Show filters
492 Total Results
Displaying 51-60 of 492
Sort by:
Attacker Value
Unknown

CVE-2018-12265

Disclosure Date: June 13, 2018 (last updated November 26, 2024)
Exiv2 0.26 has an integer overflow in the LoaderExifJpeg class in preview.cpp, leading to an out-of-bounds read in Exiv2::MemIo::read in basicio.cpp.
0
Attacker Value
Unknown

CVE-2018-12264

Disclosure Date: June 13, 2018 (last updated November 26, 2024)
Exiv2 0.26 has integer overflows in LoaderTiff::getData() in preview.cpp, leading to an out-of-bounds read in Exiv2::ValueType::setDataArea in value.hpp.
0
Attacker Value
Unknown

CVE-2018-0732

Disclosure Date: June 12, 2018 (last updated November 08, 2023)
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
Attacker Value
Unknown

CVE-2018-5151

Disclosure Date: June 11, 2018 (last updated November 26, 2024)
Memory safety bugs were reported in Firefox 59. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 60.
0
Attacker Value
Unknown

CVE-2018-5158

Disclosure Date: June 11, 2018 (last updated November 26, 2024)
The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious JavaScript to be injected through a crafted PDF file. This JavaScript can then be run with the permissions of the PDF viewer by its worker. This vulnerability affects Firefox ESR < 52.8 and Firefox < 60.
0
Attacker Value
Unknown

CVE-2018-5143

Disclosure Date: June 11, 2018 (last updated November 26, 2024)
URLs using "javascript:" have the protocol removed when pasted into the addressbar to protect users from cross-site scripting (XSS) attacks, but if a tab character is embedded in the "javascript:" URL the protocol is not removed and the script will execute. This could allow users to be socially engineered to run an XSS attack against themselves. This vulnerability affects Firefox < 59.
0
Attacker Value
Unknown

CVE-2018-5130

Disclosure Date: June 11, 2018 (last updated November 26, 2024)
When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.
0
Attacker Value
Unknown

CVE-2018-5181

Disclosure Date: June 11, 2018 (last updated November 26, 2024)
If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.
0
Attacker Value
Unknown

CVE-2018-5097

Disclosure Date: June 11, 2018 (last updated November 26, 2024)
A use-after-free vulnerability can occur during XSL transformations when the source document for the transformation is manipulated by script content during the transformation. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
0
Attacker Value
Unknown

CVE-2018-5128

Disclosure Date: June 11, 2018 (last updated November 26, 2024)
A use-after-free vulnerability can occur when manipulating elements, events, and selection ranges during editor operations. This results in a potentially exploitable crash. This vulnerability affects Firefox < 59.
0