The host is installed with Apple Safari before 11.1.2 and is prone to a multiple memory corruption vulnerabilities.The flaws are present in the application, which fails to properly handle a maliciously crafted web content. Successful exploitation allows attackers to cause an unexpected Safari crash.
The host is installed with Apple Safari before 11.1.2 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows attackers to spoof address bars.
The host is installed with Apple Safari before 11.1.2 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to properly handle a malicious website. Successful exploitation allows attackers to spoof address bars.
The host is installed with Apple Safari before 12.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a malicious website, when loaded by the target user. Successful exploitation allows attackers to obtain potentially sensitive auto-filled information from the target user's system.
The host is installed with Apple Safari before 12.0 and is prone to a user interface spoofing vulnerability. A flaw is present in the application, which fails to properly handle a data deletion issue in browsing history. Successful exploitation allows attackers to prevent users from deleting browsing history items.
The host is installed with Apple Safari before 12.0 and is prone to a user interface spoofing vulnerability. A flaw is present in the application, which fails to properly handle an inconsistent user interface issue. Successful exploitation allows attackers to spoof user interface content.
The host is installed with Apple Safari before 12.0 and is prone to a CORS vulnerability. A flaw is present in the application, which fails to properly handle an issue in iFrame elements. Successful exploitation allows attackers to cause unexpected cross-origin behavior through a malicious website.
The host is installed with Apple Safari before 12.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle validation issues. Successful exploitation allows attackers to cause an assert failure through unexpected interaction.
The host is installed with Apple Safari before 12.0 and is prone to a cross-site-scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in URL validation. Successful exploitation allows attackers to execute scripts in the context of another website.
The host is installed with Apple Safari before 12.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation allows attackers to execute arbitrary code.