ID

VAR-201504-0335


CVE

CVE-2015-0810


TITLE

Mac OS X Run on Mozilla Firefox Vulnerable to a clickjacking attack

Trust: 0.8

sources: JVNDB: JVNDB-2015-002033

DESCRIPTION

Mozilla Firefox before 37.0 on OS X does not ensure that the cursor is visible, which allows remote attackers to conduct clickjacking attacks via a Flash object in conjunction with DIV elements associated with layered presentation, and crafted JavaScript code that interacts with an IMG element. Mozilla Firefox is prone to a clickjacking vulnerability. Successful exploits will allow an attacker to compromise the affected application or obtain sensitive information. Other attacks are also possible. Versions prior to Mozilla Firefox 37 are vulnerable. A security vulnerability exists in Mozilla Firefox 36.0.4 and earlier versions based on the OS X platform. The vulnerability stems from the fact that the program does not ensure that the cursor in Flash is visible. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201512-10 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Mozilla Products: Multiple vulnerabilities Date: December 30, 2015 Bugs: #545232, #554036, #556942, #564818, #568376 ID: 201512-10 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird, the worst of which may allow user-assisted execution of arbitrary code. Background ========== Mozilla Firefox is an open-source web browser and Mozilla Thunderbird an open-source email client, both from the Mozilla Project. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/firefox < 38.5.0 >= 38.5.0 2 www-client/firefox-bin < 38.5.0 >= 38.5.0 3 mail-client/thunderbird < 38.5.0 >= 38.5.0 4 mail-client/thunderbird-bin < 38.5.0 >= 38.5.0 ------------------------------------------------------------------- 4 affected packages Description =========== Multiple vulnerabilities have been discovered in Mozilla Firefox and Mozilla Thunderbird. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker could entice a user to view a specially crafted web page or email, possibly resulting in execution of arbitrary code or a Denial of Service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All Firefox users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-38.5.0" All Firefox-bin users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-38.5.0" All Thunderbird users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-38.5.0"= All Thunderbird-bin users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=mail-client/thunderbird-bin-38.5.0" References ========== [ 1 ] CVE-2015-0798 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0798 [ 2 ] CVE-2015-0799 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0799 [ 3 ] CVE-2015-0801 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0801 [ 4 ] CVE-2015-0802 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0802 [ 5 ] CVE-2015-0803 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0803 [ 6 ] CVE-2015-0804 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0804 [ 7 ] CVE-2015-0805 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0805 [ 8 ] CVE-2015-0806 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0806 [ 9 ] CVE-2015-0807 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0807 [ 10 ] CVE-2015-0808 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0808 [ 11 ] CVE-2015-0810 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0810 [ 12 ] CVE-2015-0811 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0811 [ 13 ] CVE-2015-0812 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0812 [ 14 ] CVE-2015-0813 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0813 [ 15 ] CVE-2015-0814 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0814 [ 16 ] CVE-2015-0815 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0815 [ 17 ] CVE-2015-0816 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0816 [ 18 ] CVE-2015-2706 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2706 [ 19 ] CVE-2015-2721 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721 [ 20 ] CVE-2015-2722 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2722 [ 21 ] CVE-2015-2724 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2724 [ 22 ] CVE-2015-2725 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2725 [ 23 ] CVE-2015-2726 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2726 [ 24 ] CVE-2015-2727 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2727 [ 25 ] CVE-2015-2728 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2728 [ 26 ] CVE-2015-2729 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2729 [ 27 ] CVE-2015-2730 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2730 [ 28 ] CVE-2015-2731 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2731 [ 29 ] CVE-2015-2733 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2733 [ 30 ] CVE-2015-2734 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2734 [ 31 ] CVE-2015-2735 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2735 [ 32 ] CVE-2015-2736 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2736 [ 33 ] CVE-2015-2737 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2737 [ 34 ] CVE-2015-2738 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2738 [ 35 ] CVE-2015-2739 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2739 [ 36 ] CVE-2015-2740 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2740 [ 37 ] CVE-2015-2741 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2741 [ 38 ] CVE-2015-2742 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2742 [ 39 ] CVE-2015-2743 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2743 [ 40 ] CVE-2015-2808 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2808 [ 41 ] CVE-2015-4000 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000 [ 42 ] CVE-2015-4495 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4495 [ 43 ] CVE-2015-4513 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4513 [ 44 ] CVE-2015-4514 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4514 [ 45 ] CVE-2015-4515 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4515 [ 46 ] CVE-2015-4518 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4518 [ 47 ] CVE-2015-7181 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7181 [ 48 ] CVE-2015-7182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7182 [ 49 ] CVE-2015-7183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7183 [ 50 ] CVE-2015-7187 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7187 [ 51 ] CVE-2015-7188 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7188 [ 52 ] CVE-2015-7189 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7189 [ 53 ] CVE-2015-7191 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7191 [ 54 ] CVE-2015-7192 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7192 [ 55 ] CVE-2015-7193 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7193 [ 56 ] CVE-2015-7194 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7194 [ 57 ] CVE-2015-7195 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7195 [ 58 ] CVE-2015-7196 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7196 [ 59 ] CVE-2015-7197 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7197 [ 60 ] CVE-2015-7198 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7198 [ 61 ] CVE-2015-7199 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7199 [ 62 ] CVE-2015-7200 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7200 [ 63 ] CVE-2015-7201 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7201 [ 64 ] CVE-2015-7202 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7202 [ 65 ] CVE-2015-7203 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7203 [ 66 ] CVE-2015-7204 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7204 [ 67 ] CVE-2015-7205 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7205 [ 68 ] CVE-2015-7207 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7207 [ 69 ] CVE-2015-7208 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7208 [ 70 ] CVE-2015-7210 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7210 [ 71 ] CVE-2015-7211 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7211 [ 72 ] CVE-2015-7212 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7212 [ 73 ] CVE-2015-7213 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7213 [ 74 ] CVE-2015-7214 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7214 [ 75 ] CVE-2015-7215 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7215 [ 76 ] CVE-2015-7216 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7216 [ 77 ] CVE-2015-7217 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7217 [ 78 ] CVE-2015-7218 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7218 [ 79 ] CVE-2015-7219 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7219 [ 80 ] CVE-2015-7220 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7220 [ 81 ] CVE-2015-7221 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7221 [ 82 ] CVE-2015-7222 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7222 [ 83 ] CVE-2015-7223 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7223 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201512-10 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.16

sources: NVD: CVE-2015-0810 // JVNDB: JVNDB-2015-002033 // BID: 73456 // VULHUB: VHN-78756 // VULMON: CVE-2015-0810 // PACKETSTORM: 135088

AFFECTED PRODUCTS

vendor:mozillamodel:firefoxscope:lteversion:36.0.4

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:36.0.4

Trust: 0.9

vendor:mozillamodel:firefoxscope:ltversion:37.0

Trust: 0.8

vendor:mozillamodel:firefoxscope:eqversion:18.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:31

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.14

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.12

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:9.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.18

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:5.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:26.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:27

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.19

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:4.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:25.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.14

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.18

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.23

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:22.04917

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:4.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:30

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:8.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:28.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:11.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:14.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:16.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:19.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:30.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.12

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:14.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:20.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.26

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:9.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:12.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.27

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:23.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:29

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.12

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:34.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.16

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:5.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:32.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:21.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:14.01

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.4.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:22.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:31.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:28.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:13.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:15.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:31.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.18

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:15.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:25.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.19

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.28

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:26

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.20

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:19.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:29.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.14

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:36.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.020

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:16.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:33

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:24.1.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.15

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.12

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:35

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.14

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:14

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:31.1.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.18

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:16.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:16

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:27.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.16

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.10.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:37

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.25

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.512

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:36

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:27.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:20.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:35.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:32.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:18.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:23.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:34

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:13.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:24.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:32

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:18.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.12

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.0.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.24

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.21

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:33.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:7.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:8.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.22

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.16

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:7.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:17.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.19

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:28

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:10.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.19

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:19.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.5.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.6.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:29.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:24.1

Trust: 0.3

sources: BID: 73456 // JVNDB: JVNDB-2015-002033 // CNNVD: CNNVD-201504-010 // NVD: CVE-2015-0810

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0810
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-0810
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201504-010
value: MEDIUM

Trust: 0.6

VULHUB: VHN-78756
value: MEDIUM

Trust: 0.1

VULMON: CVE-2015-0810
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-0810
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-78756
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-78756 // VULMON: CVE-2015-0810 // JVNDB: JVNDB-2015-002033 // CNNVD: CNNVD-201504-010 // NVD: CVE-2015-0810

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-78756 // JVNDB: JVNDB-2015-002033 // NVD: CVE-2015-0810

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201504-010

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201504-010

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002033

PATCH

title:MFSA2015-35url:http://www.mozilla.org/security/announce/2015/mfsa2015-35.html

Trust: 0.8

title:MFSA2015-35url:http://www.mozilla-japan.org/security/announce/2015/mfsa2015-35.html

Trust: 0.8

title:Firefox Setup 37.0url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54788

Trust: 0.6

title:Thunderbird Setup 31.6.0url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54790

Trust: 0.6

title:Firefox-latesturl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54789

Trust: 0.6

title:Mozilla: Mozilla Foundation Security Advisory 2015-35url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=2015-35

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=976a4da35d55283870dbb31b88a6c655

Trust: 0.1

sources: VULMON: CVE-2015-0810 // JVNDB: JVNDB-2015-002033 // CNNVD: CNNVD-201504-010

EXTERNAL IDS

db:NVDid:CVE-2015-0810

Trust: 3.0

db:SECTRACKid:1031996

Trust: 1.2

db:JVNDBid:JVNDB-2015-002033

Trust: 0.8

db:CNNVDid:CNNVD-201504-010

Trust: 0.7

db:BIDid:73456

Trust: 0.5

db:VULHUBid:VHN-78756

Trust: 0.1

db:VULMONid:CVE-2015-0810

Trust: 0.1

db:PACKETSTORMid:135088

Trust: 0.1

sources: VULHUB: VHN-78756 // VULMON: CVE-2015-0810 // BID: 73456 // JVNDB: JVNDB-2015-002033 // PACKETSTORM: 135088 // CNNVD: CNNVD-201504-010 // NVD: CVE-2015-0810

REFERENCES

url:http://www.mozilla.org/security/announce/2015/mfsa2015-35.html

Trust: 1.8

url:https://bugzilla.mozilla.org/show_bug.cgi?id=1125013

Trust: 1.8

url:https://security.gentoo.org/glsa/201512-10

Trust: 1.3

url:http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

Trust: 1.2

url:http://www.securitytracker.com/id/1031996

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0810

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0810

Trust: 0.8

url:https://www.mozilla.org/en-us/security/advisories/mfsa2015-35/

Trust: 0.4

url:http://www.mozilla.com/en-us/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.securityfocus.com/bid/73456

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0810

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2730

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7204

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0803

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0802

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0801

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0805

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0812

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7223

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7182

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7193

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2721

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7219

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2729

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4495

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7216

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0802

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2743

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4518

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2808

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7181

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2737

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2733

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2739

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2726

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7215

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0806

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0814

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7195

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7208

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7199

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0808

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7187

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7183

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7207

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0804

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0801

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0807

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2724

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2735

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0805

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0799

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2724

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7201

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7218

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7200

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7192

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7196

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4513

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7203

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2721

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2728

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7197

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0816

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2731

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0810

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7205

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7194

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7211

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2730

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7221

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7217

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2742

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7191

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0812

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0811

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7212

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0813

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7188

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7189

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7210

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7202

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7220

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0799

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4515

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2736

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7214

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4514

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2729

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2738

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7198

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0815

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2740

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2728

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0811

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4000

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0813

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0798

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2726

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7222

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2727

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0798

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2725

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2706

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2734

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2741

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0804

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0806

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0808

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0815

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2706

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2727

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0816

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2725

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2731

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0807

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2722

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2722

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0803

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7213

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0814

Trust: 0.1

sources: VULHUB: VHN-78756 // VULMON: CVE-2015-0810 // BID: 73456 // JVNDB: JVNDB-2015-002033 // PACKETSTORM: 135088 // CNNVD: CNNVD-201504-010 // NVD: CVE-2015-0810

CREDITS

Jordi Chancel

Trust: 0.3

sources: BID: 73456

SOURCES

db:VULHUBid:VHN-78756
db:VULMONid:CVE-2015-0810
db:BIDid:73456
db:JVNDBid:JVNDB-2015-002033
db:PACKETSTORMid:135088
db:CNNVDid:CNNVD-201504-010
db:NVDid:CVE-2015-0810

LAST UPDATE DATE

2024-11-23T20:34:37.302000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-78756date:2016-12-07T00:00:00
db:VULMONid:CVE-2015-0810date:2016-12-07T00:00:00
db:BIDid:73456date:2016-02-02T20:11:00
db:JVNDBid:JVNDB-2015-002033date:2015-04-03T00:00:00
db:CNNVDid:CNNVD-201504-010date:2015-04-02T00:00:00
db:NVDid:CVE-2015-0810date:2024-11-21T02:23:45.467

SOURCES RELEASE DATE

db:VULHUBid:VHN-78756date:2015-04-01T00:00:00
db:VULMONid:CVE-2015-0810date:2015-04-01T00:00:00
db:BIDid:73456date:2015-03-31T00:00:00
db:JVNDBid:JVNDB-2015-002033date:2015-04-03T00:00:00
db:PACKETSTORMid:135088date:2015-12-30T16:38:58
db:CNNVDid:CNNVD-201504-010date:2015-04-02T00:00:00
db:NVDid:CVE-2015-0810date:2015-04-01T10:59:09.863