CVE-2015-1156
08.05.2015, 00:59
The page-loading implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, does not properly handle the rel attribute in an A element, which allows remote attackers to bypass the Same Origin Policy for a link's target, and spoof the user interface, via a crafted web site.Enginsight
Vendor | Product | Version |
---|---|---|
apple | iphone_os | 𝑥 ≤ 8.3 |
apple | safari | 𝑥 ≤ 6.2.5 |
apple | safari | 7.0 |
apple | safari | 7.0.1 |
apple | safari | 7.0.2 |
apple | safari | 7.0.3 |
apple | safari | 7.0.4 |
apple | safari | 7.0.5 |
apple | safari | 7.0.6 |
apple | safari | 7.1.0 |
apple | safari | 7.1.1 |
apple | safari | 7.1.2 |
apple | safari | 7.1.3 |
apple | safari | 7.1.4 |
apple | safari | 7.1.5 |
apple | safari | 8.0.0 |
apple | safari | 8.0.1 |
apple | safari | 8.0.2 |
apple | safari | 8.0.3 |
apple | safari | 8.0.4 |
apple | safari | 8.0.5 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
qtwebkit-opensource-src |
| ||||||||||||||
qtwebkit-source |
| ||||||||||||||
webkit |
| ||||||||||||||
webkitgtk |
|
Common Weakness Enumeration
References