Unrated severityNVD Advisory· Published Jul 23, 2015· Updated May 6, 2026
CVE-2015-1288
CVE-2015-1288
Description
The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file, a related issue to CVE-2015-1263.
Affected products
8- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-1499.htmlnvd
- www.debian.org/security/2015/dsa-3315nvd
- www.securityfocus.com/bid/75973nvd
- www.securitytracker.com/id/1033031nvd
- code.google.com/p/chromium/issues/detailnvd
- codereview.chromium.org/1056103005nvd
- security.gentoo.org/glsa/201603-09nvd
News mentions
0No linked articles in our index yet.