WebKit, as used in Google Chrome before 15.0.874.102 and Android before 4.4, allows remote attackers to bypass the Same Origin Policy and conduct Universal XSS (UXSS) attacks via vectors related to (1) the DOMWindow::clear function and use of a selection object, (2) the Object::GetRealNamedPropertyInPrototypeChain function and use of an __proto__ property, (3) the HTMLPlugInImageElement::allowedToLoadFrameURL function and use of a javascript: URL, (4) incorrect origins for XSLT-generated documents in the XSLTProcessor::createDocumentFromSource function, and (5) improper handling of synchronous frame loads in the ScriptController::executeIfJavaScriptURL function.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12940
https://exchange.xforce.ibmcloud.com/vulnerabilities/70959
https://android.googlesource.com/platform/external/webkit/+/109d59bf6fe4abfd001fc60ddd403f1046b117ef
http://www.securitytracker.com/id?1026774
http://www.rafayhackingarticles.net/2014/10/a-tale-of-another-sop-bypass-in-android.html
http://secunia.com/advisories/48377
http://secunia.com/advisories/48288
http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html
http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://code.google.com/p/chromium/issues/detail?id=99750
http://code.google.com/p/chromium/issues/detail?id=99512
http://code.google.com/p/chromium/issues/detail?id=98053