Show filters
492 Total Results
Displaying 51-60 of 492
Sort by:
Attacker Value
Unknown
CVE-2018-12265
Disclosure Date: June 13, 2018 (last updated November 26, 2024)
Exiv2 0.26 has an integer overflow in the LoaderExifJpeg class in preview.cpp, leading to an out-of-bounds read in Exiv2::MemIo::read in basicio.cpp.
0
Attacker Value
Unknown
CVE-2018-12264
Disclosure Date: June 13, 2018 (last updated November 26, 2024)
Exiv2 0.26 has integer overflows in LoaderTiff::getData() in preview.cpp, leading to an out-of-bounds read in Exiv2::ValueType::setDataArea in value.hpp.
0
Attacker Value
Unknown
CVE-2018-0732
Disclosure Date: June 12, 2018 (last updated November 08, 2023)
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
0
Attacker Value
Unknown
CVE-2018-5151
Disclosure Date: June 11, 2018 (last updated November 26, 2024)
Memory safety bugs were reported in Firefox 59. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 60.
0
Attacker Value
Unknown
CVE-2018-5158
Disclosure Date: June 11, 2018 (last updated November 26, 2024)
The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious JavaScript to be injected through a crafted PDF file. This JavaScript can then be run with the permissions of the PDF viewer by its worker. This vulnerability affects Firefox ESR < 52.8 and Firefox < 60.
0
Attacker Value
Unknown
CVE-2018-5143
Disclosure Date: June 11, 2018 (last updated November 26, 2024)
URLs using "javascript:" have the protocol removed when pasted into the addressbar to protect users from cross-site scripting (XSS) attacks, but if a tab character is embedded in the "javascript:" URL the protocol is not removed and the script will execute. This could allow users to be socially engineered to run an XSS attack against themselves. This vulnerability affects Firefox < 59.
0
Attacker Value
Unknown
CVE-2018-5130
Disclosure Date: June 11, 2018 (last updated November 26, 2024)
When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.
0
Attacker Value
Unknown
CVE-2018-5181
Disclosure Date: June 11, 2018 (last updated November 26, 2024)
If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.
0
Attacker Value
Unknown
CVE-2018-5097
Disclosure Date: June 11, 2018 (last updated November 26, 2024)
A use-after-free vulnerability can occur during XSL transformations when the source document for the transformation is manipulated by script content during the transformation. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
0
Attacker Value
Unknown
CVE-2018-5128
Disclosure Date: June 11, 2018 (last updated November 26, 2024)
A use-after-free vulnerability can occur when manipulating elements, events, and selection ranges during editor operations. This results in a potentially exploitable crash. This vulnerability affects Firefox < 59.
0