ID

VAR-201504-0145


CVE

CVE-2015-1127


TITLE

Apple Safari Used in etc. WebKit Vulnerability in obtaining important information in private browsing implementation

Trust: 0.8

sources: JVNDB: JVNDB-2015-002178

DESCRIPTION

The private-browsing implementation in WebKit in Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 places browsing history into an index, which might allow local users to obtain sensitive information by reading index entries. Apple Safari Used in etc. WebKit is prone to a security-bypass vulnerability. This issue occurs when private browsing mode is enabled. Attackers can exploit this issue to bypass security restrictions. Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. The following versions are affected: Apple Safari prior to 6.2.5, 7.x prior to 7.1.5, and 8.x prior to 8.0.5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2015-04-08-1 Safari 8.0.5, Safari 7.1.5, and Safari 6.2.5 Safari 8.0.5, Safari 7.1.5, and Safari 6.2.5 are now available and address the following: Safari Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.2 Impact: Users may be tracked by malicious websites using client certificates Description: An issue existed in Safari's client certificate matching for SSL authentication. This issue was addressed by improved matching of valid client certificates. CVE-ID CVE-2015-1129 : Stefan Kraus of fluid Operations AG, Sylvain Munaut of Whatever s.a. Safari Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.2 Impact: Notifications preferences may reveal users' browsing history in private browsing mode Description: Responding to push notification requests in private browsing mode revealed users' browsing history. CVE-ID CVE-2015-1128 : Joseph Winn of Credit Union Geek Safari Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.2 Impact: Users' browsing history may not be completely purged Description: A state management issue existed in Safari that resulted in users' browsing history not being purged from history.plist. This issue was addressed by improved state management. CVE-ID CVE-2015-1112 : William Breuer, The Netherlands WebKit Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.2 Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2015-1119 : Renata Hodovan of University of Szeged / Samsung Electronics CVE-2015-1120 : Apple CVE-2015-1121 : Apple CVE-2015-1122 : Apple CVE-2015-1124 : Apple WebKit Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.2 Impact: Users' browsing history in private mode may be indexed Description: A state management issue existed in Safari that inadvertently indexed users' browsing history when in private browsing mode. This issue was addressed by improved state management. CVE-ID CVE-2015-1127 : Tyler C WebKit Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.2 Impact: Visiting a maliciously crafted website may lead to resources of another origin being accessed Description: An issue existed in WebKit's credential handling for FTP URLs. This issue was addressed by improved URL decoding. Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJVJG6MAAoJEBcWfLTuOo7tL3cP/RVZlw3sp/ze1r1hSxcezN/Z w/uAPiqzud607Aqqwsg1YI4WzqCoIVLEb6N40eNGn7aTFkgOrBlYhsxTNHNnx2cM 3/HkDKMZo0bhO/fIqa9YfyG/KbgFKQMM0/eECNccEkQp6/DLHLJIwS0+QW0oBZ9q m9bBNTHFQxvJA9or3cn/eFV1zWVvr5RjpwR595tzWpYLIbIqTX901VAbBMOKvqtl 8b5NMmLNoEmfKGWWRqa5RmguFNnnANi3m+6PgU6fNU82dm8mif+ONDhDeyC43MH0 cxeeKZcWBGdYel9C/ctSF9SsnKhqAukIMoMppYLLL8AFHBPd504w1oXoS6UiE/go GrCXwzyxOklGQriyeMS/nsSn+AryJzQP3hXgWjAd8HuSIKCff9iaZBk5OxjK1Cwi k0zSx0qDJAHo1nlUhawYjQVhD7QEtkV7QO6hb4W22h5r/0MJGNuPsh9Mw2u6gIW6 l+p2x3D64xjfh+EclWerMhN+tqBR3RokkdkvNxhStdsz6dkA21ynaHMiaYN3lff7 DDINEP6dDiLi8AGP9P9pjYl3wMVgVTyFgMGL7cUMx8GIrm4pp8YAkhj2yWOM/ns0 Mycgrf+h0tFZYTvvojWlyo4rqx9J8te7dEiHjmg8l0OrOHXzmqQhDwOIWbH8fIGO CfE7FxlOHEHgzh+bzKvG =Df4l -----END PGP SIGNATURE----- . ============================================================================ Ubuntu Security Notice USN-2937-1 March 21, 2016 webkitgtk vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.10 - Ubuntu 14.04 LTS Summary: Several security issues were fixed in WebKitGTK+. Software Description: - webkitgtk: Web content engine library for GTK+ Details: A large number of security issues were discovered in the WebKitGTK+ Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.10: libjavascriptcoregtk-1.0-0 2.4.10-0ubuntu0.15.10.1 libjavascriptcoregtk-3.0-0 2.4.10-0ubuntu0.15.10.1 libwebkitgtk-1.0-0 2.4.10-0ubuntu0.15.10.1 libwebkitgtk-3.0-0 2.4.10-0ubuntu0.15.10.1 Ubuntu 14.04 LTS: libjavascriptcoregtk-1.0-0 2.4.10-0ubuntu0.14.04.1 libjavascriptcoregtk-3.0-0 2.4.10-0ubuntu0.14.04.1 libwebkitgtk-1.0-0 2.4.10-0ubuntu0.14.04.1 libwebkitgtk-3.0-0 2.4.10-0ubuntu0.14.04.1 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any applications that use WebKitGTK+, such as Epiphany and Evolution, to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2937-1 CVE-2014-1748, CVE-2015-1071, CVE-2015-1076, CVE-2015-1081, CVE-2015-1083, CVE-2015-1120, CVE-2015-1122, CVE-2015-1127, CVE-2015-1153, CVE-2015-1155, CVE-2015-3658, CVE-2015-3659, CVE-2015-3727, CVE-2015-3731, CVE-2015-3741, CVE-2015-3743, CVE-2015-3745, CVE-2015-3747, CVE-2015-3748, CVE-2015-3749, CVE-2015-3752, CVE-2015-5788, CVE-2015-5794, CVE-2015-5801, CVE-2015-5809, CVE-2015-5822, CVE-2015-5928 Package Information: https://launchpad.net/ubuntu/+source/webkitgtk/2.4.10-0ubuntu0.15.10.1 https://launchpad.net/ubuntu/+source/webkitgtk/2.4.10-0ubuntu0.14.04.1

Trust: 2.16

sources: NVD: CVE-2015-1127 // JVNDB: JVNDB-2015-002178 // BID: 73973 // VULHUB: VHN-79087 // PACKETSTORM: 131358 // PACKETSTORM: 136327

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:8.0.4

Trust: 1.9

vendor:applemodel:safariscope:eqversion:7.0.2

Trust: 1.9

vendor:applemodel:safariscope:eqversion:7.1.4

Trust: 1.9

vendor:applemodel:safariscope:eqversion:8.0.2

Trust: 1.9

vendor:applemodel:safariscope:eqversion:8.0.1

Trust: 1.9

vendor:applemodel:safariscope:eqversion:7.0.1

Trust: 1.9

vendor:applemodel:safariscope:eqversion:8.0.3

Trust: 1.9

vendor:applemodel:safariscope:eqversion:7.0

Trust: 1.6

vendor:applemodel:safariscope:eqversion:8.0.0

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.0.3

Trust: 1.3

vendor:applemodel:safariscope:eqversion:7.1.1

Trust: 1.3

vendor:applemodel:safariscope:eqversion:7.0.4

Trust: 1.3

vendor:applemodel:safariscope:eqversion:7.0.6

Trust: 1.3

vendor:applemodel:safariscope:eqversion:7.1.2

Trust: 1.3

vendor:applemodel:safariscope:eqversion:7.0.5

Trust: 1.3

vendor:applemodel:safariscope:eqversion:7.1.3

Trust: 1.3

vendor:applemodel:safariscope:lteversion:6.2.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.1.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.2.4

Trust: 0.9

vendor:applemodel:safariscope:ltversion:6.2.5 (os x mavericks v10.9.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:6.2.5 (os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:6.2.5 (os x yosemite v10.10.2)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.1.5 (os x mavericks v10.9.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.1.5 (os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.1.5 (os x yosemite v10.10.2)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:8.0.5 (os x mavericks v10.9.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:8.0.5 (os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:8.0.5 (os x yosemite v10.10.2)

Trust: 0.8

vendor:applemodel:safariscope:eqversion:5.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.0

Trust: 0.3

vendor:applemodel:safariscope:neversion:8.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.31

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.3

Trust: 0.3

vendor:applemodel:safariscope:neversion:6.2.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.9.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.7

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:safariscope:neversion:7.1.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.34

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.52

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.31

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.28

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.33

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.30

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.10

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 0.3

sources: BID: 73973 // JVNDB: JVNDB-2015-002178 // CNNVD: CNNVD-201504-152 // NVD: CVE-2015-1127

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-1127
value: LOW

Trust: 1.0

NVD: CVE-2015-1127
value: LOW

Trust: 0.8

CNNVD: CNNVD-201504-152
value: LOW

Trust: 0.6

VULHUB: VHN-79087
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2015-1127
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-79087
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-79087 // JVNDB: JVNDB-2015-002178 // CNNVD: CNNVD-201504-152 // NVD: CVE-2015-1127

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-79087 // JVNDB: JVNDB-2015-002178 // NVD: CVE-2015-1127

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201504-152

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201504-152

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002178

PATCH

title:APPLE-SA-2015-04-08-1 Safari 8.0.5, Safari 7.1.5, and Safari 6.2.5url:http://lists.apple.com/archives/security-announce/2015/Apr/msg00000.html

Trust: 0.8

title:HT204658url:http://support.apple.com/en-us/HT204658

Trust: 0.8

title:HT204658url:http://support.apple.com/ja-jp/HT204658

Trust: 0.8

sources: JVNDB: JVNDB-2015-002178

EXTERNAL IDS

db:NVDid:CVE-2015-1127

Trust: 3.0

db:SECTRACKid:1032047

Trust: 1.1

db:JVNid:JVNVU91828320

Trust: 0.8

db:JVNDBid:JVNDB-2015-002178

Trust: 0.8

db:CNNVDid:CNNVD-201504-152

Trust: 0.7

db:BIDid:73973

Trust: 0.4

db:VULHUBid:VHN-79087

Trust: 0.1

db:PACKETSTORMid:131358

Trust: 0.1

db:PACKETSTORMid:136327

Trust: 0.1

sources: VULHUB: VHN-79087 // BID: 73973 // JVNDB: JVNDB-2015-002178 // PACKETSTORM: 131358 // PACKETSTORM: 136327 // CNNVD: CNNVD-201504-152 // NVD: CVE-2015-1127

REFERENCES

url:http://lists.apple.com/archives/security-announce/2015/apr/msg00000.html

Trust: 1.7

url:https://support.apple.com/ht204658

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2937-1

Trust: 1.2

url:http://www.securitytracker.com/id/1032047

Trust: 1.1

url:http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1127

Trust: 0.8

url:http://jvn.jp/vu/jvnvu91828320/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1127

Trust: 0.8

url:https://www.apple.com/osx/

Trust: 0.3

url:http://www.apple.com/safari/

Trust: 0.3

url:http://www.webkit.org/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-1127

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1122

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1120

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1121

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1112

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1119

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1124

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1128

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1126

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1129

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5809

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3741

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1083

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5788

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3727

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3658

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5822

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3752

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1076

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/webkitgtk/2.4.10-0ubuntu0.15.10.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1155

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1153

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5794

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3748

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3659

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1071

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3749

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1748

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5928

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1081

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3731

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5801

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3743

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3747

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3745

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/webkitgtk/2.4.10-0ubuntu0.14.04.1

Trust: 0.1

sources: VULHUB: VHN-79087 // BID: 73973 // JVNDB: JVNDB-2015-002178 // PACKETSTORM: 131358 // PACKETSTORM: 136327 // CNNVD: CNNVD-201504-152 // NVD: CVE-2015-1127

CREDITS

Tyler C

Trust: 0.3

sources: BID: 73973

SOURCES

db:VULHUBid:VHN-79087
db:BIDid:73973
db:JVNDBid:JVNDB-2015-002178
db:PACKETSTORMid:131358
db:PACKETSTORMid:136327
db:CNNVDid:CNNVD-201504-152
db:NVDid:CVE-2015-1127

LAST UPDATE DATE

2025-04-13T22:39:51.934000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-79087date:2016-12-03T00:00:00
db:BIDid:73973date:2015-04-08T00:00:00
db:JVNDBid:JVNDB-2015-002178date:2015-04-14T00:00:00
db:CNNVDid:CNNVD-201504-152date:2015-04-16T00:00:00
db:NVDid:CVE-2015-1127date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-79087date:2015-04-10T00:00:00
db:BIDid:73973date:2015-04-08T00:00:00
db:JVNDBid:JVNDB-2015-002178date:2015-04-14T00:00:00
db:PACKETSTORMid:131358date:2015-04-09T16:23:44
db:PACKETSTORMid:136327date:2016-03-22T00:03:33
db:CNNVDid:CNNVD-201504-152date:2015-04-13T00:00:00
db:NVDid:CVE-2015-1127date:2015-04-10T14:59:40.497