Page 278 of 1392 results (0.008 seconds)

CVSS: 5.0EPSS: 4%CPEs: 6EXPL: 2

Apple Safari 1.0 through 1.2.3 allows remote attackers to spoof the URL displayed in the status bar via TABLE tags. • https://www.exploit-db.com/exploits/24716 http://lists.apple.com/archives/security-announce/2004/Dec/msg00000.html http://secunia.com/advisories/13047 http://www.kb.cert.org/vuls/id/925430 http://www.securityfocus.com/bid/11573 https://exchange.xforce.ibmcloud.com/vulnerabilities/17909 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Safari 1.2.2 does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability. Safari 1.2.2 no previene adecuadamente que un marco de un dominio inyecte contenido en un marco que pertenece a otro dominio, lo que facilita la suplantación de sitios web y otros ataques. Vulnerabilidad también conocida como "de inyección de marco". • http://secunia.com/advisories/11978 http://secunia.com/multiple_browsers_frame_injection_vulnerability_test https://exchange.xforce.ibmcloud.com/vulnerabilities/1598 •

CVSS: 5.0EPSS: 3%CPEs: 3EXPL: 2

The Javascript engine in Safari 1.2 and earlier allows remote attackers to cause a denial of service (segmentation fault) by creating a new Array object with a large size value, then writing into that array. • https://www.exploit-db.com/exploits/23793 http://marc.info/?l=bugtraq&m=107861828510106&w=2 http://www.insecure.ws/article.php?story=2004021918172533 http://www.securityfocus.com/bid/9815 https://exchange.xforce.ibmcloud.com/vulnerabilities/15413 •

CVSS: 7.5EPSS: 5%CPEs: 2EXPL: 2

Apple Safari allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Safari to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application. Apple Safari permite a atacantes remotos saltarse las restriciones de cookies pretendidas en una aplicación web mediante secuencias de atravesamiento de directorios "%2e%2e" (punto punto codificado) en una URL, lo que hace que Safari envíe la cookie fuera de los subconjuntos de URL especificados, por ejemplo a una aplicación vulnerable que corre en el mismo servidor que la aplicación objetivo. • https://www.exploit-db.com/exploits/23800 http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0056.html http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018475.html •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

Apple Safari 1.0 through 1.1 on Mac OS X 10.3.1 and Mac OS X 10.2.8 allows remote attackers to steal user cookies from another domain via a link with a hex-encoded null character (%00) followed by the target domain. Apple Safari 1.0 a 1.1 en Mac OS X 10.3.1 y Mac OS X 10.2.8 permite a atacantes remotos robar 'cookies' de usuarios de otro dominio mediante un enlace con un carácter nulo codificado-hex (%00) seguido del dominio objetivo. • http://docs.info.apple.com/article.html?artnum=61798 http://lists.apple.com/mhonarc/security-announce/msg00042.html http://marc.info/?l=bugtraq&m=106917674428552&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/7973 •