

#CVE-2018-5144: Integer overflow during Unicode conversion Reporter Root Object Impact moderate DescriptionĪn integer overflow can occur during conversion of text to some Unicode character sets due to an unchecked length parameter. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing.

Under certain circumstances the fetch() API can return transient local copies of resources that were sent with a no-store or no-cache cache header instead of downloading a copy from the network as it should. #CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources Reporter Ben Kelly Impact moderate Description When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered. #CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption Reporter Tony Paloma Impact high Description

This can potentially allow for sandbox escape through memory corruption in the parent process. #CVE-2018-5129: Out-of-bounds write with malformed IPC messages Reporter James Grant Impact high DescriptionĪ lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This results in a potentially exploitable crash. #CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList Reporter Nils Impact high DescriptionĪ buffer overflow can occur when manipulating the SVG animatedPathSegList through script. Mozilla Foundation Security Advisory 2018-07 Security vulnerabilities fixed in Firefox ESR 52.7 Announced MaImpact critical Products Firefox ESR Fixed in
