Количество 19
Количество 19

openSUSE-SU-2018:2996-1
Security update for Mozilla Firefox
ELSA-2018-2884
ELSA-2018-2884: firefox security update (CRITICAL)
ELSA-2018-2881
ELSA-2018-2881: firefox security update (CRITICAL)

SUSE-SU-2018:3476-1
Security update for MozillaFirefox

SUSE-SU-2018:3591-2
Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss

SUSE-SU-2018:3591-1
Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss
ELSA-2018-3006
ELSA-2018-3006: firefox security update (CRITICAL)

CVE-2018-12387
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.

CVE-2018-12387
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.

CVE-2018-12387
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
CVE-2018-12387
A vulnerability where the JavaScript JIT compiler inlines Array.protot ...

CVE-2018-12386
A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.

CVE-2018-12386
A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.

CVE-2018-12386
A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
CVE-2018-12386
A vulnerability in register allocation in JavaScript can lead to type ...
GHSA-vfrp-p8qm-9m8x
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
GHSA-5vgc-hmw3-287j
A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.

BDU:2019-03415
Уязвимость реализации метода Array.prototype.push JIT-компилятора веб-браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код

BDU:2019-03414
Уязвимость веб-браузеров Firefox, Firefox ESR, связанная с ошибками преобразования типов данных, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | openSUSE-SU-2018:2996-1 Security update for Mozilla Firefox | почти 7 лет назад | ||
ELSA-2018-2884 ELSA-2018-2884: firefox security update (CRITICAL) | почти 7 лет назад | |||
ELSA-2018-2881 ELSA-2018-2881: firefox security update (CRITICAL) | почти 7 лет назад | |||
![]() | SUSE-SU-2018:3476-1 Security update for MozillaFirefox | почти 7 лет назад | ||
![]() | SUSE-SU-2018:3591-2 Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3591-1 Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss | почти 7 лет назад | ||
ELSA-2018-3006 ELSA-2018-3006: firefox security update (CRITICAL) | почти 7 лет назад | |||
![]() | CVE-2018-12387 A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3. | CVSS3: 9.1 | 35% Средний | почти 7 лет назад |
![]() | CVE-2018-12387 A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3. | CVSS3: 8.8 | 35% Средний | почти 7 лет назад |
![]() | CVE-2018-12387 A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3. | CVSS3: 9.1 | 35% Средний | почти 7 лет назад |
CVE-2018-12387 A vulnerability where the JavaScript JIT compiler inlines Array.protot ... | CVSS3: 9.1 | 35% Средний | почти 7 лет назад | |
![]() | CVE-2018-12386 A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3. | CVSS3: 8.1 | 42% Средний | почти 7 лет назад |
![]() | CVE-2018-12386 A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3. | CVSS3: 8.8 | 42% Средний | почти 7 лет назад |
![]() | CVE-2018-12386 A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3. | CVSS3: 8.1 | 42% Средний | почти 7 лет назад |
CVE-2018-12386 A vulnerability in register allocation in JavaScript can lead to type ... | CVSS3: 8.1 | 42% Средний | почти 7 лет назад | |
GHSA-vfrp-p8qm-9m8x A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3. | CVSS3: 9.1 | 35% Средний | около 3 лет назад | |
GHSA-5vgc-hmw3-287j A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3. | CVSS3: 8.1 | 42% Средний | около 3 лет назад | |
![]() | BDU:2019-03415 Уязвимость реализации метода Array.prototype.push JIT-компилятора веб-браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.1 | 35% Средний | почти 7 лет назад |
![]() | BDU:2019-03414 Уязвимость веб-браузеров Firefox, Firefox ESR, связанная с ошибками преобразования типов данных, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.1 | 42% Средний | почти 7 лет назад |
Уязвимостей на страницу