Page 268 of 1353 results (0.007 seconds)

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Safari after 2.0 in Apple Mac OS X 10.3.9 allows remote attackers to bypass domain restrictions via crafted web archives that cause Safari to render them as if they came from a different site. • http://lists.apple.com/archives/security-announce/2005/Sep/msg00002.html http://secunia.com/advisories/16920 http://www.auscert.org.au/5509 http://www.ciac.org/ciac/bulletins/p-312.shtml •

CVSS: 5.0EPSS: 3%CPEs: 9EXPL: 4

Apple Safari allows remote attackers to cause a denial of service (application crash) via a crafted data:// URL. • https://www.exploit-db.com/exploits/26271 http://marc.info/?l=bugtraq&m=112715234411672&w=2 http://secunia.com/advisories/16875 http://www.osvdb.org/19569 http://www.securityfocus.com/bid/14868 https://exchange.xforce.ibmcloud.com/vulnerabilities/22331 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 3

Apple Safari 1.3 (132) on Mac OS X 1.3.9 allows remote attackers to cause a denial of service (crash) via certain Javascript, possibly involving a function that defines a handler for itself within the function body. • https://www.exploit-db.com/exploits/26128 http://www.securityfocus.com/archive/1/407702 http://www.securityfocus.com/bid/14528 •

CVSS: 2.6EPSS: 1%CPEs: 1EXPL: 2

Safari version 2.0 (412) does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability." • http://docs.info.apple.com/article.html?artnum=302847 http://secunia.com/advisories/15474 http://secunia.com/advisories/17813 http://secunia.com/multiple_browsers_dialog_origin_vulnerability_test http://secunia.com/secunia_research/2005-12/advisory http://securitytracker.com/id?1015294 http://www.osvdb.org/17397 http://www.securityfocus.com/bid/14011 http://www.vupen.com/english/advisories/2005/2659 https://exchange.xforce.ibmcloud.com/vulnerabilities/21070 •

CVSS: 2.6EPSS: 1%CPEs: 1EXPL: 1

Safari 1.3 allows remote attackers to cause a denial of service (application crash) via a long https URL that triggers a NULL pointer dereference. • http://marc.info/?l=bugtraq&m=111473570624498&w=2 http://marc.info/?l=bugtraq&m=111479299730011&w=2 http://marc.info/?l=bugtraq&m=111479346119272&w=2 http://securitytracker.com/id?1013835 http://www.osvdb.org/16006 •