Количество 13
Количество 13

CVE-2018-12387
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.

CVE-2018-12387
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.

CVE-2018-12387
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
CVE-2018-12387
A vulnerability where the JavaScript JIT compiler inlines Array.protot ...
GHSA-vfrp-p8qm-9m8x
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.

BDU:2019-03415
Уязвимость реализации метода Array.prototype.push JIT-компилятора веб-браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код

openSUSE-SU-2018:2996-1
Security update for Mozilla Firefox
ELSA-2018-2884
ELSA-2018-2884: firefox security update (CRITICAL)
ELSA-2018-2881
ELSA-2018-2881: firefox security update (CRITICAL)

SUSE-SU-2018:3476-1
Security update for MozillaFirefox

SUSE-SU-2018:3591-2
Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss

SUSE-SU-2018:3591-1
Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss
ELSA-2018-3006
ELSA-2018-3006: firefox security update (CRITICAL)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2018-12387 A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3. | CVSS3: 9.1 | 35% Средний | почти 7 лет назад |
![]() | CVE-2018-12387 A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3. | CVSS3: 8.8 | 35% Средний | почти 7 лет назад |
![]() | CVE-2018-12387 A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3. | CVSS3: 9.1 | 35% Средний | почти 7 лет назад |
CVE-2018-12387 A vulnerability where the JavaScript JIT compiler inlines Array.protot ... | CVSS3: 9.1 | 35% Средний | почти 7 лет назад | |
GHSA-vfrp-p8qm-9m8x A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3. | CVSS3: 9.1 | 35% Средний | около 3 лет назад | |
![]() | BDU:2019-03415 Уязвимость реализации метода Array.prototype.push JIT-компилятора веб-браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.1 | 35% Средний | почти 7 лет назад |
![]() | openSUSE-SU-2018:2996-1 Security update for Mozilla Firefox | почти 7 лет назад | ||
ELSA-2018-2884 ELSA-2018-2884: firefox security update (CRITICAL) | почти 7 лет назад | |||
ELSA-2018-2881 ELSA-2018-2881: firefox security update (CRITICAL) | почти 7 лет назад | |||
![]() | SUSE-SU-2018:3476-1 Security update for MozillaFirefox | почти 7 лет назад | ||
![]() | SUSE-SU-2018:3591-2 Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3591-1 Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss | почти 7 лет назад | ||
ELSA-2018-3006 ELSA-2018-3006: firefox security update (CRITICAL) | почти 7 лет назад |
Уязвимостей на страницу