Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-uvuc-b1rh-pkaq |
| Summary | Mozilla developers and community members Christian Holler, Looben Yang, Jesse Ruderman, Sebastian Hengst, Nicolas Grunbaum, and Gary Kwong reported memory safety bugs present in Firefox 61. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. |
| Aliases |
|
| Fixed_packages |
|
| Affected_packages |
|
| References |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12375 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66382 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66421 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66447 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66418 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66466 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.6648 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.665 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66487 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66456 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66491 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66508 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66493 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12375 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
120 |
| name |
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
| description |
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow. |
|
|
| Exploits |
|
| Severity_range_score | 8.8 - 10.0 |
| Exploitability | null |
| Weighted_severity | null |
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-uvuc-b1rh-pkaq |