{"id":"UBUNTU-CVE-2016-4737","details":"WebKit in Apple iOS before 10, Safari before 10, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.","modified":"2026-04-22T10:45:36.829075Z","published":"2016-09-25T10:59:00Z","upstream":["CVE-2016-4737"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4737"},{"type":"REPORT","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00007.html"},{"type":"REPORT","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html"},{"type":"REPORT","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html"},{"type":"REPORT","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html"},{"type":"REPORT","url":"https://support.apple.com/HT207141"},{"type":"REPORT","url":"https://support.apple.com/HT207142"},{"type":"REPORT","url":"https://support.apple.com/HT207143"},{"type":"REPORT","url":"https://support.apple.com/HT207157"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-4737"}],"affected":[{"package":{"name":"qtwebkit-opensource-src","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/qtwebkit-opensource-src@5.5.1+dfsg-2ubuntu1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["5.4.2+dfsg-1ubuntu2.1","5.5.1+dfsg-2ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"libqt5webkit5","binary_version":"5.5.1+dfsg-2ubuntu1"},{"binary_name":"libqt5webkit5-qmlwebkitplugin","binary_version":"5.5.1+dfsg-2ubuntu1"},{"binary_name":"qml-module-qtwebkit","binary_version":"5.5.1+dfsg-2ubuntu1"},{"binary_name":"qtwebkit5-doc-html","binary_version":"5.5.1+dfsg-2ubuntu1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4737.json"}},{"package":{"name":"qtwebkit-source","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/qtwebkit-source@2.3.2-0ubuntu11?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.3.2-0ubuntu10","2.3.2-0ubuntu11"],"ecosystem_specific":{"binaries":[{"binary_name":"libqtwebkit-qmlwebkitplugin","binary_version":"2.3.2-0ubuntu11"},{"binary_name":"libqtwebkit4","binary_version":"2.3.2-0ubuntu11"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4737.json"}},{"package":{"name":"webkitgtk","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/webkitgtk@2.4.11-0ubuntu0.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.4.9-2ubuntu2","2.4.10-0ubuntu1","2.4.11-0ubuntu0.1"],"ecosystem_specific":{"binaries":[{"binary_name":"gir1.2-javascriptcoregtk-3.0","binary_version":"2.4.11-0ubuntu0.1"},{"binary_name":"gir1.2-webkit-3.0","binary_version":"2.4.11-0ubuntu0.1"},{"binary_name":"gir1.2-webkit2-3.0","binary_version":"2.4.11-0ubuntu0.1"},{"binary_name":"libjavascriptcoregtk-1.0-0","binary_version":"2.4.11-0ubuntu0.1"},{"binary_name":"libjavascriptcoregtk-3.0-0","binary_version":"2.4.11-0ubuntu0.1"},{"binary_name":"libjavascriptcoregtk-3.0-bin","binary_version":"2.4.11-0ubuntu0.1"},{"binary_name":"libwebkit2gtk-3.0-25","binary_version":"2.4.11-0ubuntu0.1"},{"binary_name":"libwebkitgtk-1.0-0","binary_version":"2.4.11-0ubuntu0.1"},{"binary_name":"libwebkitgtk-1.0-common","binary_version":"2.4.11-0ubuntu0.1"},{"binary_name":"libwebkitgtk-3.0-0","binary_version":"2.4.11-0ubuntu0.1"},{"binary_name":"libwebkitgtk-3.0-common","binary_version":"2.4.11-0ubuntu0.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4737.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}