CVE-2018-12265
- EPSS 0.73%
- Veröffentlicht 13.06.2018 11:29:00
- Zuletzt bearbeitet 21.11.2024 03:44:53
Exiv2 0.26 has an integer overflow in the LoaderExifJpeg class in preview.cpp, leading to an out-of-bounds read in Exiv2::MemIo::read in basicio.cpp.
- EPSS 0.03%
- Veröffentlicht 12.06.2018 16:29:00
- Zuletzt bearbeitet 21.11.2024 04:09:27
In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by s...
CVE-2018-0732
- EPSS 81.09%
- Veröffentlicht 12.06.2018 13:29:00
- Zuletzt bearbeitet 21.11.2024 03:38:49
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime result...
CVE-2018-12233
- EPSS 0.08%
- Veröffentlicht 12.06.2018 12:29:00
- Zuletzt bearbeitet 21.11.2024 03:44:49
In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered b...
CVE-2018-5175
- EPSS 0.57%
- Veröffentlicht 11.06.2018 21:29:16
- Zuletzt bearbeitet 21.11.2024 04:08:16
A mechanism to bypass Content Security Policy (CSP) protections on sites that have a "script-src" policy of "'strict-dynamic'". If a target website contains an HTML injection flaw an attacker could inject a reference to a copy of the "require.js" lib...
CVE-2018-5176
- EPSS 0.39%
- Veröffentlicht 11.06.2018 21:29:16
- Zuletzt bearbeitet 21.11.2024 04:08:16
The JSON Viewer displays clickable hyperlinks for strings that are parseable as URLs, including "javascript:" links. If a JSON file contains malicious JavaScript script embedded as "javascript:" links, users may be tricked into clicking and running t...
CVE-2018-5177
- EPSS 0.31%
- Veröffentlicht 11.06.2018 21:29:16
- Zuletzt bearbeitet 21.11.2024 04:08:16
A vulnerability exists in XSLT during number formatting where a negative buffer size may be allocated in some instances, leading to a buffer overflow and crash if it occurs. This vulnerability affects Firefox < 60.
CVE-2018-5178
- EPSS 18.16%
- Veröffentlicht 11.06.2018 21:29:16
- Zuletzt bearbeitet 25.11.2025 17:50:16
A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affec...
CVE-2018-5180
- EPSS 1.76%
- Veröffentlicht 11.06.2018 21:29:16
- Zuletzt bearbeitet 21.11.2024 04:08:16
A use-after-free vulnerability can occur during WebGL operations. While this results in a potentially exploitable crash, the vulnerability is limited because the memory is freed and reused in a brief window of time during the freeing of the same call...
CVE-2018-5181
- EPSS 1.26%
- Veröffentlicht 11.06.2018 21:29:16
- Zuletzt bearbeitet 21.11.2024 04:08:17
If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more rel...