Vulnerabilities > Apple > Safari > 4.0.5
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2011-03-25 | CVE-2011-1296 | Improper Input Validation vulnerability in Google Chrome Google Chrome before 10.0.648.204 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer." | 7.5 |
2011-03-25 | CVE-2011-1295 | Improper Input Validation vulnerability in Google Chrome WebKit, as used in Google Chrome before 10.0.648.204 and Apple Safari before 5.0.6, does not properly handle node parentage, which allows remote attackers to cause a denial of service (DOM tree corruption), conduct cross-site scripting (XSS) attacks, or possibly have unspecified other impact via unknown vectors. | 7.5 |
2011-03-25 | CVE-2011-1293 | USE After Free vulnerability in Google Chrome Use-after-free vulnerability in the HTMLCollection implementation in Google Chrome before 10.0.648.204 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | 7.5 |
2011-03-11 | CVE-2011-0169 | Cross-Site Scripting vulnerability in Apple Safari and Webkit WebKit in Apple Safari before 5.0.4, when the Web Inspector is used, does not properly handle the window.console._inspectorCommandLineAPI property, which allows user-assisted remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted web site. | 2.6 |
2011-03-11 | CVE-2011-0167 | Permissions, Privileges, and Access Controls vulnerability in Apple Safari and Webkit The windows functionality in WebKit in Apple Safari before 5.0.4 allows remote attackers to bypass the Same Origin Policy, and force the upload of arbitrary local files from a client computer, via a crafted web site. | 4.3 |
2011-03-11 | CVE-2011-0166 | Permissions, Privileges, and Access Controls vulnerability in Apple Safari and Webkit The HTML5 drag and drop functionality in WebKit in Apple Safari before 5.0.4 allows user-assisted remote attackers to bypass the Same Origin Policy and obtain sensitive information via vectors related to the dragging of content. | 5.8 |
2011-03-11 | CVE-2011-0163 | Improper Input Validation vulnerability in Apple Iphone OS, Safari and Webkit WebKit, as used in Apple Safari before 5.0.4 and iOS before 4.3, does not properly handle unspecified "cached resources," which allows remote attackers to cause a denial of service (resource unavailability) via a crafted web site that conducts a cache-poisoning attack. | 4.3 |
2011-03-11 | CVE-2011-0161 | Improper Input Validation vulnerability in Apple Iphone OS, Safari and Webkit WebKit, as used in Apple Safari before 5.0.4 and iOS before 4.3, does not properly handle the Attr.style accessor, which allows remote attackers to bypass the Same Origin Policy and inject Cascading Style Sheets (CSS) token sequences via a crafted web site. | 4.3 |
2011-03-11 | CVE-2011-0160 | Improper Input Validation vulnerability in Apple Iphone OS, Safari and Webkit WebKit, as used in Apple Safari before 5.0.4 and iOS before 4.3, does not properly handle redirects in conjunction with HTTP Basic Authentication, which might allow remote web servers to capture credentials by logging the Authorization HTTP header. | 5.0 |
2011-03-11 | CVE-2011-1204 | Improper Input Validation vulnerability in Google Chrome Google Chrome before 10.0.648.127 does not properly handle attributes, which allows remote attackers to cause a denial of service (DOM tree corruption) or possibly have unspecified other impact via a crafted document. | 6.8 |