296,843
Total vulnerabilities in the database
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
| Software | From | Fixed in | 
|---|---|---|
| redhat / enterprise_linux_desktop | 7.0 | 7.0.x | 
| redhat / enterprise_linux_workstation | 7.0 | 7.0.x | 
| redhat / enterprise_linux_server | 7.0 | 7.0.x | 
| redhat / enterprise_linux_desktop | 6.0 | 6.0.x | 
| redhat / enterprise_linux_server | 6.0 | 6.0.x | 
| redhat / enterprise_linux_workstation | 6.0 | 6.0.x | 
| redhat / enterprise_linux_server_eus | 7.5 | 7.5.x | 
| redhat / enterprise_linux_server_tus | 7.6 | 7.6.x | 
| redhat / enterprise_linux_server_eus | 7.6 | 7.6.x | 
| redhat / enterprise_linux_server_aus | 7.6 | 7.6.x | 
| debian / debian_linux | 9.0 | 9.0.x | 
| canonical / ubuntu_linux | 16.04 | 16.04.x | 
| canonical / ubuntu_linux | 14.04 | 14.04.x | 
| canonical / ubuntu_linux | 18.04 | 18.04.x | 
| mozilla / firefox | - | 62.0.3 | 
| mozilla / firefox_esr | - | 60.2.2 |