Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-5131

Опубликовано: 11 июн. 2018
Источник: debian
EPSS Низкий

Описание

Under certain circumstances the "fetch()" API can return transient local copies of resources that were sent with a "no-store" or "no-cache" cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed59.0-1package
firefox-esrfixed52.7.0esr-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2018-07/

  • https://www.mozilla.org/en-US/security/advisories/mfsa2018-06/

EPSS

Процентиль: 80%
0.01451
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 7 лет назад

Under certain circumstances the "fetch()" API can return transient local copies of resources that were sent with a "no-store" or "no-cache" cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.

CVSS3: 6.1
redhat
больше 7 лет назад

Under certain circumstances the "fetch()" API can return transient local copies of resources that were sent with a "no-store" or "no-cache" cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.

CVSS3: 5.9
nvd
около 7 лет назад

Under certain circumstances the "fetch()" API can return transient local copies of resources that were sent with a "no-store" or "no-cache" cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.

CVSS3: 5.9
github
около 3 лет назад

Under certain circumstances the "fetch()" API can return transient local copies of resources that were sent with a "no-store" or "no-cache" cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.

CVSS3: 5.9
fstec
больше 7 лет назад

Уязвимость реализации функции fetch () интерфейса для получения ресурсов Fetch API браузеров Mozilla Firefox и Firefox-ESR, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 80%
0.01451
Низкий