ID

VAR-201410-1217


CVE

CVE-2014-3192


TITLE

Google Chrome Blink Reuse vulnerability after release

Trust: 0.6

sources: CNNVD: CNNVD-201410-154

DESCRIPTION

Use-after-free vulnerability in the ProcessingInstruction::setXSLStyleSheet function in core/dom/ProcessingInstruction.cpp in the DOM implementation in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. Google Chrome is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the browser, bypass security restrictions, obtain potentially sensitive information, or cause denial-of-service conditions; other attacks may also be possible. Versions prior to Chrome 38.0.2125.101 are vulnerable. ------------------------------------------------------------------------ WebKitGTK+ Security Advisory WSA-2015-0002 ------------------------------------------------------------------------ Date reported : December 28, 2015 Advisory ID : WSA-2015-0002 Advisory URL : http://webkitgtk.org/security/WSA-2015-0002.html CVE identifiers : CVE-2013-6663, CVE-2014-1748, CVE-2014-3192, CVE-2014-4409, CVE-2014-4410, CVE-2014-4411, CVE-2014-4412, CVE-2014-4413, CVE-2014-4414, CVE-2014-4452, CVE-2014-4459, CVE-2014-4465, CVE-2014-4466, CVE-2014-4468, CVE-2014-4469, CVE-2014-4470, CVE-2014-4471, CVE-2014-4472, CVE-2014-4473, CVE-2014-4474, CVE-2014-4475, CVE-2014-4476, CVE-2014-4477, CVE-2014-4479, CVE-2015-1068, CVE-2015-1069, CVE-2015-1070, CVE-2015-1071, CVE-2015-1072, CVE-2015-1073, CVE-2015-1074, CVE-2015-1075, CVE-2015-1076, CVE-2015-1077, CVE-2015-1080, CVE-2015-1081, CVE-2015-1082, CVE-2015-1083, CVE-2015-1084, CVE-2015-1119, CVE-2015-1120, CVE-2015-1121, CVE-2015-1122, CVE-2015-1124, CVE-2015-1126, CVE-2015-1127, CVE-2015-1152, CVE-2015-1153, CVE-2015-1154, CVE-2015-1155, CVE-2015-1156, CVE-2015-2330, CVE-2015-3658, CVE-2015-3659, CVE-2015-3660, CVE-2015-3727, CVE-2015-3730, CVE-2015-3731, CVE-2015-3732, CVE-2015-3733, CVE-2015-3734, CVE-2015-3735, CVE-2015-3736, CVE-2015-3737, CVE-2015-3738, CVE-2015-3739, CVE-2015-3740, CVE-2015-3741, CVE-2015-3742, CVE-2015-3743, CVE-2015-3744, CVE-2015-3745, CVE-2015-3746, CVE-2015-3747, CVE-2015-3748, CVE-2015-3749, CVE-2015-3750, CVE-2015-3751, CVE-2015-3752, CVE-2015-3753, CVE-2015-3754, CVE-2015-3755, CVE-2015-5788, CVE-2015-5789, CVE-2015-5790, CVE-2015-5791, CVE-2015-5792, CVE-2015-5793, CVE-2015-5794, CVE-2015-5795, CVE-2015-5797, CVE-2015-5798, CVE-2015-5799, CVE-2015-5800, CVE-2015-5801, CVE-2015-5802, CVE-2015-5803, CVE-2015-5804, CVE-2015-5805, CVE-2015-5806, CVE-2015-5807, CVE-2015-5809, CVE-2015-5810, CVE-2015-5811, CVE-2015-5812, CVE-2015-5813, CVE-2015-5814, CVE-2015-5815, CVE-2015-5816, CVE-2015-5817, CVE-2015-5818, CVE-2015-5819, CVE-2015-5822, CVE-2015-5823, CVE-2015-5825, CVE-2015-5826, CVE-2015-5827, CVE-2015-5828, CVE-2015-5928, CVE-2015-5929, CVE-2015-5930, CVE-2015-5931, CVE-2015-7002, CVE-2015-7012, CVE-2015-7013, CVE-2015-7014, CVE-2015-7048, CVE-2015-7095, CVE-2015-7097, CVE-2015-7099, CVE-2015-7100, CVE-2015-7102, CVE-2015-7103, CVE-2015-7104. Several vulnerabilities were discovered on WebKitGTK+. CVE-2013-6663 Versions affected: WebKitGTK+ before 2.4.0. Credit to Atte Kettunen of OUSPG. CVE-2014-1748 Versions affected: WebKitGTK+ before 2.6.0. Credit to Jordan Milne. CVE-2014-3192 Versions affected: WebKitGTK+ before 2.6.3. Credit to cloudfuzzer. CVE-2014-4409 Versions affected: WebKitGTK+ before 2.6.0. Credit to Yosuke Hasegawa (NetAgent Co., Led.). WebKit in Apple iOS before 8 makes it easier for remote attackers to track users during private browsing via a crafted web site that reads HTML5 application-cache data that had been stored during normal browsing. CVE-2014-4410 Versions affected: WebKitGTK+ before 2.6.0. Credit to Eric Seidel of Google. CVE-2014-4411 Versions affected: WebKitGTK+ before 2.6.0. CVE-2014-4412 Versions affected: WebKitGTK+ before 2.4.0. Credit to Apple. CVE-2014-4413 Versions affected: WebKitGTK+ before 2.4.0. Credit to Apple. CVE-2014-4414 Versions affected: WebKitGTK+ before 2.4.0. Credit to Apple. CVE-2014-4452 Versions affected: WebKitGTK+ before 2.6.0. Credit to unknown. CVE-2014-4459 Versions affected: WebKitGTK+ before 2.6.2. Credit to unknown. Use-after-free vulnerability in WebKit, as used in Apple OS X before 10.10.1, allows remote attackers to execute arbitrary code via crafted page objects in an HTML document. CVE-2014-4465 Versions affected: WebKitGTK+ before 2.6.2. Credit to Rennie deGraaf of iSEC Partners. WebKit in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1 allows remote attackers to bypass the Same Origin Policy via crafted Cascading Style Sheets (CSS) token sequences within an SVG file in the SRC attribute of an IMG element. CVE-2014-4466 Versions affected: WebKitGTK+ before 2.6.2. Credit to Apple. WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1. CVE-2014-4468 Versions affected: WebKitGTK+ before 2.6.0. Credit to Apple. WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1. CVE-2014-4469 Versions affected: WebKitGTK+ before 2.6.4. Credit to Apple. WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1. CVE-2014-4470 Versions affected: WebKitGTK+ before 2.6.0. Credit to Apple. WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1. CVE-2014-4471 Versions affected: WebKitGTK+ before 2.6.0. Credit to Apple. WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1. CVE-2014-4472 Versions affected: WebKitGTK+ before 2.6.0. Credit to Apple. WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1. CVE-2014-4473 Versions affected: WebKitGTK+ before 2.6.0. Credit to Apple. WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1. CVE-2014-4474 Versions affected: WebKitGTK+ before 2.6.2. Credit to Apple. WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1. CVE-2014-4475 Versions affected: WebKitGTK+ before 2.6.0. Credit to Apple. WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1. CVE-2014-4476 Versions affected: WebKitGTK+ before 2.6.2. Credit to Apple. WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4477 and CVE-2014-4479. CVE-2014-4477 Versions affected: WebKitGTK+ before 2.6.4. Credit to lokihardt@ASRT working with HP’s Zero Day Initiative. WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4476 and CVE-2014-4479. CVE-2014-4479 Versions affected: WebKitGTK+ before 2.6.4. Credit to Apple. WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-4476 and CVE-2014-4477. CVE-2015-1068 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1. CVE-2015-1069 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1. CVE-2015-1070 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1. CVE-2015-1071 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1. CVE-2015-1072 Versions affected: WebKitGTK+ before 2.8.0. Credit to unknown. WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1. CVE-2015-1073 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1. CVE-2015-1074 Versions affected: WebKitGTK+ before 2.6.4. Credit to Apple. WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1. CVE-2015-1075 Versions affected: WebKitGTK+ before 2.8.0. WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1. CVE-2015-1076 Versions affected: WebKitGTK+ before 2.8.0. Credit to unknown. WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1. CVE-2015-1077 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1. CVE-2015-1080 Versions affected: WebKitGTK+ before 2.6.0. Credit to Apple. WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1. CVE-2015-1081 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1. CVE-2015-1082 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1. CVE-2015-1083 Versions affected: WebKitGTK+ before 2.6.4. Credit to Apple. WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1. CVE-2015-1084 Versions affected: WebKitGTK+ before 2.6.1. Credit to Apple. The user interface in WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, does not display URLs consistently, which makes it easier for remote attackers to conduct phishing attacks via a crafted URL. CVE-2015-1119 Versions affected: WebKitGTK+ before 2.8.0. Credit to Renata Hodovan of University of Szeged / Samsung Electronics. WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE- SA-2015-04-08-4. CVE-2015-1120 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE- SA-2015-04-08-4. CVE-2015-1121 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE- SA-2015-04-08-4. CVE-2015-1122 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE- SA-2015-04-08-4. CVE-2015-1124 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE- SA-2015-04-08-4. CVE-2015-1126 Versions affected: WebKitGTK+ before 2.8.0. Credit to Jouko Pynnonen of Klikki Oy. WebKit, as used in Apple iOS before 8.3 and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, does not properly handle the userinfo field in FTP URLs, which allows remote attackers to trigger incorrect resource access via unspecified vectors. CVE-2015-1127 Versions affected: WebKitGTK+ before 2.8.0. Credit to Tyler C (2.6.5). The private-browsing implementation in WebKit in Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 places browsing history into an index, which might allow local users to obtain sensitive information by reading index entries. CVE-2015-1152 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-1153 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple (2.6.5). CVE-2015-1154 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple (2.6.5). CVE-2015-1155 Versions affected: WebKitGTK+ before 2.10.0. Credit to Joe Vennix of Rapid7 Inc. working with HP's Zero Day Initiative. The history implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to bypass the Same Origin Policy and read arbitrary files via a crafted web site. CVE-2015-1156 Versions affected: WebKitGTK+ before 2.8.0. Credit to Zachary Durber of Moodle. The page-loading implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, does not properly handle the rel attribute in an A element, which allows remote attackers to bypass the Same Origin Policy for a link's target, and spoof the user interface, via a crafted web site. CVE-2015-2330 Versions affected: WebKitGTK+ before 2.6.6. Credit to Ross Lagerwall. Late TLS certificate verification in WebKitGTK+ prior to 2.6.6 allows remote attackers to view a secure HTTP request, including, for example, secure cookies. CVE-2015-3658 Versions affected: WebKitGTK+ before 2.8.1. Credit to Brad Hill of Facebook. The Page Loading functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly consider redirects during decisions about sending an Origin header, which makes it easier for remote attackers to bypass CSRF protection mechanisms via a crafted web site. CVE-2015-3659 Versions affected: WebKitGTK+ before 2.8.3. Credit to Peter Rutenbar working with HP's Zero Day Initiative. The SQLite authorizer in the Storage functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict access to SQL functions, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site. CVE-2015-3660 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. Cross-site scripting (XSS) vulnerability in the PDF functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7 allows remote attackers to inject arbitrary web script or HTML via a crafted URL in embedded PDF content. CVE-2015-3727 Versions affected: WebKitGTK+ before 2.8.1. Credit to Peter Rutenbar working with HP's Zero Day Initiative. WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict rename operations on WebSQL tables, which allows remote attackers to access an arbitrary web site's database via a crafted web site. CVE-2015-3730 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3731 Versions affected: WebKitGTK+ before 2.8.3. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3732 Versions affected: WebKitGTK+ before 2.8.3. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3733 Versions affected: WebKitGTK+ before 2.8.3. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3734 Versions affected: WebKitGTK+ before 2.8.3. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3735 Versions affected: WebKitGTK+ before 2.8.3. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3736 Versions affected: WebKitGTK+ before 2.8.3. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3737 Versions affected: WebKitGTK+ before 2.8.3. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3738 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3739 Versions affected: WebKitGTK+ before 2.8.1. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3740 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3741 Versions affected: WebKitGTK+ before 2.8.1. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3742 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3743 Versions affected: WebKitGTK+ before 2.8.3. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3744 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3745 Versions affected: WebKitGTK+ before 2.8.1. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3746 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3747 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3748 Versions affected: WebKitGTK+ before 2.8.3. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3749 Versions affected: WebKitGTK+ before 2.8.3. Credit to Apple. WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE- SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. CVE-2015-3750 Versions affected: WebKitGTK+ before 2.10.0. Credit to Muneaki Nishimura (nishimunea). WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not enforce the HTTP Strict Transport Security (HSTS) protection mechanism for Content Security Policy (CSP) report requests, which allows man-in-the-middle attackers to obtain sensitive information by sniffing the network or spoof a report by modifying the client- server data stream. CVE-2015-3751 Versions affected: WebKitGTK+ before 2.10.0. Credit to Muneaki Nishimura (nishimunea). WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, allows remote attackers to bypass a Content Security Policy protection mechanism by using a video control in conjunction with an IMG element within an OBJECT element. CVE-2015-3752 Versions affected: WebKitGTK+ before 2.8.4. Credit to Muneaki Nishimura (nishimunea). The Content Security Policy implementation in WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not properly restrict cookie transmission for report requests, which allows remote attackers to obtain sensitive information via vectors involving (1) a cross- origin request or (2) a private-browsing request. CVE-2015-3753 Versions affected: WebKitGTK+ before 2.8.3. Credit to Antonio Sanso and Damien Antipa of Adobe. WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not properly perform taint checking for CANVAS elements, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive image data by leveraging a redirect to a data:image resource. CVE-2015-3754 Versions affected: WebKitGTK+ before 2.10.0. Credit to Dongsung Kim (@kid1ng). The private-browsing implementation in WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8 does not prevent caching of HTTP authentication credentials, which makes it easier for remote attackers to track users via a crafted web site. CVE-2015-3755 Versions affected: WebKitGTK+ before 2.10.0. Credit to xisigr of Tencent's Xuanwu Lab. WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, allows remote attackers to spoof the user interface via a malformed URL. CVE-2015-5788 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. The WebKit Canvas implementation in Apple iOS before 9 allows remote attackers to bypass the Same Origin Policy and obtain sensitive image information via vectors involving a CANVAS element. CVE-2015-5789 Versions affected: WebKitGTK+ before 2.6.1. Credit to Apple. CVE-2015-5790 Versions affected: WebKitGTK+ before 2.6.2. Credit to Apple. CVE-2015-5791 Versions affected: WebKitGTK+ before 2.6.0. Credit to Apple. CVE-2015-5792 Versions affected: WebKitGTK+ before 2.4.0. Credit to Apple. CVE-2015-5793 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. CVE-2015-5794 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. CVE-2015-5795 Versions affected: WebKitGTK+ before 2.8.3. Credit to Apple. CVE-2015-5797 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. CVE-2015-5798 Versions affected: WebKitGTK+ before 2.6.0. Credit to Apple. CVE-2015-5799 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple (2.6.5). CVE-2015-5800 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple (2.6.5). CVE-2015-5801 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. CVE-2015-5802 Versions affected: WebKitGTK+ before 2.6.0. Credit to Apple. CVE-2015-5803 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. CVE-2015-5804 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-5805 Versions affected: WebKitGTK+ before 2.10.0. Credit to unknown. CVE-2015-5806 Versions affected: WebKitGTK+ before 2.8.3. Credit to Apple. CVE-2015-5807 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-5809 Versions affected: WebKitGTK+ before 2.8.4. Credit to Apple. CVE-2015-5810 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-5811 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. CVE-2015-5812 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. CVE-2015-5813 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-5814 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-5815 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-5816 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. CVE-2015-5817 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-5818 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-5819 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. CVE-2015-5822 Versions affected: WebKitGTK+ before 2.8.1. Credit to Mark S. Miller of Google. CVE-2015-5823 Versions affected: WebKitGTK+ before 2.8.0. Credit to Apple. CVE-2015-5825 Versions affected: WebKitGTK+ before 2.10.0. Credit to Yossi Oren et al. of Columbia University's Network Security Lab. WebKit in Apple iOS before 9 does not properly restrict the availability of Performance API times, which allows remote attackers to obtain sensitive information about the browser history, mouse movement, or network traffic via crafted JavaScript code. CVE-2015-5826 Versions affected: WebKitGTK+ before 2.6.5. Credit to filedescriptior, Chris Evans. WebKit in Apple iOS before 9 does not properly select the cases in which a Cascading Style Sheets (CSS) document is required to have the text/css content type, which allows remote attackers to bypass the Same Origin Policy via a crafted web site. CVE-2015-5827 Versions affected: WebKitGTK+ before 2.10.0. Credit to Gildas. WebKit in Apple iOS before 9 allows remote attackers to bypass the Same Origin Policy and obtain an object reference via vectors involving a (1) custom event, (2) message event, or (3) pop state event. CVE-2015-5828 Versions affected: WebKitGTK+ before 2.10.0. Credit to Lorenzo Fontana. The API in the WebKit Plug-ins component in Apple Safari before 9 does not provide notification of an HTTP Redirection (aka 3xx) status code to a plugin, which allows remote attackers to bypass intended request restrictions via a crafted web site. CVE-2015-5928 Versions affected: WebKitGTK+ before 2.8.4. Credit to Apple. CVE-2015-5929 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-5930 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-5931 Versions affected: WebKitGTK+ before 2.10.0. Credit to unknown. CVE-2015-7002 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-7012 Versions affected: WebKitGTK+ before 2.8.4. Credit to Apple. CVE-2015-7013 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-7014 Versions affected: WebKitGTK+ before 2.10.0. Credit to unknown. CVE-2015-7048 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-7095 Versions affected: WebKitGTK+ before 2.10.2. Credit to Apple. CVE-2015-7097 Versions affected: WebKitGTK+ before 2.10.3. Credit to Apple. CVE-2015-7099 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-7100 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-7102 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-7103 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. CVE-2015-7104 Versions affected: WebKitGTK+ before 2.10.0. Credit to Apple. We recommend updating to the last stable version of WebKitGTK+. It is the best way of ensuring that you are running a safe version of WebKitGTK+. Please check our website for information about the last stable releases. Further information about WebKitGTK+ Security Advisories can be found at: http://webkitgtk.org/security.html The WebKitGTK+ team, December 28, 2015 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2015-01-27-1 Apple TV 7.0.3 Apple TV 7.0.3 is now available and addresses the following: Apple TV Available for: Apple TV 3rd generation and later Impact: A maliciously crafted afc command may allow access to protected parts of the filesystem Description: A vulnerability existed in the symbolic linking mechanism of afc. This issue was addressed by adding additional path checks. CVE-ID CVE-2014-4480 : TaiG Jailbreak Team Apple TV Available for: Apple TV 3rd generation and later Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in the handling of PDF files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4481 : Felipe Andres Manzano of the Binamuse VRT, via the iSIGHT Partners GVP Program Apple TV Available for: Apple TV 3rd generation and later Impact: A local user may be able to execute unsigned code Description: A state management issue existed in the handling of Mach-O executable files with overlapping segments. This issue was addressed through improved validation of segment sizes CVE-ID CVE-2014-4455 : TaiG Jailbreak Team Apple TV Available for: Apple TV 3rd generation and later Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of font files. This issue was addressed through improved bounds checking. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4484 : Gaurav Baruah working with HP's Zero Day Initiative Apple TV Available for: Apple TV 3rd generation and later Impact: Viewing a maliciously crafted XML file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the XML parser. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4485 : Apple Apple TV Available for: Apple TV 3rd generation and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A null pointer dereference existed in IOAcceleratorFamily's handling of resource lists. This issue was addressed by removing unneeded code. CVE-ID CVE-2014-4486 : Ian Beer of Google Project Zero Apple TV Available for: Apple TV 3rd generation and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A buffer overflow existed in IOHIDFamily. This issue was addressed through improved size validation. CVE-ID CVE-2014-4487 : TaiG Jailbreak Team Apple TV Available for: Apple TV 3rd generation and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A validation issue existed in IOHIDFamily's handling of resource queue metadata. This issue was addressed through improved validation of metadata. CVE-ID CVE-2014-4488 : Apple Apple TV Available for: Apple TV 3rd generation and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A null pointer dereference existed in IOHIDFamily's handling of event queues. This issue was addressed through improved validation. CVE-ID CVE-2014-4489 : @beist Apple TV Available for: Apple TV 3rd generation and later Impact: Maliciously crafted or compromised iOS applications may be able to determine addresses in the kernel Description: An information disclosure issue existed in the handling of APIs related to kernel extensions. Responses containing an OSBundleMachOHeaders key may have included kernel addresses, which may aid in bypassing address space layout randomization protection. This issue was addressed by unsliding the addresses before returning them. This issue was addressed with stricter checking of shared memory permissions. CVE-ID CVE-2014-4495 : Ian Beer of Google Project Zero Apple TV Available for: Apple TV 3rd generation and later Impact: Maliciously crafted or compromised iOS applications may be able to determine addresses in the kernel Description: The mach_port_kobject kernel interface leaked kernel addresses and heap permutation value, which may aid in bypassing address space layout randomization protection. This was addressed by disabling the mach_port_kobject interface in production configurations. CVE-ID CVE-2014-4496 : TaiG Jailbreak Team Apple TV Available for: Apple TV 3rd generation and later Impact: A malicious, sandboxed app can compromise the networkd daemon Description: Multiple type confusion issues existed in networkd's handling of interprocess communication. By sending a maliciously formatted message to networkd, it could be possible to execute arbitrary code as the networkd process. The issue is addressed through additional type checking. CVE-ID CVE-2014-4492 : Ian Beer of Google Project Zero Apple TV Available for: Apple TV 3rd generation and later Impact: Style sheets are loaded cross-origin which may allow for data exfiltration Description: An SVG loaded in an img element could load a CSS file cross-origin. This issue was addressed through enhanced blocking of external CSS references in SVGs. These issues were addressed through improved memory handling. Alternatively, you may manually check for software updates by selecting "Settings -> General -> Update Software". To check the current version of software, select "Settings -> General -> About". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) iQIcBAEBAgAGBQJUx8uoAAoJEBcWfLTuOo7tyYYP/0Wa2vYwjiSNRUiPXPlxwKKJ EnQeYq248AQZ1D2YDfUwuz3zs826YM9/agwWFv+b1kDU5wYZ37oRvsEB3nmzDyA6 MChLBOE+9YRImVbgGI1VFI7FOCiLXesXWHhSJeKs0nqPmEjY2fjoR6h7KTZy7a8i QvDM61tRx9u06vDobSH3M+NvfaD87/EQZUzTnzraOw5EnMrnuyAH7vfm05xzhQsc qyaCkPq1+VsFBRAFdJQRCs2TYXTkSH0NVU+A9iMkhguH8hsRhGOzj4nnP72mYnFs QqJIPY0mKCHp5GLRLlh5+0XgPQ9M0Rz7Pq3OMfJXQB1/Jt749jAbKSWsetN8vPMx NHq1UJljbJ4L3anDmDBv5kBE1uDqYJraJQYGoswfvG2PJNIkPzlTXk9nnGIktYBS zGKZINvUFHjaPCrBiTqoVgbjAT1akkQbC/UkdNxaW0guTHmXOjIyWrN4l0ZqA7t4 1l9sVAc+pKMdbW3AXt6Gs4WEz1Fn/vQiMc2ZYudWXbW0Xc9G+8oL3db/oXoKpjEz 1+TjMcswTHB6+xqhsuUyQWJRMGW38SdwpA2fquE07xRSqhrEcIV37IdXi0knJf27 BLGWtjiDffaIzRxZZbZZjgsvLKRxeQeQeYlEc/dNn2e7x85ln70MJ2BYkuBRfnb6 G6QsP8oliqd742wGBmKC =rnYo -----END PGP SIGNATURE----- . Summary: Updated chromium-browser packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). Several flaws were found in the processing of malformed web content. (CVE-2014-3188, CVE-2014-3189, CVE-2014-3190, CVE-2014-3191, CVE-2014-3192, CVE-2014-3193, CVE-2014-3194, CVE-2014-3199, CVE-2014-3200) Several information leak flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to disclose potentially sensitive information. (CVE-2014-3195, CVE-2014-3197, CVE-2014-3198) All Chromium users should upgrade to these updated packages, which contain Chromium version 38.0.2125.101, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1150848 - CVE-2014-3188 v8: IPC and v8 issue fixed in Google Chrome 38.0.2125.101 1150849 - CVE-2014-3195 v8: information leak fixed in Google Chrome 38.0.2125.101 1151368 - CVE-2014-3189 CVE-2014-3198 chromium: OOB reads in PDFium fixed in Chrome 38.0.2125.101 1151381 - CVE-2014-3190 CVE-2014-3191 CVE-2014-3193 CVE-2014-3199 chromium: multiple security fixes in Chrome 38.0.2125.101 1151383 - CVE-2014-3194 chromium: use-after-free issue in Web Workers fixed in Chrome 38.0.2125.101 1151395 - CVE-2014-3192 chromium: use-after-free in DOM, fixed in Chrome 38.0.2125.101 1151422 - CVE-2014-3197 chromium: information leak in XSS Auditor fixed in Chrome 38.0.2125.101 1151425 - CVE-2014-3200 chromium: multiple unspecified issues fixed in Chrome 38.0.2125.101 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): Source: chromium-browser-38.0.2125.101-2.el6_6.src.rpm i386: chromium-browser-38.0.2125.101-2.el6_6.i686.rpm chromium-browser-debuginfo-38.0.2125.101-2.el6_6.i686.rpm x86_64: chromium-browser-38.0.2125.101-2.el6_6.x86_64.rpm chromium-browser-debuginfo-38.0.2125.101-2.el6_6.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): Source: chromium-browser-38.0.2125.101-2.el6_6.src.rpm i386: chromium-browser-38.0.2125.101-2.el6_6.i686.rpm chromium-browser-debuginfo-38.0.2125.101-2.el6_6.i686.rpm x86_64: chromium-browser-38.0.2125.101-2.el6_6.x86_64.rpm chromium-browser-debuginfo-38.0.2125.101-2.el6_6.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): Source: chromium-browser-38.0.2125.101-2.el6_6.src.rpm i386: chromium-browser-38.0.2125.101-2.el6_6.i686.rpm chromium-browser-debuginfo-38.0.2125.101-2.el6_6.i686.rpm x86_64: chromium-browser-38.0.2125.101-2.el6_6.x86_64.rpm chromium-browser-debuginfo-38.0.2125.101-2.el6_6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-3188.html https://www.redhat.com/security/data/cve/CVE-2014-3189.html https://www.redhat.com/security/data/cve/CVE-2014-3190.html https://www.redhat.com/security/data/cve/CVE-2014-3191.html https://www.redhat.com/security/data/cve/CVE-2014-3192.html https://www.redhat.com/security/data/cve/CVE-2014-3193.html https://www.redhat.com/security/data/cve/CVE-2014-3194.html https://www.redhat.com/security/data/cve/CVE-2014-3195.html https://www.redhat.com/security/data/cve/CVE-2014-3197.html https://www.redhat.com/security/data/cve/CVE-2014-3198.html https://www.redhat.com/security/data/cve/CVE-2014-3199.html https://www.redhat.com/security/data/cve/CVE-2014-3200.html https://access.redhat.com/security/updates/classification/#critical http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. CVE-ID CVE-2014-3192 : cloudfuzzer CVE-2014-4476 : Apple CVE-2014-4477 : lokihardt@ASRT working with HP's Zero Day Initiative CVE-2014-4479 : Apple Safari 8.0.3, Safari 7.1.3, and Safari 6.2.3 may be obtained from the Mac App Store. ============================================================================ Ubuntu Security Notice USN-2345-1 October 14, 2014 oxide-qt vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS Summary: Several security issues were fixed in Oxide. (CVE-2014-3179, CVE-2014-3200) It was discovered that Chromium did not properly handle the interaction of IPC and V8. (CVE-2014-3188) A use-after-free was discovered in the web workers implementation in Chromium. (CVE-2014-3194) It was discovered that V8 did not correctly handle Javascript heap allocations in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to steal sensitive information. (CVE-2014-3195) It was discovered that Blink did not properly provide substitute data for pages blocked by the XSS auditor. If a user were tricked in to opening a specially crafter website, an attacker could potentially exploit this to steal sensitive information. (CVE-2014-3197) It was discovered that the wrap function for Event's in the V8 bindings in Blink produced an erroneous result in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service by stopping a worker process that was handling an Event object. (CVE-2014-3199) Multiple security issues were discovered in V8. (CVE-2014-7967) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: liboxideqtcore0 1.2.5-0ubuntu0.14.04.1 oxideqt-codecs 1.2.5-0ubuntu0.14.04.1 oxideqt-codecs-extra 1.2.5-0ubuntu0.14.04.1 In general, a standard system update will make all the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201412-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Chromium: Multiple vulnerabilities Date: December 13, 2014 Bugs: #524764, #529858 ID: 201412-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Chromium, the worst of which can allow remote attackers to execute arbitrary code. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/chromium < 39.0.2171.65 >= 39.0.2171.65 Description =========== Multiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Chromium users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-client/chromium-39.0.2171.65" References ========== [ 1 ] CVE-2014-3188 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3188 [ 2 ] CVE-2014-3189 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3189 [ 3 ] CVE-2014-3190 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3190 [ 4 ] CVE-2014-3191 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3191 [ 5 ] CVE-2014-3192 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3192 [ 6 ] CVE-2014-3193 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3193 [ 7 ] CVE-2014-3194 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3194 [ 8 ] CVE-2014-3195 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3195 [ 9 ] CVE-2014-3197 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3197 [ 10 ] CVE-2014-3198 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3198 [ 11 ] CVE-2014-3199 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3199 [ 12 ] CVE-2014-3200 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3200 [ 13 ] CVE-2014-7899 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7899 [ 14 ] CVE-2014-7900 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7900 [ 15 ] CVE-2014-7901 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7901 [ 16 ] CVE-2014-7902 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7902 [ 17 ] CVE-2014-7903 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7903 [ 18 ] CVE-2014-7904 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7904 [ 19 ] CVE-2014-7906 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7906 [ 20 ] CVE-2014-7907 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7907 [ 21 ] CVE-2014-7908 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7908 [ 22 ] CVE-2014-7909 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7909 [ 23 ] CVE-2014-7910 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7910 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201412-13.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 1.89

sources: NVD: CVE-2014-3192 // BID: 70273 // VULHUB: VHN-71131 // PACKETSTORM: 132529 // PACKETSTORM: 135081 // PACKETSTORM: 130129 // PACKETSTORM: 128655 // PACKETSTORM: 130131 // PACKETSTORM: 128657 // PACKETSTORM: 129567

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:8.0.2

Trust: 1.6

vendor:redhatmodel:enterprise linux server supplementaryscope:eqversion:6.0

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:8.1.2

Trust: 1.0

vendor:redhatmodel:enterprise linux desktop supplementaryscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux workstation supplementaryscope:eqversion:6.0

Trust: 1.0

vendor:googlemodel:chromescope:lteversion:38.0.2125.7

Trust: 1.0

vendor:redhatmodel:enterprise linux server supplementary eusscope:eqversion:6.6.z

Trust: 1.0

vendor:applemodel:tvosscope:lteversion:7.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.2.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.1.2

Trust: 1.0

vendor:applemodel:itunesscope:lteversion:12.1.3

Trust: 1.0

vendor:redmodel:hat enterprise linux workstation supplementaryscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux server supplementaryscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop supplementaryscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96379

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96365

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.91275

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.47255

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.37599

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.37586

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375127

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375125

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.70

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491064

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491059

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491036

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1045

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1042

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.249.89

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.249.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.24

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.61

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.1549

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.94

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.84

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.344

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.310

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.309

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.308

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.307

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.306

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.305

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.304

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.303

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.302

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.301

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.300

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.237

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.226

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.225

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.224

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.223

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.222

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.221

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.220

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.219

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.218

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.217

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.216

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.214

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.213

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.212

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.211

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.210

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.209

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.208

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.207

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.206

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.203

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.202

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.201

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.200

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.105

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.104

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.103

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.101

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.550.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.549.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.548.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.547.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.547.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.544.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.542.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.541.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.540.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.539.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.538.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.537.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.535.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.535.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.531.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.531.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.531.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.530.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.529.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.529.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.529.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.528.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.526.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.525.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.524.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.522.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.521.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.520.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.519.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.518.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.44

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.40

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.39

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.35

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.24

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.22

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.516.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.515.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.514.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.514.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.513.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.512.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.511.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.511.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.511.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.510.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.509.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.506.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.505.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.504.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.503.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.503.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.500.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.500.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.499.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.499.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.498.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.497.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.496.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.495.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.495.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.494.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.493.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.492.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.491.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.490.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.490.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.489.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.488.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.487.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.486.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.485.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.484.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.483.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.482.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.481.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.480.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.479.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.478.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.477.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.476.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.475.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.474.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.473.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.62

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.61

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.58

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.54

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.51

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.50

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.49

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.48

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.47

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.45

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.44

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.40

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.39

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.35

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.24

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.22

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.471.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.470.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.469.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.467.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.465.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.465.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.464.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.462.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.461.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.460.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.459.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.458.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.458.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.458.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.457.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.456.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.455.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.454.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.453.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.453.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.452.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.452.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.451.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.449.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.447.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.447.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.447.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.446.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.445.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.445.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.444.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.443.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.441.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.440.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.438.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.436.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.435.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.434.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.433.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.432.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.431.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.430.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.428.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.427.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.426.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.425.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.424.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.423.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.422.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.421.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.419.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.417.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.416.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.416.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.415.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.415.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.414.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.413.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.412.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.411.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.410.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.409.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.407.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.406.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.405.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.404.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.404.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.404.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.403.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.401.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.401.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.400.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.399.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.398.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.397.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.396.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.395.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.394.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.393.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.392.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.391.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.390.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.387.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.386.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.385.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.384.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.383.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.382.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.382.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.381.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.380.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.379.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.378.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.376.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.98

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.97

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.96

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.95

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.94

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.93

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.92

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.91

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.90

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.89

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.88

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.87

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.85

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.84

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.83

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.82

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.81

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.80

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.79

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.76

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.74

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.73

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.72

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.71

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.69

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.68

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.67

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.66

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.64

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.62

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.61

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.58

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.54

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.51

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.50

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.49

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.48

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.47

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.45

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.44

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.40

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.39

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.35

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.22

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.126

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.374.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.373.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.372.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.371.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.370.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.368.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.367.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.365.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.364.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.363.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.362.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.361.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.359.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.358.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.357.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.355.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.354.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.354.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.353.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.351.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.350.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.350.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.349.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.348.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.347.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.346.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.345.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.344.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.343.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.341.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.340.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.339.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.338.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.337.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.336.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.334.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.333.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.332.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.330.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.329.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.328.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.327.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.326.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.325.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.324.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.323.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.321.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.320.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.319.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.318.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.316.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.315.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.314.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.314.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.313.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.309.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.308.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.306.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.306.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1063

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1062

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1061

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1060

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1058

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1057

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1056

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1055

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1054

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1053

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1052

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1051

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1050

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1049

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1048

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1047

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1046

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1044

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1043

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1041

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1040

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1039

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1038

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1037

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1035

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1034

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1033

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1032

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1031

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1030

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1029

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1028

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1027

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1026

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1025

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1024

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1023

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1022

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1021

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1020

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1019

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1018

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1017

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1016

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1015

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1014

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1013

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1012

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1011

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1010

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1009

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1008

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1007

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1006

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1004

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1001

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.0

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.305.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.304.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.303.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.302.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.301.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.300.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.299.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.296.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.295.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.294.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.292.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.290.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.289.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.288.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.288.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.287.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.286.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.278.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.277.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.276.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.275.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.275.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.272.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.271.0

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:4.0.249.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.224.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.223.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.222.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.221.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.212.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.212.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.211.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.2

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:3.0.193.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.190.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.182.2

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:3.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.170.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.169.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.169.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.159.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.158.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.157.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.157.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.156.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19.0.1084.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.168

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.162

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.151

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.142

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.83

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.121

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.120

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.202

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.186

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.163

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.112

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.91

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.112

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.71

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.68

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.672.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.133

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.128

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.127

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.64

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.48

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.39

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.22

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.4.154.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.154.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.154.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.153.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.152.1

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.2.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0.2.20

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.6

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:ios betascope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:1.0

Trust: 0.3

sources: BID: 70273 // CNNVD: CNNVD-201410-154 // NVD: CVE-2014-3192

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-3192
value: HIGH

Trust: 1.0

CNNVD: CNNVD-201410-154
value: HIGH

Trust: 0.6

VULHUB: VHN-71131
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-3192
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-71131
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-71131 // CNNVD: CNNVD-201410-154 // NVD: CVE-2014-3192

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.1

sources: VULHUB: VHN-71131 // NVD: CVE-2014-3192

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 129567 // CNNVD: CNNVD-201410-154

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201410-154

PATCH

title:38.0.2125.101_chrome_installerurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51771

Trust: 0.6

sources: CNNVD: CNNVD-201410-154

EXTERNAL IDS

db:NVDid:CVE-2014-3192

Trust: 2.7

db:BIDid:70273

Trust: 2.0

db:SECTRACKid:1031647

Trust: 1.7

db:CNNVDid:CNNVD-201410-154

Trust: 0.7

db:PACKETSTORMid:132529

Trust: 0.2

db:PACKETSTORMid:130129

Trust: 0.2

db:PACKETSTORMid:130131

Trust: 0.2

db:PACKETSTORMid:130130

Trust: 0.1

db:VULHUBid:VHN-71131

Trust: 0.1

db:PACKETSTORMid:135081

Trust: 0.1

db:PACKETSTORMid:128655

Trust: 0.1

db:PACKETSTORMid:128657

Trust: 0.1

db:PACKETSTORMid:129567

Trust: 0.1

sources: VULHUB: VHN-71131 // BID: 70273 // PACKETSTORM: 132529 // PACKETSTORM: 135081 // PACKETSTORM: 130129 // PACKETSTORM: 128655 // PACKETSTORM: 130131 // PACKETSTORM: 128657 // PACKETSTORM: 129567 // CNNVD: CNNVD-201410-154 // NVD: CVE-2014-3192

REFERENCES

url:http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html

Trust: 1.8

url:http://rhn.redhat.com/errata/rhsa-2014-1626.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2015/jan/msg00000.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2015/jan/msg00001.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2015/jan/msg00002.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2015/jun/msg00006.html

Trust: 1.7

url:http://www.securityfocus.com/bid/70273

Trust: 1.7

url:http://support.apple.com/ht204243

Trust: 1.7

url:http://support.apple.com/ht204245

Trust: 1.7

url:http://support.apple.com/ht204246

Trust: 1.7

url:https://crbug.com/403276

Trust: 1.7

url:https://support.apple.com/kb/ht204949

Trust: 1.7

url:http://www.securitytracker.com/id/1031647

Trust: 1.7

url:https://src.chromium.org/viewvc/blink?revision=182309&view=revision

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-3192

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2014-4479

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-4476

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-4477

Trust: 0.4

url:http://www.google.com/chrome

Trust: 0.3

url:http://support.apple.com/kb/ht1222

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-4471

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-4473

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-4468

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-4475

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-4474

Trust: 0.3

url:https://www.apple.com/support/security/pgp/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-4459

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-4469

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-4472

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-4470

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-4466

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-3200

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-3188

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-3194

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-3199

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-3195

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-3197

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-3191

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-3190

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-1069

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-4452

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1070

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1071

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1068

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-4465

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-3189

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-3198

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-3193

Trust: 0.2

url:https://src.chromium.org/viewvc/blink?revision=182309&amp;view=revision

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1073

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1075

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1079

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1076

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1077

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1074

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1072

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1080

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1078

Trust: 0.1

url:http://www.apple.com/itunes/download/

Trust: 0.1

url:http://webkitgtk.org/security.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6663

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4411

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4413

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4410

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4409

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4414

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1748

Trust: 0.1

url:http://webkitgtk.org/security/wsa-2015-0002.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4412

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4485

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4484

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4483

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4491

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4487

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4481

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4488

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4489

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4455

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4492

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4486

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4495

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4480

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-3191.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-3188.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-3189.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-3192.html

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-3197.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-3198.html

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-3195.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-3194.html

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-3190.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-3193.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-3200.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-3199.html

Trust: 0.1

url:https://access.redhat.com/security/team/key/#package

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7967

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3178

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3179

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-2345-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/oxide-qt/1.2.5-0ubuntu0.14.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7904

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7906

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7900

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201412-13.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3191

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7908

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3192

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3190

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7900

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3200

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7902

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7902

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7910

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7904

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7907

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7899

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3199

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3198

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7907

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7899

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7903

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3188

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7906

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3195

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7910

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3193

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7901

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3197

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3194

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7908

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7909

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7909

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3189

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7903

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7901

Trust: 0.1

sources: VULHUB: VHN-71131 // BID: 70273 // PACKETSTORM: 132529 // PACKETSTORM: 135081 // PACKETSTORM: 130129 // PACKETSTORM: 128655 // PACKETSTORM: 130131 // PACKETSTORM: 128657 // PACKETSTORM: 129567 // CNNVD: CNNVD-201410-154 // NVD: CVE-2014-3192

CREDITS

cloudfuzzer, miaubiz, Collin Payne, J&amp;amp;uuml;ri Aedla, James Forshaw, Takeshi Terada, and Atte Kettunen of OUSPG.

Trust: 0.3

sources: BID: 70273

SOURCES

db:VULHUBid:VHN-71131
db:BIDid:70273
db:PACKETSTORMid:132529
db:PACKETSTORMid:135081
db:PACKETSTORMid:130129
db:PACKETSTORMid:128655
db:PACKETSTORMid:130131
db:PACKETSTORMid:128657
db:PACKETSTORMid:129567
db:CNNVDid:CNNVD-201410-154
db:NVDid:CVE-2014-3192

LAST UPDATE DATE

2025-02-22T21:15:59.968000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-71131date:2019-03-08T00:00:00
db:BIDid:70273date:2015-07-15T00:51:00
db:CNNVDid:CNNVD-201410-154date:2019-03-13T00:00:00
db:NVDid:CVE-2014-3192date:2024-11-21T02:07:38.150

SOURCES RELEASE DATE

db:VULHUBid:VHN-71131date:2014-10-08T00:00:00
db:BIDid:70273date:2014-10-07T00:00:00
db:PACKETSTORMid:132529date:2015-07-02T11:08:22
db:PACKETSTORMid:135081date:2015-12-28T22:22:22
db:PACKETSTORMid:130129date:2015-01-28T00:28:03
db:PACKETSTORMid:128655date:2014-10-14T23:03:39
db:PACKETSTORMid:130131date:2015-01-28T00:34:49
db:PACKETSTORMid:128657date:2014-10-14T23:03:50
db:PACKETSTORMid:129567date:2014-12-15T20:04:05
db:CNNVDid:CNNVD-201410-154date:2014-10-13T00:00:00
db:NVDid:CVE-2014-3192date:2014-10-08T10:55:06.457