Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 1.3.1 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2008-1010
Buffer overflow in WebKit, as used in Apple Safari prior to 3.1, allows remote malicious users to execute arbitrary code via crafted regular expressions in JavaScript.
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 3.0
Apple Safari 3.0.1
Apple Safari 3.0.4
4.3
CVSSv2
CVE-2008-1025
Cross-site scripting (XSS) vulnerability in Apple WebKit, as used in Safari prior to 3.1.1, allows remote malicious users to inject arbitrary web script or HTML via a crafted URL with a colon in the hostname portion.
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.0
Apple Safari 3.0.2
Apple Safari 3.0.3
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 3.0.4
Apple Safari 3.1
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 1.3.2
Apple Safari 2.0
Apple Webkit
4.3
CVSSv2
CVE-2009-1682
Apple Safari prior to 4.0 does not properly check for revoked Extended Validation (EV) certificates, which makes it easier for remote malicious users to trick a user into accepting an invalid certificate.
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 3.0
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 0.9
9.3
CVSSv2
CVE-2009-1686
WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not properly handle constant (aka const) declarations in a type-conversion operation during JavaScript exception handling, which allows re...
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 0.9
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.0
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.2.3
Apple Safari 3.2
4.3
CVSSv2
CVE-2009-1685
Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to inject arbitrary web script or HTML by overwriting the document.im...
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.3
Apple Safari
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.0.3
Apple Safari 3.0
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.2
Apple Safari 0.9
4.3
CVSSv2
CVE-2009-1688
Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to inject arbitrary web script or HTML via vectors related to determi...
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 1.0.3
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.4
4.3
CVSSv2
CVE-2009-1689
Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to inject arbitrary web script or HTML via vectors involving submissi...
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.2
Apple Safari 0.9
Apple Safari 3.0
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.2.3
Apple Safari
4.3
CVSSv2
CVE-2009-1691
Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 allows remote malicious users to inject arbitrary web script or HTML via vectors related to insuffi...
Apple Safari 3.0
Apple Safari 3.0.3
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.0.4
Apple Safari 3.1.1
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.2.3
Apple Safari
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.2
Apple Safari 0.9
5
CVSSv2
CVE-2009-1696
WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 uses predictable random numbers in JavaScript applications, which makes it easier for remote web servers to track the behavior of a Safari user...
Apple Safari 1.0
Apple Safari 1.1
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 1.0.3
Apple Safari 1.2
Apple Safari 1.3
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.4
7.1
CVSSv2
CVE-2009-1703
WebKit in Apple Safari prior to 4.0 does not prevent references to file: URLs within (1) audio and (2) video elements, which allows remote malicious users to determine the existence of arbitrary files via a crafted HTML document.
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 3.0
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »