Page 135 of 1352 results (0.013 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

10 Feb 2005 — Apple Safari 1.2.4 does not obey the Content-type field in the HTTP header and renders text as HTML, which allows remote attackers to inject arbitrary web script or HTML and perform cross-site scripting (XSS) attacks. • http://marc.info/?l=bugtraq&m=110756965213819&w=2 •

CVSS: 7.5EPSS: 4%CPEs: 1EXPL: 2

07 Feb 2005 — The International Domain Name (IDN) support in Safari 1.2.5 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks. • http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html •

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 0

22 Dec 2004 — Safari 1.x allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability, a different vulnerability than CVE-2004-1122. • http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html •

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 1

15 Dec 2004 — Safari 1.2.4 on Mac OS X 10.3.6 allows remote attackers to cause a denial of service (application crash from memory exhaustion), as demonstrated using Javascript code that continuously creates nested arrays and then sorts the newly created arrays. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029458.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

10 Dec 2004 — Safari 1.x to 1.2.4, and possibly other versions, allows inactive windows to launch dialog boxes, which can allow remote attackers to spoof the dialog boxes from web sites in other windows, aka the "Dialog Box Spoofing Vulnerability," a different vulnerability than CVE-2004-1314. • http://lists.apple.com/archives/security-announce/2004/Dec/msg00000.html •

CVSS: 7.5EPSS: 19%CPEs: 6EXPL: 2

01 Nov 2004 — Apple Safari 1.0 through 1.2.3 allows remote attackers to spoof the URL displayed in the status bar via TABLE tags. • https://www.exploit-db.com/exploits/24716 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

23 Jul 2004 — Safari 1.2.2 does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability. Safari 1.2.2 no previene adecuadamente que un marco de un dominio inyecte contenido en un marco que pertenece a otro dominio, lo que facilita la suplantación de sitios web y otros ataques. Vulnerabilidad también conocida como "de inyección de marco". • http://secunia.com/advisories/11978 •

CVSS: 7.5EPSS: 4%CPEs: 3EXPL: 2

18 Mar 2004 — The Javascript engine in Safari 1.2 and earlier allows remote attackers to cause a denial of service (segmentation fault) by creating a new Array object with a large size value, then writing into that array. • https://www.exploit-db.com/exploits/23793 •

CVSS: 7.5EPSS: 4%CPEs: 2EXPL: 2

16 Mar 2004 — Apple Safari allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Safari to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application. Apple Safari permite a atacantes remotos saltarse las restriciones de cookies pretendidas en una aplicación web mediante secuencias de atravesamiento de directorios "%2e%2e" ... • https://www.exploit-db.com/exploits/23800 •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

10 Dec 2003 — Apple Safari 1.0 through 1.1 on Mac OS X 10.3.1 and Mac OS X 10.2.8 allows remote attackers to steal user cookies from another domain via a link with a hex-encoded null character (%00) followed by the target domain. Apple Safari 1.0 a 1.1 en Mac OS X 10.3.1 y Mac OS X 10.2.8 permite a atacantes remotos robar 'cookies' de usuarios de otro dominio mediante un enlace con un carácter nulo codificado-hex (%00) seguido del dominio objetivo. • http://docs.info.apple.com/article.html?artnum=61798 •