ID

VAR-201412-0206


CVE

CVE-2014-1595


TITLE

Apple OS X Multiple running on Mozilla Vulnerabilities in which important information is obtained in products

Trust: 0.8

sources: JVNDB: JVNDB-2014-005905

DESCRIPTION

Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, and Thunderbird before 31.3 on Apple OS X 10.10 omit a CoreGraphics disable-logging action that is needed by jemalloc-based applications, which allows local users to obtain sensitive information by reading /tmp files, as demonstrated by credential information. Supplementary information : CWE Vulnerability type by CWE-199: Information Management Errors ( Information management issues ) Has been identified. http://cwe.mitre.org/data/definitions/199.htmlBy local users /tmp By reading the file, important information may be obtained. Mozilla Firefox/Thunderbird are prone to multiple information-disclosure vulnerabilities. An attacker can exploit these issues to gain access to sensitive information. Information obtained may lead to further attacks. These issues are fixed in: Firefox 34 Firefox ESR 31.3 Thunderbird 31.3. Thunderbird is a set of e-mail client software independent from the Mozilla Application Suite. A security vulnerability exists in several Mozilla products due to the program ignoring the CoreGraphics disable-logging operation required by jemalloc-based applications. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2015-01-27-4 OS X 10.10.2 and Security Update 2015-001 OS X 10.10.2 and Security Update 2015-001 are now available and address the following: AFP Server Available for: OS X Mavericks v10.9.5 Impact: A remote attacker may be able to determine all the network addresses of the system Description: The AFP file server supported a command which returned all the network addresses of the system. This issue was addressed by removing the addresses from the result. CVE-ID CVE-2014-4426 : Craig Young of Tripwire VERT bash Available for: OS X Yosemite v10.10 and v10.10.1 Impact: Multiple vulnerabilities in bash, including one that may allow local attackers to execute arbitrary code Description: Multiple vulnerabilities existed in bash. These issues were addressed by updating bash to patch level 57. CVE-ID CVE-2014-6277 CVE-2014-7186 CVE-2014-7187 Bluetooth Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An integer signedness error existed in IOBluetoothFamily which allowed manipulation of kernel memory. This issue was addressed through improved bounds checking. This issue does not affect OS X Yosemite systems. CVE-ID CVE-2014-4497 Bluetooth Available for: OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An error existed in the Bluetooth driver that allowed a malicious application to control the size of a write to kernel memory. The issue was addressed through additional input validation. CVE-ID CVE-2014-8836 : Ian Beer of Google Project Zero Bluetooth Available for: OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Multiple security issues existed in the Bluetooth driver, allowing a malicious application to execute arbitrary code with system privilege. The issues were addressed through additional input validation. CVE-ID CVE-2014-8837 : Roberto Paleari and Aristide Fattori of Emaze Networks CFNetwork Cache Available for: OS X Yosemite v10.10 and v10.10.1 Impact: Website cache may not be fully cleared after leaving private browsing Description: A privacy issue existed where browsing data could remain in the cache after leaving private browsing. This issue was addressed through a change in caching behavior. CVE-ID CVE-2014-4460 CoreGraphics Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in the handling of PDF files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4481 : Felipe Andres Manzano of the Binamuse VRT, via the iSIGHT Partners GVP Program CPU Software Available for: OS X Yosemite v10.10 and v10.10.1, for: MacBook Pro Retina, MacBook Air (Mid 2013 and later), iMac (Late 2013 and later), Mac Pro (Late 2013) Impact: A malicious Thunderbolt device may be able to affect firmware flashing Description: Thunderbolt devices could modify the host firmware if connected during an EFI update. This issue was addressed by not loading option ROMs during updates. CVE-ID CVE-2014-4498 : Trammell Hudson of Two Sigma Investments CommerceKit Framework Available for: OS X Yosemite v10.10 and v10.10.1 Impact: An attacker with access to a system may be able to recover Apple ID credentials Description: An issue existed in the handling of App Store logs. The App Store process could log Apple ID credentials in the log when additional logging was enabled. This issue was addressed by disallowing logging of credentials. CVE-ID CVE-2014-4499 : Sten Petersen CoreGraphics Available for: OS X Yosemite v10.10 and v10.10.1 Impact: Some third-party applications with non-secure text entry and mouse events may log those events Description: Due to the combination of an uninitialized variable and an application's custom allocator, non-secure text entry and mouse events may have been logged. This issue was addressed by ensuring that logging is off by default. This issue did not affect systems prior to OS X Yosemite. CVE-ID CVE-2014-1595 : Steven Michaud of Mozilla working with Kent Howard CoreGraphics Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of PDF files. The issue was addressed through improved bounds checking. This issue does not affect OS X Yosemite systems. CVE-ID CVE-2014-8816 : Mike Myers, of Digital Operatives LLC CoreSymbolication Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Multiple type confusion issues existed in coresymbolicationd's handling of XPC messages. These issues were addressed through improved type checking. CVE-ID CVE-2014-8817 : Ian Beer of Google Project Zero FontParser Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Processing a maliciously crafted .dfont file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of .dfont files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4484 : Gaurav Baruah working with HP's Zero Day Initiative FontParser Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of font files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4483 : Apple Foundation Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Viewing a maliciously crafted XML file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the XML parser. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4485 : Apple Intel Graphics Driver Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Multiple vulnerabilities in Intel graphics driver Description: Multiple vulnerabilities existed in the Intel graphics driver, the most serious of which may have led to arbitrary code execution with system privileges. This update addresses the issues through additional bounds checks. CVE-ID CVE-2014-8819 : Ian Beer of Google Project Zero CVE-2014-8820 : Ian Beer of Google Project Zero CVE-2014-8821 : Ian Beer of Google Project Zero IOAcceleratorFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A null pointer dereference existed in IOAcceleratorFamily's handling of certain IOService userclient types. This issue was addressed through improved validation of IOAcceleratorFamily contexts. CVE-ID CVE-2014-4486 : Ian Beer of Google Project Zero IOHIDFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A buffer overflow existed in IOHIDFamily. This issue was addressed with improved bounds checking. CVE-ID CVE-2014-4487 : TaiG Jailbreak Team IOHIDFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A validation issue existed in IOHIDFamily's handling of resource queue metadata. This issue was addressed through improved validation of metadata. CVE-ID CVE-2014-4488 : Apple IOHIDFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A null pointer dereference existed in IOHIDFamily's handling of event queues. This issue was addressed through improved validation of IOHIDFamily event queue initialization. CVE-ID CVE-2014-4489 : @beist IOHIDFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Executing a malicious application may result in arbitrary code execution within the kernel Description: A bounds checking issue existed in a user client vended by the IOHIDFamily driver which allowed a malicious application to overwrite arbitrary portions of the kernel address space. The issue is addressed by removing the vulnerable user client method. CVE-ID CVE-2014-8822 : Vitaliy Toropov working with HP's Zero Day Initiative IOKit Available for: OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An integer overflow existed in the handling of IOKit functions. This issue was addressed through improved validation of IOKit API arguments. CVE-ID CVE-2014-4389 : Ian Beer of Google Project Zero IOUSBFamily Available for: OS X Yosemite v10.10 and v10.10.1 Impact: A privileged application may be able to read arbitrary data from kernel memory Description: A memory access issue existed in the handling of IOUSB controller user client functions. This issue was addressed through improved argument validation. CVE-ID CVE-2014-8823 : Ian Beer of Google Project Zero Kernel Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Specifying a custom cache mode allowed writing to kernel read-only shared memory segments. This issue was addressed by not granting write permissions as a side-effect of some custom cache modes. CVE-ID CVE-2014-4495 : Ian Beer of Google Project Zero Kernel Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A validation issue existed in the handling of certain metadata fields of IODataQueue objects. This issue was addressed through improved validation of metadata. CVE-ID CVE-2014-8824 : @PanguTeam Kernel Available for: OS X Yosemite v10.10 and v10.10.1 Impact: A local attacker can spoof directory service responses to the kernel, elevate privileges, or gain kernel execution Description: Issues existed in identitysvc validation of the directory service resolving process, flag handling, and error handling. This issue was addressed through improved validation. CVE-ID CVE-2014-8825 : Alex Radocea of CrowdStrike Kernel Available for: OS X Yosemite v10.10 and v10.10.1 Impact: A local user may be able to determine kernel memory layout Description: Multiple uninitialized memory issues existed in the network statistics interface, which led to the disclosure of kernel memory content. This issue was addressed through additional memory initialization. CVE-ID CVE-2014-4371 : Fermin J. Serna of the Google Security Team CVE-2014-4419 : Fermin J. Serna of the Google Security Team CVE-2014-4420 : Fermin J. Serna of the Google Security Team CVE-2014-4421 : Fermin J. Serna of the Google Security Team Kernel Available for: OS X Mavericks v10.9.5 Impact: A person with a privileged network position may cause a denial of service Description: A race condition issue existed in the handling of IPv6 packets. This issue was addressed through improved lock state checking. CVE-ID CVE-2011-2391 Kernel Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Maliciously crafted or compromised applications may be able to determine addresses in the kernel Description: An information disclosure issue existed in the handling of APIs related to kernel extensions. Responses containing an OSBundleMachOHeaders key may have included kernel addresses, which may aid in bypassing address space layout randomization protection. This issue was addressed by unsliding the addresses before returning them. CVE-ID CVE-2014-4491 : @PanguTeam, Stefan Esser Kernel Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A validation issue existed in the handling of certain metadata fields of IOSharedDataQueue objects. This issue was addressed through relocation of the metadata. CVE-ID CVE-2014-4461 : @PanguTeam LaunchServices Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious JAR file may bypass Gatekeeper checks Description: An issue existed in the handling of application launches which allowed certain malicious JAR files to bypass Gatekeeper checks. This issue was addressed through improved handling of file type metadata. CVE-ID CVE-2014-8826 : Hernan Ochoa of Amplia Security libnetcore Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious, sandboxed app can compromise the networkd daemon Description: Multiple type confusion issues existed in networkd's handling of interprocess communication. By sending networkd a maliciously formatted message, it may have been possible to execute arbitrary code as the networkd process. The issue is addressed through additional type checking. CVE-ID CVE-2014-4492 : Ian Beer of Google Project Zero LoginWindow Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A Mac may not lock immediately upon wake Description: An issue existed in the rendering of the lock screen. This issue was address through improved screen rendering while locked. CVE-ID CVE-2014-8827 : Xavier Bertels of Mono, and multiple OS X seed testers lukemftp Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Using the command line ftp tool to fetch files from a malicious http server may lead to arbitrary code execution Description: A command injection issue existed in the handling of HTTP redirects. This issue was addressed through improved validation of special characters. CVE-ID CVE-2014-8517 OpenSSL Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Multiple vulnerabilities in OpenSSL 0.9.8za, including one that may allow an attacker to downgrade connections to use weaker cipher-suites in applications using the library Description: Multiple vulnerabilities existed in OpenSSL 0.9.8za. These issues were addressed by updating OpenSSL to version 0.9.8zc. CVE-ID CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 Sandbox Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5 Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A design issue existed in the caching of sandbox profiles which allowed sandboxed applications to gain write access to the cache. This issue was addressed by restricting write access to paths containing a "com.apple.sandbox" segment. This issue does not affect OS X Yosemite v10.10 or later. CVE-ID CVE-2014-8828 : Apple SceneKit Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5 Impact: A malicious application could execute arbitrary code leading to compromise of user information Description: Multiple out of bounds write issues existed in SceneKit. These issues were addressed through improved bounds checking. CVE-ID CVE-2014-8829 : Jose Duart of the Google Security Team SceneKit Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Viewing a maliciously crafted Collada file may lead to an unexpected application termination or arbitrary code execution Description: A heap buffer overflow existed in SceneKit's handling of Collada files. Viewing a maliciously crafted Collada file may have led to an unexpected application termination or arbitrary code execution. This issue was addressed through improved validation of accessor elements. CVE-ID CVE-2014-8830 : Jose Duart of Google Security Team Security Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A downloaded application signed with a revoked Developer ID certificate may pass Gatekeeper checks Description: An issue existed with how cached application certificate information was evaluated. This issue was addressed with cache logic improvements. CVE-ID CVE-2014-8838 : Apple security_taskgate Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: An app may access keychain items belonging to other apps Description: An access control issue existed in the Keychain. Applications signed with self-signed or Developer ID certificates could access keychain items whose access control lists were based on keychain groups. This issue was addressed by validating the signing identity when granting access to keychain groups. CVE-ID CVE-2014-8831 : Apple Spotlight Available for: OS X Yosemite v10.10 and v10.10.1 Impact: The sender of an email could determine the IP address of the recipient Description: Spotlight did not check the status of Mail's "Load remote content in messages" setting. This issue was addressed by improving configuration checking. CVE-ID CVE-2014-8839 : John Whitehead of The New York Times, Frode Moe of LastFriday.no Spotlight Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: Spotlight may save unexpected information to an external hard drive Description: An issue existed in Spotlight where memory contents may have been written to external hard drives when indexing. This issue was addressed with better memory management. CVE-ID CVE-2014-8832 : F-Secure SpotlightIndex Available for: OS X Yosemite v10.10 and v10.10.1 Impact: Spotlight may display results for files not belonging to the user Description: A deserialization issue existed in Spotlight's handling of permission caches. A user performing a Spotlight query may have been shown search results referencing files for which they don't have sufficient privileges to read. This issue was addressed with improved bounds checking. CVE-ID CVE-2014-8833 : David J Peacock, Independent Technology Consultant sysmond Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1 Impact: A malicious application may be able to execute arbitrary code with root privileges Description: A type confusion vulnerability existed in sysmond that allowed a local application to escalate privileges. The issue was addressed with improved type checking. CVE-ID CVE-2014-8835 : Ian Beer of Google Project Zero UserAccountUpdater Available for: OS X Yosemite v10.10 and v10.10.1 Impact: Printing-related preference files may contain sensitive information about PDF documents Description: OS X Yosemite v10.10 addressed an issue in the handling of password-protected PDF files created from the Print dialog where passwords may have been included in printing preference files. This update removes such extraneous information that may have been present in printing preference files. CVE-ID CVE-2014-8834 : Apple Note: OS X Yosemite 10.10.2 includes the security content of Safari 8.0.3. For further details see https://support.apple.com/kb/HT204243 OS X Yosemite 10.10.2 and Security Update 2015-001 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) iQIcBAEBAgAGBQJUx8ufAAoJEBcWfLTuOo7tWecQAIFvaOlK0Ar2vbUaH0TIpO9F N9SbkWmdNHDNUvc3LJOaeVfAFlXPbgHYqXGIC0kZiRL5Kyhy/K2hH29iNoIDqfET D1jPWOaAFhzvohViYl12ne/A7bBs5v+3G6gqmGCDCqGyn5VFdUMmS0/ZJSCUkPQG LqTvj5D4ulYl8I5uA9Ur9jD2j/TkSCOWiSTO5diMlt1WcKb1fn5pl9b0YNweI8UX FcZPrIlVNeaSywuitdxZEcWOhsJYbS6Xw13crS/HNJGEO+5N7keCnCJiN9HW4Pt6 8iNAgkSWX6S8nP6mq3tiKJmvh6Qj88tvSLgotc79+C8djvkwkxr3611sSLRUStI/ qmwDeJS+rvNgFiLbcJjDDH1EC3qBqMb5mIsMtnXKDDMS8mNeJHaQFngK2YacFLuW gzAMZIcEhLpWq46rYHBsPsB1iG1shyxxz1zL+JKNAi1aTtfFrP3aItQBUG5T345V 0oJol8oxzen9KLNYJMvE9CTJlrRr204DoQkmhY2dUP2W1EQoEGw2qzy/zBIq0yFA 0FNVcSXE+T4yCyHRGakK/sccw6lyCP0xS/lgaPlkyHsFT3oalu9yyqNtDCJl/Cns sAa5dw0tlb8/zWQ3fsJna2yrw5xSboA5KWegtrjtjodrz8O1MjRrTPgx8AnLjKzq nggZl3Sa+QhfaHSUqSJI =uAqk -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2014-1595 // JVNDB: JVNDB-2014-005905 // BID: 71394 // VULHUB: VHN-69534 // VULMON: CVE-2014-1595 // PACKETSTORM: 130132

AFFECTED PRODUCTS

vendor:mozillamodel:firefox esrscope:eqversion:31.2

Trust: 1.9

vendor:mozillamodel:firefoxscope:eqversion:31.0

Trust: 1.3

vendor:mozillamodel:firefoxscope:eqversion:31.1.0

Trust: 1.3

vendor:mozillamodel:firefoxscope:lteversion:33.0

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:lteversion:31.2

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:31.1.1

Trust: 1.0

vendor:mozillamodel:firefox esrscope:eqversion:31.1.1

Trust: 0.9

vendor:mozillamodel:firefox esrscope:eqversion:31.0

Trust: 0.9

vendor:mozillamodel:firefox esrscope:eqversion:31.1.0

Trust: 0.9

vendor:mozillamodel:thunderbirdscope:eqversion:31.2

Trust: 0.9

vendor:applemodel:mac os xscope:eqversion:10.10

Trust: 0.8

vendor:mozillamodel:firefox esrscope:ltversion:31.x

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.10.1

Trust: 0.8

vendor:mozillamodel:firefox esrscope:eqversion:31.3

Trust: 0.8

vendor:mozillamodel:firefoxscope:eqversion:33.0

Trust: 0.6

vendor:mozillamodel:thunderbirdscope:eqversion:13.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:31

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.8.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.9

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:4.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.19

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:17.0

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.17

Trust: 0.3

vendor:mozillamodel:firefox beta10scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:14.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:11.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:20.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.4

Trust: 0.3

vendor:mozillamodel:firefox beta6scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.12

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.16

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.4

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:14.01

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.4.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:22.0

Trust: 0.3

vendor:mozillamodel:firefox esrscope:neversion:31.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.8

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:13.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.7.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:6.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.19

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:26

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.20

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:17.0.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:7.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.7

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.5

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:17.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:33

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:34

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.3

Trust: 0.3

vendor:mozillamodel:firefox rc3scope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:1.51

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.11

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:17.0.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.4

Trust: 0.3

vendor:mozillamodel:firefox beta8scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:27.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.16

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:24.0.1

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:17.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.10.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.5

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.11

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.14

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:27.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:20.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:8.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.13

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:16.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:18.0.2

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.13

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.12

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:9.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:12.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.0.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.24

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6.0.2

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:17.0.4

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:17.0.10

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:10.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:8.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:7.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.19

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:28

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:10.0.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:24.1

Trust: 0.3

vendor:mozillamodel:firefox beta4scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.18

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:26.0

Trust: 0.3

vendor:mozillamodel:thunderbird betascope:eqversion:1.52

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:24.0

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:25.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.18

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.23

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.1.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9.1

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.19

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:8.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:16.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.10

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.26

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:9.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:12.0

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:24.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.27

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.024

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:17.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.13

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.5

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:24.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.11

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.7.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9.2

Trust: 0.3

vendor:mozillamodel:thunderbird betascope:eqversion:1.0.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.5

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:17.0.8

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.0.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:32.0

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.12

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:31.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:15

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:17.0.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31.1.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:10.0.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.8

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:17.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.11

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:24.1.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.12

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.19

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.4

Trust: 0.3

vendor:mozillamodel:firefox rc2scope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.18

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.6

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.4

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:24.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.16

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.20

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.25

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:24.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.5

Trust: 0.3

vendor:mozillamodel:firefox rcscope:eqversion:0.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31.1.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.1

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:24.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:32.0

Trust: 0.3

vendor:mozillamodel:firefox beta1scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.6

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.63

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.22

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.3

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:17.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.18

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:19.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.6.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.2

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:24.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:15.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:27

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.1

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:17.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:29.0.1

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.10.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:14

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:30

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31.1.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:28.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:16.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:19.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:14.0.1

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:17.0.3

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:24.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:29

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:12.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:32.0.3

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.7.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:23.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.23

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.12

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:15.0

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.05

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:7.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.28

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:19.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:6.0.1

Trust: 0.3

vendor:mozillamodel:firefox beta11scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.10

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.3

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.62

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.10

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:16.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:9.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.4

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.12

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.16

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.10

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.1

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:24.8.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.512

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.3

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:24.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:23.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:24.0

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:17.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:32

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:18.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.12

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.14

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:7.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.11

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.22

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:5.0

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:17.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.5

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:17.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.10

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:neversion:31.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.12

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:18.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.14

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.12

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:15.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.18

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.2

Trust: 0.3

vendor:mozillamodel:firefox beta9scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:17.0.1

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.13

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:9.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:5.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.19

Trust: 0.3

vendor:mozillamodel:firefox beta5scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.16

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.8

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:16.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:22.04917

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:16

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:30.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.12

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:23.0.1

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:5

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:1.52

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.7

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:17.0.4

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:17.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.9.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:21.0

Trust: 0.3

vendor:mozillamodel:firefox beta6scope:eqversion:12.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:11.0.1

Trust: 0.3

vendor:mozillamodel:firefox beta3scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:13.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.21

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:28.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:15.0.1

Trust: 0.3

vendor:mozillamodel:firefox beta7scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:17.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.18

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:25.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:29.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.8

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:2.01

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.020

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:16.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.4

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:16

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.2

Trust: 0.3

vendor:mozillamodel:firefox beta12scope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.4

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.8

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:31.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.10

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:10.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.13

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:11.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:14.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:13.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.11

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.20

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.6

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:24.1.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.21

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:17.0.8

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:10.0.12

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:10.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9.3

Trust: 0.3

vendor:mozillamodel:thunderbird esrscope:eqversion:10.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.16

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:17.0.9

Trust: 0.3

vendor:mozillamodel:firefox esrscope:eqversion:24.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.19

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.7

Trust: 0.3

sources: BID: 71394 // JVNDB: JVNDB-2014-005905 // CNNVD: CNNVD-201412-119 // NVD: CVE-2014-1595

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-1595
value: LOW

Trust: 1.0

NVD: CVE-2014-1595
value: LOW

Trust: 0.8

CNNVD: CNNVD-201412-119
value: LOW

Trust: 0.6

VULHUB: VHN-69534
value: LOW

Trust: 0.1

VULMON: CVE-2014-1595
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2014-1595
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-69534
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-69534 // VULMON: CVE-2014-1595 // JVNDB: JVNDB-2014-005905 // CNNVD: CNNVD-201412-119 // NVD: CVE-2014-1595

PROBLEMTYPE DATA

problemtype:CWE-199

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-69534 // JVNDB: JVNDB-2014-005905 // NVD: CVE-2014-1595

THREAT TYPE

local

Trust: 0.9

sources: BID: 71394 // CNNVD: CNNVD-201412-119

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201412-119

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-005905

PATCH

title:APPLE-SA-2015-01-27-4url:http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html

Trust: 0.8

title:HT204244url:http://support.apple.com/en-us/HT204244

Trust: 0.8

title:HT204244url:http://support.apple.com/ja-jp/HT204244

Trust: 0.8

title:MFSA2014-90url:https://www.mozilla.org/ja/security/advisories/mfsa2014-90/

Trust: 0.8

title:MFSA2014-90url:http://www.mozilla-japan.org/security/announce/2014/mfsa2014-90.html

Trust: 0.8

title:Mozilla: Mozilla Foundation Security Advisory 2014-90url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=2014-90

Trust: 0.1

title:Apple: OS X Yosemite v10.10.2 and Security Update 2015-001url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=64cbe709a7be49c91d8a8b0f43621640

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=976a4da35d55283870dbb31b88a6c655

Trust: 0.1

sources: VULMON: CVE-2014-1595 // JVNDB: JVNDB-2014-005905

EXTERNAL IDS

db:NVDid:CVE-2014-1595

Trust: 3.0

db:BIDid:71394

Trust: 1.1

db:JVNid:JVNVU96447236

Trust: 0.8

db:JVNDBid:JVNDB-2014-005905

Trust: 0.8

db:CNNVDid:CNNVD-201412-119

Trust: 0.7

db:SECUNIAid:60558

Trust: 0.6

db:SECUNIAid:60605

Trust: 0.6

db:NSFOCUSid:28593

Trust: 0.6

db:VULHUBid:VHN-69534

Trust: 0.1

db:VULMONid:CVE-2014-1595

Trust: 0.1

db:PACKETSTORMid:130132

Trust: 0.1

sources: VULHUB: VHN-69534 // VULMON: CVE-2014-1595 // BID: 71394 // JVNDB: JVNDB-2014-005905 // PACKETSTORM: 130132 // CNNVD: CNNVD-201412-119 // NVD: CVE-2014-1595

REFERENCES

url:http://www.mozilla.org/security/announce/2014/mfsa2014-90.html

Trust: 1.8

url:https://bugzilla.mozilla.org/show_bug.cgi?id=1092855

Trust: 1.8

url:http://www.reddit.com/r/netsec/comments/2ocxac/apple_coregraphics_framework_on_os_x_1010_is/

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2015/jan/msg00003.html

Trust: 1.2

url:http://support.apple.com/ht204244

Trust: 1.2

url:http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1595

Trust: 0.8

url:http://jvn.jp/vu/jvnvu96447236/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-1595

Trust: 0.8

url:http://www.securityfocus.com/bid/71394

Trust: 0.7

url:http://secunia.com/advisories/60558

Trust: 0.6

url:http://secunia.com/advisories/60605

Trust: 0.6

url:http://www.nsfocus.net/vulndb/28593

Trust: 0.6

url:https://www.mozilla.org/en-us/security/advisories/mfsa2014-90/

Trust: 0.4

url:http://www.mozilla.com/en-us/

Trust: 0.3

url:http://www.mozilla.org/products/thunderbird/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/199.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=37192

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4426

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4485

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4484

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3567

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4421

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4483

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4491

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://support.apple.com/kb/ht204243

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2391

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4487

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4481

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4419

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4420

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4488

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4489

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1595

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4498

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4497

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4460

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4492

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4499

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4389

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3568

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4461

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4486

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4495

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6277

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4371

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3566

Trust: 0.1

sources: VULHUB: VHN-69534 // VULMON: CVE-2014-1595 // BID: 71394 // JVNDB: JVNDB-2014-005905 // PACKETSTORM: 130132 // CNNVD: CNNVD-201412-119 // NVD: CVE-2014-1595

CREDITS

Kent Howard

Trust: 0.9

sources: BID: 71394 // CNNVD: CNNVD-201412-119

SOURCES

db:VULHUBid:VHN-69534
db:VULMONid:CVE-2014-1595
db:BIDid:71394
db:JVNDBid:JVNDB-2014-005905
db:PACKETSTORMid:130132
db:CNNVDid:CNNVD-201412-119
db:NVDid:CVE-2014-1595

LAST UPDATE DATE

2024-10-23T20:08:01.858000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-69534date:2016-10-04T00:00:00
db:VULMONid:CVE-2014-1595date:2016-10-04T00:00:00
db:BIDid:71394date:2015-04-13T22:00:00
db:JVNDBid:JVNDB-2014-005905date:2015-02-02T00:00:00
db:CNNVDid:CNNVD-201412-119date:2014-12-12T00:00:00
db:NVDid:CVE-2014-1595date:2024-10-21T13:55:03.510

SOURCES RELEASE DATE

db:VULHUBid:VHN-69534date:2014-12-11T00:00:00
db:VULMONid:CVE-2014-1595date:2014-12-11T00:00:00
db:BIDid:71394date:2014-12-02T00:00:00
db:JVNDBid:JVNDB-2014-005905date:2014-12-12T00:00:00
db:PACKETSTORMid:130132date:2015-01-28T00:36:53
db:CNNVDid:CNNVD-201412-119date:2014-12-05T00:00:00
db:NVDid:CVE-2014-1595date:2014-12-11T11:59:09.243