Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 3.1 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2008-1004
Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary web script or HTML via unknown vectors related to the Web Inspector.
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.0.1
Apple Safari 3.0.2
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.3
Apple Safari 3.0.4
4.3
CVSSv2
CVE-2008-1006
Cross-site scripting (XSS) vulnerability in WebCore, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary web script or HTML by using the window.open function to change the security context of a web page.
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0
Apple Safari 3.0.1
Apple Safari 0.8
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 3.0.2
4.3
CVSSv2
CVE-2008-1007
WebCore, as used in Apple Safari prior to 3.1, does not enforce the frame navigation policy for Java applets, which allows remote malicious users to conduct cross-site scripting (XSS) attacks.
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.3
Apple Safari
Apple Safari 0.8
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0.1
Apple Safari 3.0.2
4.3
CVSSv2
CVE-2008-1011
Cross-site scripting (XSS) vulnerability in WebKit, as used in Apple Safari prior to 3.1, allows remote malicious users to inject arbitrary web script or HTML via a frame that calls a method instance in another frame.
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.0.1
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.4
2.6
CVSSv2
CVE-2009-1710
WebKit in Apple Safari prior to 4.0 allows remote malicious users to spoof the browser's display of (1) the host name, (2) security indicators, and unspecified other UI elements via a custom cursor in conjunction with a modified CSS3 hotspot property.
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.2.3
Apple Safari
Apple Safari 3.0
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.2
Apple Safari 0.9
2.1
CVSSv2
CVE-2009-1716
CFNetwork in Apple Safari prior to 4.0 on Windows does not properly protect the temporary files created for downloads, which allows local users to obtain sensitive information by reading these files.
Apple Safari 3.0.4
Apple Safari 3.1.1
Apple Safari 1.2
Apple Safari 1.3
Apple Safari
Apple Safari 3.0.2
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 0.9
Apple Safari 3.0
Apple Safari 3.0.3
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 3.2.3
2.1
CVSSv2
CVE-2008-1005
WebCore, as used in Apple Safari prior to 3.1, does not properly mask the password field when reverse conversion is used with the Kotoeri input method, which allows physically proximate malicious users to read the password.
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.0.1
Apple Safari 3.0.2
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.3
Apple Safari 3.0.4
1.9
CVSSv2
CVE-2013-5150
The history-clearing feature in Safari in Apple iOS prior to 7 does not clear the back/forward history of an open tab, which allows physically proximate malicious users to obtain sensitive information by leveraging an unattended workstation.
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.0.2
Apple Iphone Os 2.0
Apple Iphone Os 2.0.0
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 4.0.1
Apple Iphone Os 4.0.2
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.3
Apple Iphone Os 6.0.1
Apple Iphone Os 6.0.2
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 3.1.3
Apple Iphone Os 3.2
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 5.0.1
1.9
CVSSv2
CVE-2008-3644
Apple Safari prior to 3.2 does not properly prevent caching of form data for form fields that have autocomplete disabled, which allows local users to obtain sensitive information by reading the browser's page cache.
Apple Safari
Apple Safari 1.0
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 2.0.3 417.9.3
Apple Safari 2.0.4
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 3.1.1
Apple Safari 1.1
Apple Safari 0.8
Apple Safari 1.1.1
Apple Safari 1.2.1
Apple Safari 1.3.2
Apple Safari 2
Apple Safari 2.0.4 419.3
Apple Safari 2.0 Pre
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 1.2
Apple Safari 1.2.4
Apple Safari 1.2.5
1.2
CVSSv2
CVE-2009-1707
Race condition in the Reset Safari implementation in Apple Safari prior to 4.0 on Windows might allow local users to read stored web-site passwords via unspecified vectors.
Apple Safari 3.0.4
Apple Safari 3.1
Apple Safari 3.2
Apple Safari 3.1.1
Apple Safari 3.1.2
Apple Safari 3.0
Apple Safari 3.2.1
Apple Safari 3.2.2
Apple Safari 3.0.1
Apple Safari 3.0.3
Apple Safari
Apple Safari 3.0.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9