First published: Fri May 08 2015(Updated: )
The history implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to bypass the Same Origin Policy and read arbitrary files via a crafted web site.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone OS | <=8.3 | |
Apple Safari | <=6.2.5 | |
Apple Safari | =7.0 | |
Apple Safari | =7.0.1 | |
Apple Safari | =7.0.2 | |
Apple Safari | =7.0.3 | |
Apple Safari | =7.0.4 | |
Apple Safari | =7.0.5 | |
Apple Safari | =7.0.6 | |
Apple Safari | =7.1.0 | |
Apple Safari | =7.1.1 | |
Apple Safari | =7.1.2 | |
Apple Safari | =7.1.3 | |
Apple Safari | =7.1.4 | |
Apple Safari | =7.1.5 | |
Apple Safari | =8.0.0 | |
Apple Safari | =8.0.1 | |
Apple Safari | =8.0.2 | |
Apple Safari | =8.0.3 | |
Apple Safari | =8.0.4 | |
Apple Safari | =8.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.