.1.4
6.8
CVSSv2
CVE-2014-1387
WebKit, as used in Apple Safari prior to 6.1.6 and 7.x prior to 7.0.6, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in...
Apple Safari 6.1.1
Apple Safari 6.1
Apple Safari 6.1.4
Apple Safari
Apple Safari 6.0.3
Apple Safari 6.0.2
Apple Safari 6.0.5
Apple Safari 6.0.4
Apple Safari 6.1.3
Apple Safari 6.1.2
Apple Safari 6.0.1
Apple Safari 6.0
Apple Safari 7.0.1
Apple Safari 7.0.2
Apple Safari 7.0.5
Apple Safari 7.0.4
Apple Safari 7.0
Apple Safari 7.0.3
6.8
CVSSv2
CVE-2014-1388
WebKit, as used in Apple Safari prior to 6.1.6 and 7.x prior to 7.0.6, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in...
Apple Safari 7.0.5
Apple Safari 7.0.4
Apple Safari 7.0.2
Apple Safari 7.0.3
Apple Safari 7.0
Apple Safari 7.0.1
Apple Safari 6.1.3
Apple Safari 6.1.2
Apple Safari 6.0.1
Apple Safari 6.0
Apple Safari 6.0.5
Apple Safari 6.0.4
Apple Safari 6.1.1
Apple Safari 6.1
Apple Safari 6.1.4
Apple Safari
Apple Safari 6.0.3
Apple Safari 6.0.2
6.8
CVSSv2
CVE-2014-1389
WebKit, as used in Apple Safari prior to 6.1.6 and 7.x prior to 7.0.6, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in...
Apple Safari
Apple Safari 6.0.3
Apple Safari 6.0.2
Apple Safari 6.1.1
Apple Safari 6.1
Apple Safari 6.1.4
Apple Safari 6.1.3
Apple Safari 6.1.2
Apple Safari 6.0.1
Apple Safari 6.0
Apple Safari 6.0.5
Apple Safari 6.0.4
Apple Safari 7.0.1
Apple Safari 7.0.2
Apple Safari 7.0.5
Apple Safari 7.0.3
Apple Safari 7.0.4
Apple Safari 7.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-25525
CVE-2024-4652
CVE-2024-1438
CVE-2024-4671
CVE-2024-34351
arbitrary
CVE-2024-4650
SQL injection
overflow
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »