← Zuruck zu CVEs
CVE-2016-1801
N/ABeschreibung
The CFNetwork Proxies subsystem in Apple iOS before 9.3.2, OS X before 10.11.5, and tvOS before 9.2.1 mishandles URLs in http and https requests, which allows remote attackers to obtain sensitive information via unspecified vectors.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht5/20/2016
Zuletzt geandert4/12/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
apple:iphone_osapple:mac_os_xapple:tvos
Schwachen (CWE)
CWE-200
Referenzen
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html(product-security@apple.com)
http://www.securityfocus.com/bid/90697(product-security@apple.com)
http://www.securitytracker.com/id/1035890(product-security@apple.com)
https://support.apple.com/HT206564(product-security@apple.com)
https://support.apple.com/HT206567(product-security@apple.com)
https://support.apple.com/HT206568(product-security@apple.com)
https://www.kb.cert.org/vuls/id/877625(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/90697(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1035890(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206564(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206567(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206568(af854a3a-2127-422b-91ae-364da2661108)
https://www.kb.cert.org/vuls/id/877625(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.