Vulnerability & Exploit Database

Displaying entries 1 - 10 of 12 in total

Results for: CVE-2018-12387 Back to search

Oracle Solaris 11: CVE-2018-12387: Vulnerability in Firefox Vulnerability

  • Severity: 6
  • Published: October 18, 2018

A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox...

Huawei EulerOS: CVE-2018-12387: firefox security update Vulnerability

  • Severity: 6
  • Published: October 18, 2018

A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox...

Huawei EulerOS: CVE-2018-12387: firefox security update Vulnerability

  • Severity: 6
  • Published: October 18, 2018

A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox...

Red Hat: CVE-2018-12387: Critical: firefox security update (Multiple Advisories) Vulnerability

  • Severity: 6
  • Published: October 08, 2018

A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox...

Ubuntu: USN-3778-1 (CVE-2018-12387): Firefox vulnerabilities Vulnerability

  • Severity: 6
  • Published: October 02, 2018

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From USN-3778-1:

A crash was discovered in TransportSecurityInfo used for SSL, which could

be triggered by data stored in the local cache directory....

SUSE: CVE-2018-12387: SUSE Linux Security Advisory Vulnerability

  • Severity: 6
  • Published: October 02, 2018

A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox...

Oracle Linux: (CVE-2018-12387) ELSA-2018-3006: firefox security update Vulnerability

  • Severity: 6
  • Published: October 02, 2018

A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox...

MFSA2018-24 Firefox: Security vulnerabilities fixed in Firefox 62.0.3 and Firefox ESR 60.2.2 (CVE-2018-12387) Vulnerability

  • Severity: 6
  • Published: October 02, 2018

A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox...

Gentoo Linux: CVE-2018-12387: Mozilla Firefox: Multiple vulnerabilities Vulnerability

  • Severity: 6
  • Published: October 02, 2018

A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox...