← Volver a CVEs
CVE-2016-4651
N/ADescripcion
Cross-site scripting (XSS) vulnerability in the WebKit JavaScript bindings in Apple iOS before 9.3.3 and Safari before 9.1.2 allows remote attackers to inject arbitrary web script or HTML via a crafted HTTP/0.9 response, related to a "cross-protocol cross-site scripting (XPXSS)" vulnerability.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado7/22/2016
Ultima modificacion4/12/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
apple:iphone_osapple:safari
Debilidades (CWE)
CWE-79
Referencias
http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/Jul/msg00004.html(product-security@apple.com)
http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html(product-security@apple.com)
http://www.securityfocus.com/archive/1/539295/100/0/threaded(product-security@apple.com)
http://www.securityfocus.com/bid/91835(product-security@apple.com)
http://www.securitytracker.com/id/1036343(product-security@apple.com)
https://support.apple.com/HT206900(product-security@apple.com)
https://support.apple.com/HT206902(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/Jul/msg00004.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/539295/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/91835(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1036343(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206900(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206902(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.