Vulnerabilities > Apple > Safari > High

DATE CVE VULNERABILITY TITLE RISK
2005-08-19 CVE-2005-2516 Unspecified vulnerability in Apple mac OS X and Safari
Safari in Mac OS X 10.3.9 and 10.4.2, when rendering Rich Text Format (RTF) files, can directly access URLs without performing the normal security checks, which allows remote attackers to execute arbitrary commands.
network
low complexity
apple
7.5
2005-01-10 CVE-2004-1314 Unspecified vulnerability in Apple Safari
Safari 1.x allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability, a different vulnerability than CVE-2004-1122.
network
low complexity
apple
7.5
2005-01-10 CVE-2004-1122 Unspecified vulnerability in Apple Safari 1.2.3
Safari 1.x to 1.2.4, and possibly other versions, allows inactive windows to launch dialog boxes, which can allow remote attackers to spoof the dialog boxes from web sites in other windows, aka the "Dialog Box Spoofing Vulnerability," a different vulnerability than CVE-2004-1314.
network
low complexity
apple
7.5
2004-07-27 CVE-2004-0720 Unspecified vulnerability in Apple Safari 1.2.2
Safari 1.2.2 does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.
network
low complexity
apple
7.5
2004-04-15 CVE-2003-0514 Unspecified vulnerability in Apple Safari 1.0/1.1
Apple Safari allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Safari to send the cookie outside the specified URL subsets, e.g.
network
low complexity
apple
7.5
2003-06-16 CVE-2003-0370 Konqueror Embedded and KDE 2.2.2 and earlier does not validate the Common Name (CN) field for X.509 Certificates, which could allow remote attackers to spoof certificates via a man-in-the-middle attack.
network
low complexity
apple kde redhat turbolinux
7.5