Логотип exploitDog
bind:CVE-2018-5163
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-5163

Количество 7

Количество 7

ubuntu логотип

CVE-2018-5163

больше 7 лет назад

If a malicious attacker has used another vulnerability to gain full control over a content process, they may be able to replace the alternate data resources stored in the JavaScript Start-up Bytecode Cache (JSBC) for other JavaScript code. If the parent process then runs this replaced code, the executed script would be run with the parent process' privileges, escaping the sandbox on content processes. This vulnerability affects Firefox < 60.

CVSS3: 8.1
EPSS: Низкий
redhat логотип

CVE-2018-5163

почти 8 лет назад

If a malicious attacker has used another vulnerability to gain full control over a content process, they may be able to replace the alternate data resources stored in the JavaScript Start-up Bytecode Cache (JSBC) for other JavaScript code. If the parent process then runs this replaced code, the executed script would be run with the parent process' privileges, escaping the sandbox on content processes. This vulnerability affects Firefox < 60.

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2018-5163

больше 7 лет назад

If a malicious attacker has used another vulnerability to gain full control over a content process, they may be able to replace the alternate data resources stored in the JavaScript Start-up Bytecode Cache (JSBC) for other JavaScript code. If the parent process then runs this replaced code, the executed script would be run with the parent process' privileges, escaping the sandbox on content processes. This vulnerability affects Firefox < 60.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2018-5163

больше 7 лет назад

If a malicious attacker has used another vulnerability to gain full co ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-647q-gc86-99gj

больше 3 лет назад

If a malicious attacker has used another vulnerability to gain full control over a content process, they may be able to replace the alternate data resources stored in the JavaScript Start-up Bytecode Cache (JSBC) for other JavaScript code. If the parent process then runs this replaced code, the executed script would be run with the parent process' privileges, escaping the sandbox on content processes. This vulnerability affects Firefox < 60.

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2019-03314

почти 8 лет назад

Уязвимость браузера Firefox ESR, связанная с ошибками управления привилегиями, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

CVSS3: 8.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2872-1

больше 6 лет назад

Security update for MozillaFirefox

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-5163

If a malicious attacker has used another vulnerability to gain full control over a content process, they may be able to replace the alternate data resources stored in the JavaScript Start-up Bytecode Cache (JSBC) for other JavaScript code. If the parent process then runs this replaced code, the executed script would be run with the parent process' privileges, escaping the sandbox on content processes. This vulnerability affects Firefox < 60.

CVSS3: 8.1
2%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-5163

If a malicious attacker has used another vulnerability to gain full control over a content process, they may be able to replace the alternate data resources stored in the JavaScript Start-up Bytecode Cache (JSBC) for other JavaScript code. If the parent process then runs this replaced code, the executed script would be run with the parent process' privileges, escaping the sandbox on content processes. This vulnerability affects Firefox < 60.

CVSS3: 8.1
2%
Низкий
почти 8 лет назад
nvd логотип
CVE-2018-5163

If a malicious attacker has used another vulnerability to gain full control over a content process, they may be able to replace the alternate data resources stored in the JavaScript Start-up Bytecode Cache (JSBC) for other JavaScript code. If the parent process then runs this replaced code, the executed script would be run with the parent process' privileges, escaping the sandbox on content processes. This vulnerability affects Firefox < 60.

CVSS3: 8.1
2%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-5163

If a malicious attacker has used another vulnerability to gain full co ...

CVSS3: 8.1
2%
Низкий
больше 7 лет назад
github логотип
GHSA-647q-gc86-99gj

If a malicious attacker has used another vulnerability to gain full control over a content process, they may be able to replace the alternate data resources stored in the JavaScript Start-up Bytecode Cache (JSBC) for other JavaScript code. If the parent process then runs this replaced code, the executed script would be run with the parent process' privileges, escaping the sandbox on content processes. This vulnerability affects Firefox < 60.

CVSS3: 8.1
2%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-03314

Уязвимость браузера Firefox ESR, связанная с ошибками управления привилегиями, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

CVSS3: 8.1
2%
Низкий
почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2019:2872-1

Security update for MozillaFirefox

больше 6 лет назад

Уязвимостей на страницу