Vulnerabilities > Apple > Safari > 1.2
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2012-07-25 | CVE-2012-0682 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple Safari WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-07-25-1. | 9.3 |
2012-07-25 | CVE-2012-3697 | Permissions, Privileges, and Access Controls vulnerability in Apple Safari WebKit in Apple Safari before 6.0 does not properly handle file: URLs, which allows remote attackers to bypass intended sandbox restrictions and read arbitrary files by leveraging a WebProcess compromise. | 7.1 |
2012-07-25 | CVE-2012-3696 | Improper Input Validation vulnerability in Apple Safari CRLF injection vulnerability in WebKit in Apple Safari before 6.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP request splitting attacks via a crafted web site that leverages improper WebSockets URI handling. | 4.3 |
2012-07-25 | CVE-2012-3695 | Cross-Site Scripting vulnerability in Apple Safari Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 6.0 allows remote attackers to inject arbitrary web script or HTML by leveraging improper URL canonicalization during the handling of the location.href property. | 4.3 |
2012-07-25 | CVE-2012-3694 | Information Exposure vulnerability in Apple Safari WebKit in Apple Safari before 6.0 does not properly handle drag-and-drop events, which allows user-assisted remote attackers to obtain sensitive information about full pathnames via a crafted web site. | 4.3 |
2012-07-25 | CVE-2012-3693 | Domain Name URI Spoofing vulnerability in WebKit International Incomplete blacklist vulnerability in WebKit in Apple Safari before 6.0 allows remote attackers to spoof domain names in URLs, and possibly conduct phishing attacks, by leveraging the availability of IDN support and Unicode fonts to construct unspecified homoglyphs. | 5.0 |
2012-07-25 | CVE-2012-3691 | Improper Input Validation vulnerability in Apple Safari WebKit in Apple Safari before 6.0 does not properly handle Cascading Style Sheets (CSS) property values, which allows remote attackers to bypass the Same Origin Policy via a crafted web site. | 5.8 |
2012-07-25 | CVE-2012-3690 | Permissions, Privileges, and Access Controls vulnerability in Apple Safari WebKit in Apple Safari before 6.0 does not properly handle drag-and-drop events, which allows user-assisted remote attackers to read arbitrary files via a crafted web site. | 4.3 |
2012-07-25 | CVE-2012-3689 | Improper Input Validation vulnerability in Apple Safari WebKit in Apple Safari before 6.0 does not properly handle drag-and-drop events, which allows user-assisted remote attackers to bypass the Same Origin Policy via a crafted web site. | 5.8 |
2012-07-25 | CVE-2012-3650 | Information Exposure vulnerability in Apple Safari WebKit in Apple Safari before 6.0 accesses uninitialized memory locations during the rendering of SVG images, which allows remote attackers to obtain sensitive information from process memory via a crafted web site. | 4.3 |