10 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.033 Low
EPSS
Percentile
91.2%
Multiple use-after-free bugs were discovered in the application cache
implementation in Chromium. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit these to
cause a denial of service via application crash, or execute arbitrary code
with the privileges of the user invoking the program. (CVE-2015-6765,
CVE-2015-6766, CVE-2015-6767)
Several security issues were discovered in the DOM implementation in
Chromium. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit these to bypass same
origin restrictions. (CVE-2015-6768, CVE-2015-6770)
A security issue was discovered in the provisional-load commit
implementation in Chromium. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to
bypass same origin restrictions. (CVE-2015-6769)
An out-of-bounds read was discovered in the array map and filter
operations in V8 in some circumstances. If a user were tricked in to
opening a specially crafted website, an attacker could potentially
exploit this to cause a denial of service via renderer crash.
(CVE-2015-6771)
It was discovered that the DOM implementation in Chromium does not prevent
javascript: URL navigation while a document is being detached. If a user
were tricked in to opening a specially crafted website, an attacker could
potentially exploit this to bypass same origin restrictions.
(CVE-2015-6772)
An out-of bounds read was discovered in Skia in some cirumstances. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to cause a denial of service via renderer
crash. (CVE-2015-6773)
A use-after-free was discovered in the DOM implementation in Chromium. If
a user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to cause a denial of service via renderer
crash or execute arbitrary code with the privileges of the sandboxed
render process. (CVE-2015-6777)
It was discovered that the Document::open function in Chromium did not
ensure that page-dismissal event handling is compatible with modal dialog
blocking. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit this to spoof application
UI content. (CVE-2015-6782)
It was discovered that the page serializer in Chromium mishandled MOTW
comments for URLs in some circumstances. An attacker could potentially
exploit this to inject HTML content. (CVE-2015-6784)
It was discovered that the Content Security Policy (CSP) implementation
in Chromium accepted an x.y hostname as a match for a *.x.y pattern. An
attacker could potentially exploit this to bypass intended access
restrictions. (CVE-2015-6785)
It was discovered that the Content Security Policy (CSP) implementation
in Chromium accepted blob:, data: and filesystem: URLs as a match for a
Multiple security issues were discovered in Chromium. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to read uninitialized memory, cause a denial
of service via application crash or execute arbitrary code with the
privileges of the user invoking the program. (CVE-2015-6787)
Multiple security issues were discovered in V8. If a user were tricked
in to opening a specially crafted website, an attacker could potentially
exploit these to read uninitialized memory, cause a denial of service via
renderer crash or execute arbitrary code with the privileges of the
sandboxed render process. (CVE-2015-8478)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 15.10 | noarch | liboxideqtcore0 | < 1.11.3-0ubuntu0.15.10.1 | UNKNOWN |
Ubuntu | 15.10 | noarch | liboxideqt-qmlplugin | < 1.11.3-0ubuntu0.15.10.1 | UNKNOWN |
Ubuntu | 15.10 | noarch | liboxideqt-qmlplugin-dbgsym | < 1.11.3-0ubuntu0.15.10.1 | UNKNOWN |
Ubuntu | 15.10 | noarch | liboxideqtcore0-dbgsym | < 1.11.3-0ubuntu0.15.10.1 | UNKNOWN |
Ubuntu | 15.10 | noarch | liboxideqtquick0 | < 1.11.3-0ubuntu0.15.10.1 | UNKNOWN |
Ubuntu | 15.10 | noarch | liboxideqtquick0-dbgsym | < 1.11.3-0ubuntu0.15.10.1 | UNKNOWN |
Ubuntu | 15.10 | noarch | oxideqt-chromedriver | < 1.11.3-0ubuntu0.15.10.1 | UNKNOWN |
Ubuntu | 15.10 | noarch | oxideqt-codecs | < 1.11.3-0ubuntu0.15.10.1 | UNKNOWN |
Ubuntu | 15.10 | noarch | oxideqt-codecs-dbg | < 1.11.3-0ubuntu0.15.10.1 | UNKNOWN |
Ubuntu | 15.10 | noarch | oxideqt-codecs-dbgsym | < 1.11.3-0ubuntu0.15.10.1 | UNKNOWN |
ubuntu.com/security/CVE-2015-6765
ubuntu.com/security/CVE-2015-6766
ubuntu.com/security/CVE-2015-6767
ubuntu.com/security/CVE-2015-6768
ubuntu.com/security/CVE-2015-6769
ubuntu.com/security/CVE-2015-6770
ubuntu.com/security/CVE-2015-6771
ubuntu.com/security/CVE-2015-6772
ubuntu.com/security/CVE-2015-6773
ubuntu.com/security/CVE-2015-6777
ubuntu.com/security/CVE-2015-6782
ubuntu.com/security/CVE-2015-6784
ubuntu.com/security/CVE-2015-6785
ubuntu.com/security/CVE-2015-6786
ubuntu.com/security/CVE-2015-6787
ubuntu.com/security/CVE-2015-8478