Vulnerability Details : CVE-2015-5780
The Safari Extensions implementation in Apple Safari before 9 does not require user confirmation before replacing an installed extension, which has unspecified impact and attack vectors.
Vulnerability category: Input validation
Products affected by CVE-2015-5780
- cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-5780
0.46%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-5780
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2015-5780
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-5780
-
http://lists.apple.com/archives/security-announce/2015/Sep/msg00007.html
Apple - Lists.apple.comVendor Advisory
-
https://support.apple.com/HT205265
About the security content of Safari 9 - Apple SupportVendor Advisory
-
http://www.securitytracker.com/id/1033688
Apple Safari Extensions and Plug-ins Flaws Let Remote Users Replace Extensions and Redirect Plugin Requests - SecurityTrackerThird Party Advisory;VDB Entry
Jump to