CVE-2015-3729 : Visiting a malicious website may lead to user interface spoofing. A malicious website could open another site and prompt for user input without a way for the user to tell where the prompt came from. The issue was addressed by displaying the prompt origin to the user.
CVE-2015-3730, CVE-2015-3731, CVE-2015-3732, CVE-2015-3733, CVE-2015-3734, CVE-2015-3735, CVE-2015-3736, CVE-2015-3737, CVE-2015-3738, CVE-2015-3739, CVE-2015-3740, CVE-2015-3741, CVE-2015-3742, CVE-2015-3743, CVE-2015-3744, CVE-2015-3745, CVE-2015-3746, CVE-2015-3747, CVE-2015-3748, CVE-2015-3749 : Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling.
CVE-2015-3750 : A malicious website may trigger plaintext requests to an origin under HTTP Strict Transport Security. An issue existed where Content Security Policy report requests would not honor HTTP Strict Transport Security. This issue was addressed through improved HTTP Strict Transport Security enforcement.
CVE-2015-3751 : Image loading may violate a website's Content Security Policy directive. An issue existed where websites with video controls would load images nested in object elements in violation of the website's Content Security Policy directive. This issue was addressed through improved Content Security Policy enforcement.
CVE-2015-3752 : Content Security Policy report requests may leak cookies. Two issues existed in how cookies were added to Content Security Policy report requests. Cookies were sent in cross-origin report requests in violation of the standard. Cookies set during regular browsing were sent in private browsing. These issues were addressed through improved cookie handling.
...See Full Release Notes