First published: Wed Jun 10 2009(Updated: )
WebKit in Apple Safari before 4.0 allows remote attackers to spoof the browser's display of (1) the host name, (2) security indicators, and unspecified other UI elements via a custom cursor in conjunction with a modified CSS3 hotspot property.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | =3.1.2 | |
Apple Safari | =3.2.1 | |
Apple Safari | =0.9 | |
Apple Safari | =1.3.2 | |
Apple Safari | =1.2 | |
Apple Safari | =3.0.4 | |
Apple Safari | =3.0.3 | |
Apple Safari | =1.3.1 | |
Apple Safari | =2.0.4 | |
Apple Safari | =3.0 | |
Apple Safari | =3.2.3 | |
Apple Safari | =1.1 | |
Apple Safari | <=4.0_beta | |
Apple Safari | =3.1 | |
Apple Safari | =2.0 | |
Apple Safari | =3.0.2 | |
Apple Safari | =1.0.3 | |
Apple Safari | =1.0 | |
Apple Safari | =2.0.2 | |
Apple Safari | =3.1.1 | |
Apple Safari | =1.3 | |
Apple Safari | =0.8 | |
Apple Safari | =3.2 | |
Apple Safari | =3.0.3 | |
Apple Safari | =3.0.1 | |
Apple Safari | =3.1.2 | |
Apple Safari | <=3.2.3 | |
Apple Safari | =3.0.2 | |
Apple Safari | =3.1 | |
Apple Safari | =3.1.1 | |
Apple Safari | =3.0 | |
Apple Safari | =3.2.2 | |
Apple Safari | =3.2.1 | |
Apple Safari | =3.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.