Executive Summary

Informations
Name CVE-2015-7036 First vendor Publication 2015-11-21
Vendor Cve Last vendor Modification 2017-07-01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The fts3_tokenizer function in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a SQL command that triggers an API call with a crafted pointer value in the second argument.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7036

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2
Os 150
Os 101

Nessus® Vulnerability Scanner

Date Description
2016-12-08 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201612-21.nasl - Type : ACT_GATHER_INFO
2015-07-01 Name : The remote host is missing a Mac OS X update that fixes multiple security vul...
File : macosx_10_10_4.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
GENTOO https://security.gentoo.org/glsa/201612-21
MISC http://zerodayinitiative.com/advisories/ZDI-15-570/

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
Date Informations
2024-02-02 01:34:19
  • Multiple Updates
2024-02-01 12:09:52
  • Multiple Updates
2023-09-05 12:32:41
  • Multiple Updates
2023-09-05 01:09:41
  • Multiple Updates
2023-09-02 12:32:33
  • Multiple Updates
2023-09-02 01:09:53
  • Multiple Updates
2023-08-12 12:35:24
  • Multiple Updates
2023-08-12 01:09:20
  • Multiple Updates
2023-08-11 12:30:35
  • Multiple Updates
2023-08-11 01:09:36
  • Multiple Updates
2023-08-06 12:29:42
  • Multiple Updates
2023-08-06 01:09:20
  • Multiple Updates
2023-08-04 12:29:49
  • Multiple Updates
2023-08-04 01:09:24
  • Multiple Updates
2023-07-14 12:29:49
  • Multiple Updates
2023-07-14 01:09:22
  • Multiple Updates
2023-03-29 01:31:33
  • Multiple Updates
2023-03-28 12:09:41
  • Multiple Updates
2022-10-11 12:26:50
  • Multiple Updates
2022-10-11 01:09:28
  • Multiple Updates
2021-05-23 12:17:17
  • Multiple Updates
2021-05-04 12:42:35
  • Multiple Updates
2021-04-22 01:51:51
  • Multiple Updates
2020-05-23 01:57:02
  • Multiple Updates
2020-05-23 00:46:53
  • Multiple Updates
2019-09-27 12:07:41
  • Multiple Updates
2019-09-26 12:07:28
  • Multiple Updates
2019-07-17 12:07:27
  • Multiple Updates
2018-11-15 12:06:47
  • Multiple Updates
2018-04-07 12:06:52
  • Multiple Updates
2018-04-06 01:04:16
  • Multiple Updates
2017-07-01 09:23:15
  • Multiple Updates
2016-12-09 13:25:25
  • Multiple Updates
2016-11-18 12:02:21
  • Multiple Updates
2016-09-01 01:03:08
  • Multiple Updates
2016-06-29 01:05:31
  • Multiple Updates
2016-04-27 02:58:13
  • Multiple Updates
2015-11-23 21:26:02
  • Multiple Updates
2015-11-22 09:25:02
  • First insertion