Show filters
225 Total Results
Displaying 51-60 of 225
Sort by:
Attacker Value
Unknown

CVE-2018-12387

Disclosure Date: October 18, 2018 (last updated November 27, 2024)
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
0
Attacker Value
Unknown

CVE-2018-12370

Disclosure Date: October 18, 2018 (last updated November 27, 2024)
In Reader View SameSite cookie protections are not checked on exiting. This allows for a payload to be triggered when Reader View is exited if loaded by a malicious site while Reader mode is active, bypassing CSRF protections. This vulnerability affects Firefox < 61.
0
Attacker Value
Unknown

CVE-2018-12386

Disclosure Date: October 18, 2018 (last updated November 27, 2024)
A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
0
Attacker Value
Unknown

CVE-2018-12385

Disclosure Date: October 18, 2018 (last updated November 27, 2024)
A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used. This vulnerability affects Thunderbird < 60.2.1, Firefox ESR < 60.2.1, and Firefox < 62.0.2.
0
Attacker Value
Unknown

CVE-2018-5151

Disclosure Date: June 11, 2018 (last updated November 26, 2024)
Memory safety bugs were reported in Firefox 59. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 60.
0
Attacker Value
Unknown

CVE-2018-5158

Disclosure Date: June 11, 2018 (last updated November 26, 2024)
The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious JavaScript to be injected through a crafted PDF file. This JavaScript can then be run with the permissions of the PDF viewer by its worker. This vulnerability affects Firefox ESR < 52.8 and Firefox < 60.
0
Attacker Value
Unknown

CVE-2018-5143

Disclosure Date: June 11, 2018 (last updated November 26, 2024)
URLs using "javascript:" have the protocol removed when pasted into the addressbar to protect users from cross-site scripting (XSS) attacks, but if a tab character is embedded in the "javascript:" URL the protocol is not removed and the script will execute. This could allow users to be socially engineered to run an XSS attack against themselves. This vulnerability affects Firefox < 59.
0
Attacker Value
Unknown

CVE-2018-5130

Disclosure Date: June 11, 2018 (last updated November 26, 2024)
When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.
0
Attacker Value
Unknown

CVE-2018-5181

Disclosure Date: June 11, 2018 (last updated November 26, 2024)
If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.
0
Attacker Value
Unknown

CVE-2018-5097

Disclosure Date: June 11, 2018 (last updated November 26, 2024)
A use-after-free vulnerability can occur during XSL transformations when the source document for the transformation is manipulated by script content during the transformation. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
0