Vulnerabilities > Apple > Safari > 1.2
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2012-07-25 | CVE-2012-0680 | Permissions, Privileges, and Access Controls vulnerability in Apple Safari Apple Safari before 6.0 does not properly handle the autocomplete attribute of a password input element, which allows remote attackers to bypass authentication by leveraging an unattended workstation. | 5.0 |
2012-07-25 | CVE-2012-0679 | Permissions, Privileges, and Access Controls vulnerability in Apple Safari Apple Safari before 6.0 allows remote attackers to read arbitrary files via a feed:// URL. | 4.3 |
2012-07-25 | CVE-2012-0678 | Cross-Site Scripting vulnerability in Apple Safari Cross-site scripting (XSS) vulnerability in Apple Safari before 6.0 allows remote attackers to inject arbitrary web script or HTML via a feed:// URL. | 4.3 |
2012-05-11 | CVE-2012-0676 | Improper Input Validation vulnerability in Apple Safari WebKit in Apple Safari before 5.1.7 does not properly track state information during the processing of form input, which allows remote attackers to fill in form fields on the pages of arbitrary web sites via unspecified vectors. | 5.0 |
2012-05-01 | CVE-2012-1521 | USE After Free vulnerability in Google Chrome Use-after-free vulnerability in the XML parser in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | 6.8 |
2012-05-01 | CVE-2011-3081 | USE After Free vulnerability in Google Chrome Use-after-free vulnerability in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the floating of elements, a different vulnerability than CVE-2011-3078. | 9.3 |
2012-05-01 | CVE-2011-3078 | USE After Free vulnerability in Google Chrome Use-after-free vulnerability in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the floating of elements, a different vulnerability than CVE-2011-3081. | 6.8 |
2012-04-05 | CVE-2011-3076 | USE After Free vulnerability in Google Chrome Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to focus handling. | 6.8 |
2012-04-05 | CVE-2011-3075 | USE After Free vulnerability in Google Chrome Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to style-application commands. | 6.8 |
2012-04-05 | CVE-2011-3074 | USE After Free vulnerability in Google Chrome Use-after-free vulnerability in Google Chrome before 18.0.1025.151 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of media. | 6.8 |