← Retour aux CVEs
CVE-2016-1801
N/ADescription
The CFNetwork Proxies subsystem in Apple iOS before 9.3.2, OS X before 10.11.5, and tvOS before 9.2.1 mishandles URLs in http and https requests, which allows remote attackers to obtain sensitive information via unspecified vectors.
Details CVE
Score CVSS v3.1N/A
Publie5/20/2016
Derniere modification4/12/2025
Sourcenvd
Observations honeypot0
Produits affectes
apple:iphone_osapple:mac_os_xapple:tvos
Faiblesses (CWE)
CWE-200
References
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html(product-security@apple.com)
http://www.securityfocus.com/bid/90697(product-security@apple.com)
http://www.securitytracker.com/id/1035890(product-security@apple.com)
https://support.apple.com/HT206564(product-security@apple.com)
https://support.apple.com/HT206567(product-security@apple.com)
https://support.apple.com/HT206568(product-security@apple.com)
https://www.kb.cert.org/vuls/id/877625(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/90697(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1035890(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206564(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206567(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206568(af854a3a-2127-422b-91ae-364da2661108)
https://www.kb.cert.org/vuls/id/877625(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.