Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apple safari 4.0.2 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2010-0045
Apple Safari prior to 4.0.5 on Windows does not properly validate external URL schemes, which allows remote malicious users to open local files and execute arbitrary code via a crafted HTML document.
Apple Safari 4.0
Apple Safari
Apple Safari 4.0.1
Apple Safari 4.0.2
Apple Safari 4.0.3
9.3
CVSSv2
CVE-2010-0048
Use-after-free vulnerability in WebKit in Apple Safari prior to 4.0.5 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted XML document.
Apple Safari 4.0.1
Apple Safari
Apple Safari 4.0
Apple Safari 4.0.3
Apple Safari 4.0.2
9.3
CVSSv2
CVE-2010-0040
Integer overflow in ColorSync in Apple Safari prior to 4.0.5 on Windows, and iTunes prior to 9.1, allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via an image with a crafted color profile that triggers a heap-based buffer o...
Apple Safari 4.0.0b
Apple Safari 4.0
Apple Safari
Apple Safari 4.0.3
Apple Safari 4.0.2
Apple Safari 4.0.1
4.3
CVSSv2
CVE-2010-0041
ImageIO in Apple Safari prior to 4.0.5 and iTunes prior to 9.1 on Windows does not ensure that memory access is associated with initialized memory, which allows remote malicious users to obtain potentially sensitive information from process memory via a crafted BMP image.
Apple Safari 4.0.0b
Apple Safari 4.0
Apple Safari 4.0.2
Apple Safari 4.0.1
Apple Safari
Apple Safari 4.0.3
9.3
CVSSv2
CVE-2010-0043
ImageIO in Apple Safari prior to 4.0.5 and iTunes prior to 9.1 on Windows allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted TIFF image.
Apple Safari 4.0.3
Apple Safari 4.0.2
Apple Safari 4.0
Apple Safari 4.0.1
Apple Safari 4.0.0b
Apple Safari
9.3
CVSSv2
CVE-2010-0046
The Cascading Style Sheets (CSS) implementation in WebKit in Apple Safari prior to 4.0.5 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted format arguments.
Apple Safari 4.0.0b
Apple Safari 4.0.1
Apple Safari 4.0.2
Apple Safari 4.0.3
Apple Safari
Apple Safari 4.0
9.3
CVSSv2
CVE-2010-0049
Use-after-free vulnerability in WebKit in Apple Safari prior to 4.0.5 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via HTML elements with right-to-left (RTL) text directionality.
Apple Safari 4.0.2
Apple Safari 4.0.3
Apple Safari 4.0.0b
Apple Safari 4.0
Apple Safari
Apple Safari 4.0.1
1 EDB exploit
4.3
CVSSv2
CVE-2010-0051
WebKit in Apple Safari prior to 4.0.5 does not properly validate the cross-origin loading of stylesheets, which allows remote malicious users to obtain sensitive information via a crafted HTML document. NOTE: this might overlap CVE-2010-0651.
Apple Safari 4.0.2
Apple Safari 4.0.1
Apple Safari
Apple Safari 4.0.3
Apple Safari 4.0.0b
Apple Safari 4.0
2 Github repositories
9.3
CVSSv2
CVE-2010-0052
Use-after-free vulnerability in WebKit in Apple Safari prior to 4.0.5 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via vectors related to "callbacks for HTML elements."
Apple Safari 4.0
Apple Safari 4.0.2
Apple Safari 4.0.1
Apple Safari 4.0.0b
Apple Safari 4.0.3
Apple Safari
9.3
CVSSv2
CVE-2010-0054
Use-after-free vulnerability in WebKit in Apple Safari prior to 4.0.5 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via vectors involving HTML IMG elements.
Apple Safari 4.0
Apple Safari
Apple Safari 4.0.1
Apple Safari 4.0.0b
Apple Safari 4.0.3
Apple Safari 4.0.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
spoof
CVE-2024-34928
CVE-2024-5291
deserialization
CVE-2024-4471
CVE-2024-4956
CVE-2024-32002
CVE-2024-5227
unspecified
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »