Количество 13
Количество 13
CVE-2018-12387
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
CVE-2018-12387
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
CVE-2018-12387
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
CVE-2018-12387
A vulnerability where the JavaScript JIT compiler inlines Array.protot ...
GHSA-vfrp-p8qm-9m8x
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
BDU:2019-03415
Уязвимость реализации метода Array.prototype.push JIT-компилятора веб-браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код
openSUSE-SU-2018:2996-1
Security update for Mozilla Firefox
ELSA-2018-2884
ELSA-2018-2884: firefox security update (CRITICAL)
ELSA-2018-2881
ELSA-2018-2881: firefox security update (CRITICAL)
SUSE-SU-2018:3476-1
Security update for MozillaFirefox
SUSE-SU-2018:3591-2
Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss
SUSE-SU-2018:3591-1
Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss
ELSA-2018-3006
ELSA-2018-3006: firefox security update (CRITICAL)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-12387 A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3. | CVSS3: 9.1 | 34% Средний | около 7 лет назад | |
CVE-2018-12387 A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3. | CVSS3: 8.8 | 34% Средний | около 7 лет назад | |
CVE-2018-12387 A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3. | CVSS3: 9.1 | 34% Средний | около 7 лет назад | |
CVE-2018-12387 A vulnerability where the JavaScript JIT compiler inlines Array.protot ... | CVSS3: 9.1 | 34% Средний | около 7 лет назад | |
GHSA-vfrp-p8qm-9m8x A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3. | CVSS3: 9.1 | 34% Средний | больше 3 лет назад | |
BDU:2019-03415 Уязвимость реализации метода Array.prototype.push JIT-компилятора веб-браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.1 | 34% Средний | около 7 лет назад | |
openSUSE-SU-2018:2996-1 Security update for Mozilla Firefox | около 7 лет назад | |||
ELSA-2018-2884 ELSA-2018-2884: firefox security update (CRITICAL) | около 7 лет назад | |||
ELSA-2018-2881 ELSA-2018-2881: firefox security update (CRITICAL) | около 7 лет назад | |||
SUSE-SU-2018:3476-1 Security update for MozillaFirefox | около 7 лет назад | |||
SUSE-SU-2018:3591-2 Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss | почти 7 лет назад | |||
SUSE-SU-2018:3591-1 Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss | около 7 лет назад | |||
ELSA-2018-3006 ELSA-2018-3006: firefox security update (CRITICAL) | около 7 лет назад |
Уязвимостей на страницу