CVE-2018-1000559 : Detail

CVE-2018-1000559

6.1
/
Medium
Cross-site Scripting
A03-Injection
0.38%V4
Network
2018-06-26
14h00 +00:00
2018-06-26
13h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

qutebrowser version introduced in v0.11.0 (1179ee7a937fb31414d77d9970bac21095358449) contains a Cross Site Scripting (XSS) vulnerability in history command, qute://history page that can result in Via injected JavaScript code, a website can steal the user's browsing history. This attack appear to be exploitable via the victim must open a page with a specially crafted attribute, and then open the qute://history site via the :history command. This vulnerability appears to have been fixed in fixed in v1.3.3 (4c9360237f186681b1e3f2a0f30c45161cf405c7, to be released today) and v1.4.0 (5a7869f2feaa346853d2a85413d6527c87ef0d9f, released later this week). </div> </div> <div class="card card-flush py-4"> <div class="card-header"> <div class="card-title"> <h2>CVE Informations</h2> </div> </div> <div class="card-body pt-0"> <h2 class="tw-h3">Related Weaknesses</h2> <div class="table-responsive"> <table class="table table-striped gy-7 gs-7"> <thead> <tr class="fw-semibold fs-6 text-gray-800 border-bottom border-gray-200"> <th><nobr>CWE-ID</nobr></th> <th>Weakness Name</th> <th>Source</th> </tr> </thead> <tbody> <tr> <td><nobr><a href="/en/cwe/cwe-79.html">CWE-79</a></nobr></td> <td><b>Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')</b><br>The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.</td> <td></td> </tr> </tbody> </table> </div> <div class="separator my-10"></div> <h3>Metrics</h3> <div class="table-responsive"> <table class="table table-striped gy-7 gs-7"> <thead> <tr class="fw-semibold fs-6 text-gray-800 border-bottom border-gray-200"> <th>Metrics</th> <th>Score</th> <th>Severity</th> <th>CVSS Vector</th> <th>Source</th> </tr> </thead> <tbody> <tr> <td>V3.0</td> <td>6.1</td> <td>MEDIUM</td> <td> CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N <div class="m-0"> <div class="d-flex align-items-center collapsible toggle mb-0 collapsed" data-bs-toggle="collapse" data-bs-target="#metric-174694598065567" aria-expanded="false"> <div class="btn btn-sm btn-icon mw-20px btn-active-color-primary me-5"> <i class="ki-duotone ki-minus-square toggle-on text-primary fs-4"> <span class="path1"></span> <span class="path2"></span> </i> <i class="ki-duotone ki-plus-square toggle-off fs-4"> <span class="path1"></span> <span class="path2"></span> <span class="path3"></span> </i> </div> <span class="text-gray-700 cursor-pointer mb-0">More informations</span> </div> <div id="metric-174694598065567" class="fs-7 ms-1 collapse" style=""> <div class="mb-4"> <div class="d-flex align-items-center ps-10 mb-n1"> <div class="text-gray-600 fs-7"> <h4 style='background-color: white; border: 1px solid gray; padding: 5px;'>Base: Exploitabilty Metrics</h4><p>The Exploitability metrics reflect the characteristics of the thing that is vulnerable, which we refer to formally as the vulnerable component.</p><div class='tw-h5' style='padding-left:10px'>Attack Vector</div><p style='padding-left:10px'>This metric reflects the context by which vulnerability exploitation is possible.</p><div style='display:flex;padding-left:10px;'><div style='width:70px;'><p style='text-align: center;background-color: black;color:white;'>Network</p></div><div style='flex: 1;margin-left:5px;'><p>A vulnerability exploitable with network access means the vulnerable component is bound to the network stack and the attacker's path is through OSI layer 3 (the network layer). Such a vulnerability is often termed 'remotely exploitable' and can be thought of as an attack being exploitable one or more network hops away (e.g. across layer 3 boundaries from routers). </p></div></div><div class='tw-h5' style='padding-left:10px'>Attack Complexity</div><p style='padding-left:10px'>This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.</p><div style='display:flex;padding-left:10px;'><div style='width:70px;'><p style='text-align: center;background-color: black;color:white;'>Low</p></div><div style='flex: 1;margin-left:5px;'><p>Specialized access conditions or extenuating circumstances do not exist. An attacker can expect repeatable success against the vulnerable component.</p></div></div><div class='tw-h5' style='padding-left:10px'>Privileges Required</div><p style='padding-left:10px'>This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.</p><div style='display:flex;padding-left:10px;'><div style='width:70px;'><p style='text-align: center;background-color: black;color:white;'>None</p></div><div style='flex: 1;margin-left:5px;'><p>The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files to carry out an attack.</p></div></div><div class='tw-h5' style='padding-left:10px'>User Interaction</div><p style='padding-left:10px'>This metric captures the requirement for a user, other than the attacker, to participate in the successful compromise of the vulnerable component.</p><div style='display:flex;padding-left:10px;'><div style='width:70px;'><p style='text-align: center;background-color: black;color:white;'>Required</p></div><div style='flex: 1;margin-left:5px;'><p>Successful exploitation of this vulnerability requires a user to take some action before the vulnerability can be exploited. For example, a successful exploit may only be possible during the installation of an application by a system administrator.</p></div></div><h4 style='background-color: white; border: 1px solid gray; padding: 5px;'>Base: Scope Metrics</h4><p>An important property captured by CVSS v3.0 is the ability for a vulnerability in one software component to impact resources beyond its means, or privileges. </p><div class='tw-h5' style='padding-left:10px'>Scope</div><p style='padding-left:10px'>Formally, Scope refers to the collection of privileges defined by a computing authority (e.g. an application, an operating system, or a sandbox environment) when granting access to computing resources (e.g. files, CPU, memory, etc). These privileges are assigned based on some method of identification and authorization. In some cases, the authorization may be simple or loosely controlled based upon predefined rules or standards. For example, in the case of Ethernet traffic sent to a network switch, the switch accepts traffic that arrives on its ports and is an authority that controls the traffic flow to other switch ports.</p><div style='display:flex;padding-left:10px;'><div style='width:70px;'><p style='text-align: center;background-color: black;color:white;'>Changed</p></div><div style='flex: 1;margin-left:5px;'><p> An exploited vulnerability can affect resources beyond the authorization privileges intended by the vulnerable component. In this case the vulnerable component and the impacted component are different.</p></div></div><h4 style='background-color: white; border: 1px solid gray; padding: 5px;'>Base: Impact Metrics</h4><p>The Impact metrics refer to the properties of the impacted component. </p><div class='tw-h5' style='padding-left:10px'>Confidentiality Impact</div><p style='padding-left:10px'>This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability.</p><div style='display:flex;padding-left:10px;'><div style='width:70px;'><p style='text-align: center;background-color: black;color:white;'>Low</p></div><div style='flex: 1;margin-left:5px;'><p>There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is constrained. The information disclosure does not cause a direct, serious loss to the impacted component.</p></div></div><div class='tw-h5' style='padding-left:10px'>Integrity Impact</div><p style='padding-left:10px'>This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information.</p><div style='display:flex;padding-left:10px;'><div style='width:70px;'><p style='text-align: center;background-color: black;color:white;'>Low</p></div><div style='flex: 1;margin-left:5px;'><p>Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is constrained. The data modification does not have a direct, serious impact on the impacted component.</p></div></div><div class='tw-h5' style='padding-left:10px'>Availability Impact</div><p style='padding-left:10px'>This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability.</p><div style='display:flex;padding-left:10px;'><div style='width:70px;'><p style='text-align: center;background-color: black;color:white;'>None</p></div><div style='flex: 1;margin-left:5px;'><p>There is no impact to availability within the impacted component.</p></div></div><h4 style='background-color: white; border: 1px solid gray; padding: 5px;'>Temporal Metrics</h4><p>The Temporal metrics measure the current state of exploit techniques or code availability, the existence of any patches or workarounds, or the confidence that one has in the description of a vulnerability.</p><h4 style='background-color: white; border: 1px solid gray; padding: 5px;'>Environmental Metrics</h4><p></p> </div> </div> </div> </div> </div> </td> <td>nvd@nist.gov</td> </tr> <tr> <td>V2</td> <td>4.3</td> <td></td> <td> AV:N/AC:M/Au:N/C:N/I:P/A:N </td> <td>nvd@nist.gov</td> </tr> </tbody> </table> </div> <div class="separator my-10"></div> <h2>EPSS</h2> <div class="mb-4">EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.</div> <h3>EPSS Score</h3> <div>The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.</div> <div id="chartEpss"></div> <div style="text-align:center;"> <input type="button" class="" value="See table of values" onclick="$(document).ready(function() {$('#chartEpssBoard').slideToggle();});"> </div> <div id="chartEpssBoard" style="display: none;align-content: center;"> <br><table border="1" cellspacing="0" cellpadding="5" class="table table-bordered"><thead><tr><th>Date</th><th>EPSS V0</th><th>EPSS V1</th><th>EPSS V2<br>(> 2022-02-04)</th><th>EPSS V3<br>(> 2025-03-07)</th><th>EPSS V4<br>(> 2025-03-17)</th></tr></thead><tbody><tr><td>2021-04-18</td><td>0.88%</td><td>–</td><td>–</td><td>–</td><td>–</td></tr><tr><td>2021-09-05</td><td>–</td><td>0.88%</td><td>–</td><td>–</td><td>–</td></tr><tr><td>2021-10-17</td><td>–</td><td>0.88%</td><td>–</td><td>–</td><td>–</td></tr><tr><td>2022-01-09</td><td>–</td><td>0.88%</td><td>–</td><td>–</td><td>–</td></tr><tr><td>2022-02-06</td><td>–</td><td>–</td><td>0.95%</td><td>–</td><td>–</td></tr><tr><td>2022-02-13</td><td>–</td><td>–</td><td>0.95%</td><td>–</td><td>–</td></tr><tr><td>2022-04-03</td><td>–</td><td>–</td><td>0.95%</td><td>–</td><td>–</td></tr><tr><td>2022-06-19</td><td>–</td><td>–</td><td>0.95%</td><td>–</td><td>–</td></tr><tr><td>2022-09-04</td><td>–</td><td>–</td><td>0.95%</td><td>–</td><td>–</td></tr><tr><td>2022-12-25</td><td>–</td><td>–</td><td>0.95%</td><td>–</td><td>–</td></tr><tr><td>2023-03-12</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2023-05-14</td><td>–</td><td>–</td><td>–</td><td>0.12%</td><td>–</td></tr><tr><td>2023-06-25</td><td>–</td><td>–</td><td>–</td><td>0.13%</td><td>–</td></tr><tr><td>2023-07-09</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2023-09-10</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2024-02-11</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2024-06-02</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2024-06-23</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2024-08-04</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2024-08-11</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2024-11-17</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2024-12-22</td><td>–</td><td>–</td><td>–</td><td>0.12%</td><td>–</td></tr><tr><td>2025-03-02</td><td>–</td><td>–</td><td>–</td><td>0.12%</td><td>–</td></tr><tr><td>2025-01-19</td><td>–</td><td>–</td><td>–</td><td>0.12%</td><td>–</td></tr><tr><td>2025-03-09</td><td>–</td><td>–</td><td>–</td><td>0.12%</td><td>–</td></tr><tr><td>2025-03-18</td><td>–</td><td>–</td><td>–</td><td>–</td><td>0.39%</td></tr><tr><td>2025-03-30</td><td>–</td><td>–</td><td>–</td><td>–</td><td>0.39%</td></tr><tr><td>2025-04-11</td><td>–</td><td>–</td><td>–</td><td>–</td><td>0.38%</td></tr><tr><td>2025-04-15</td><td>–</td><td>–</td><td>–</td><td>–</td><td>0.38%</td></tr><tr><td>2025-04-22</td><td>–</td><td>–</td><td>–</td><td>–</td><td>0.38%</td></tr><tr><td>2025-04-22</td><td>–</td><td>–</td><td>–</td><td>–</td><td>0.38,%</td></tr></tbody></table> </div> <h3>EPSS Percentile</h3> <div>The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.</div> <div id="chartPercentile"></div> <div class="text-center"> <a href="https://www.first.org/epss/" target="_parent">EPSS First.org<i class="ki-duotone ki-exit-right-corner" style="font-size: 10px;vertical-align:8px"><span class="path1"></span><span class="path2"></span></i></a> </div> <div style="text-align:center;"> <input type="button" class="" value="See table of values" onclick="$(document).ready(function() {$('#chartPercentileBoard').slideToggle();});"> </div> <div id="chartPercentileBoard" style="display: none;align-content: center;"> <br><table border="1" cellspacing="0" cellpadding="5" class="table table-bordered"><thead><tr><th>Date</th><th>Percentile</th></tr></thead><tbody><tr><td>2021-04-18</td><td>–</td></tr><tr><td>2021-09-05</td><td>59%</td></tr><tr><td>2021-10-17</td><td>6%</td></tr><tr><td>2022-01-09</td><td>25%</td></tr><tr><td>2022-02-06</td><td>16%</td></tr><tr><td>2022-02-13</td><td>17%</td></tr><tr><td>2022-04-03</td><td>33%</td></tr><tr><td>2022-06-19</td><td>34%</td></tr><tr><td>2022-09-04</td><td>35%</td></tr><tr><td>2022-12-25</td><td>36%</td></tr><tr><td>2023-03-12</td><td>36%</td></tr><tr><td>2023-05-14</td><td>45%</td></tr><tr><td>2023-06-25</td><td>46%</td></tr><tr><td>2023-07-09</td><td>38%</td></tr><tr><td>2023-09-10</td><td>39%</td></tr><tr><td>2024-02-11</td><td>38%</td></tr><tr><td>2024-06-02</td><td>39%</td></tr><tr><td>2024-06-23</td><td>4%</td></tr><tr><td>2024-08-04</td><td>39%</td></tr><tr><td>2024-08-11</td><td>4%</td></tr><tr><td>2024-11-17</td><td>41%</td></tr><tr><td>2024-12-22</td><td>47%</td></tr><tr><td>2025-03-02</td><td>48%</td></tr><tr><td>2025-01-19</td><td>47%</td></tr><tr><td>2025-03-09</td><td>48%</td></tr><tr><td>2025-03-18</td><td>58%</td></tr><tr><td>2025-03-30</td><td>57%</td></tr><tr><td>2025-04-11</td><td>57%</td></tr><tr><td>2025-04-15</td><td>58%</td></tr><tr><td>2025-04-22</td><td>59%</td></tr><tr><td>2025-04-22</td><td>59%</td></tr></tbody></table> </div> <script> var optionsEpss = { chart: { fontFamily: 'inherit', type: 'area', height: 250 }, series: [ {name: 'EPSS V0',data: [0.88,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null]}, {name: 'EPSS V1',data: [null,0.88,0.88,0.88,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null]}, {name: 'EPSS V2',data: [null,null,null,null,0.95,0.95,0.95,0.95,0.95,0.95,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null]}, {name: 'EPSS V3',data: [null,null,null,null,null,null,null,null,null,null,0.09,0.12,0.13,0.09,0.09,0.09,0.09,0.09,0.09,0.09,0.09,0.12,0.12,0.12,0.12,null,null,null,null,null,null]}, {name: 'EPSS V4',data: [null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,0.39,0.39,0.38,0.38,0.38,0.38,]} ], xaxis: { categories: [1618704000000,1630800000000,1634428800000,1641686400000,1644105600000,1644710400000,1648944000000,1655596800000,1662249600000,1671926400000,1678579200000,1684022400000,1687651200000,1688860800000,1694304000000,1707609600000,1717293603000,1719108006000,1722736817000,1723341603000,1731812414000,1734836401000,1740884415000,1737292985000,1741527565000,1742305220000,1743338553000,1744336800000,1744682416000,1745287221000,1745287221000], type: 'datetime' }, stroke: { curve: 'straight', }, tooltip: { x: { format: 'yyyy-dd-MM' }, y: { formatter: function(value) { if (value!=null) return `${value}%`; } } }, dataLabels: { enabled: true, formatter: function (val, opts) { if (val!=null) return val + '%'; } } }; </script> <script> var optionsPercentile = { chart: { fontFamily: 'inherit', type: 'area', height: 250 }, series: [{ name: 'Percentile', data: [null,59,60,25,16,17,33,34,35,36,36,45,46,38,39,38,39,40,39,40,41,47,48,47,48,58,57,57,58,59,59] }], xaxis: { categories: [1618704000000,1630800000000,1634428800000,1641686400000,1644105600000,1644710400000,1648944000000,1655596800000,1662249600000,1671926400000,1678579200000,1684022400000,1687651200000,1688860800000,1694304000000,1707609600000,1717293603000,1719108006000,1722736817000,1723341603000,1731812414000,1734836401000,1740884415000,1737292985000,1741527565000,1742305220000,1743338553000,1744336800000,1744682416000,1745287221000,1745287221000], type: 'datetime' }, stroke: { curve: 'straight', }, tooltip: { x: { format: 'yyyy-dd-MM' }, y: { formatter: function(value) { if (value!=null) return `${value}%`; } } }, dataLabels: { enabled: true, formatter: function (val, opts) { if (val!=null) return val + '%'; } } }; </script> <div class="separator my-10"></div> <h2 class="tw-h3">Products Mentioned</h2> <h3 class='tw-h4'>Configuraton 0</h3><p>Qutebrowser>>Qutebrowser >> Version From (including) 0.11.0 To (excluding) 1.3.3<ul><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 0.11.0<a href='/en/cpe/267438B1-D082-429F-A196-BDE429E0654B.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 0.11.1<a href='/en/cpe/A9ECB1A8-9D1F-4F39-88FF-F6C84F1ADFF5.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.0.0<a href='/en/cpe/1A34A7F0-B794-4720-BE58-1392DD974C84.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.0.1<a href='/en/cpe/1E33AECD-8827-44F2-AC49-A96A72870BB2.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.0.2<a href='/en/cpe/B19A958F-CBB3-4DF6-A936-B0E243E16908.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.0.3<a href='/en/cpe/C05660C2-13D1-4EE8-B371-BBA9CBD83A3D.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.0.4<a href='/en/cpe/86021224-4F98-4471-BD81-8BD2A7076D13.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.1.0<a href='/en/cpe/51290FA9-A227-4B9A-BD81-4B217A93DFAD.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.1.1<a href='/en/cpe/B2B9CC6E-673A-4080-89FB-1E440053FFF7.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.1.2<a href='/en/cpe/E47B978A-8870-49F5-9DC6-F9D6F21CE451.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.2.0<a href='/en/cpe/2460318C-82E5-4E8E-B72D-47D81A358389.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.2.1<a href='/en/cpe/FED8E579-1C8C-4F4F-B270-A8AB4CDE38E9.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.3.0<a href='/en/cpe/F633ED8D-CB20-4EA2-81BF-B8C055B3B217.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.3.1<a href='/en/cpe/5F1CB55A-BE3C-4E1D-B875-1140193AF8F2.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.3.2<a href='/en/cpe/6BE6F1E6-E544-4406-8762-ECDE65EBCBF8.html'> (Open CPE detail)</a></li></ul></p> <div class="separator my-10"></div> <h2 class='tw-h3'>References</h2><div style='margin-bottom: 10px;'><a href='https://github.com/qutebrowser/qutebrowser/commit/4c9360237f186681b1e3f2a0f30c45161cf405c7' target='_blank'>https://github.com/qutebrowser/qutebrowser/commit/4c9360237f186681b1e3f2a0f30c45161cf405c7 <i class="ki-duotone ki-exit-right-corner" style="font-size: 10px;vertical-align:8px"><span class="path1"></span><span class="path2"></span></i></a><br><span style='margin-left:20px;'>Tags : x_refsource_MISC</span></div><div style='margin-bottom: 10px;'><a href='https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f' target='_blank'>https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f <i class="ki-duotone ki-exit-right-corner" style="font-size: 10px;vertical-align:8px"><span class="path1"></span><span class="path2"></span></i></a><br><span style='margin-left:20px;'>Tags : x_refsource_MISC</span></div><div style='margin-bottom: 10px;'><a href='https://github.com/qutebrowser/qutebrowser/issues/4011' target='_blank'>https://github.com/qutebrowser/qutebrowser/issues/4011 <i class="ki-duotone ki-exit-right-corner" style="font-size: 10px;vertical-align:8px"><span class="path1"></span><span class="path2"></span></i></a><br><span style='margin-left:20px;'>Tags : x_refsource_MISC</span></div><div class="separator my-10"></div> </div> </div> </div> </div> </div> </div> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "NewsArticle", "headline": "Information about the CVE-2018-1000559 vulnerability.", "datePublished": "2018-06-26T14:00:00+00:00", "dateModified": "2018-06-26T13:57:01+00:00", "author": [{ "@type": "Organization", "name": "The MITRE Corporation", "url": "https://www.cve.org" },{ "@type": "Organization", "name": "CVE Find", "url": "https://www.cvefind.com" }] } </script> <!--end::Container--> <!--begin::Footer--> <div class="footer py-4 d-flex flex-lg-column" id="kt_footer"> <div class="container-xxl d-flex flex-column flex-md-row align-items-center justify-content-between"> <div class="text-gray-900 order-2 order-md-1"> <span class="text-muted fw-semibold me-1">2025©</span> <a href="https://www.tesweb.com" target="_blank" class="text-gray-800 text-hover-primary">tesweb SA</a>, <a href="https://www.bexxo.ch" target="_blank" class="text-gray-800 text-hover-primary">bexxo Cyber Security</a> </div> <ul class="menu menu-gray-600 menu-hover-primary fw-semibold order-1"> <li class="menu-item"> <a href="/en/official.html" class="menu-link px-2">Database Partners</a> </li> <li class="menu-item"> <a href="/en/gdpr.html" class="menu-link px-2">GDPR</a> </li> <li class="menu-item"> <a href="/en/contact.html" class="menu-link px-2">Contact</a> </li> <li class="menu-item"> <a href="/en/plan-price.html" class="menu-link px-2">Purchase</a> </li> <li class="menu-item"> <a href="https://www.linkedin.com/company/cve-find/" class="menu-link px-2" target="_blank"><img src="/media/social/linkedin.svg" width="40" height="40" alt="LinkedIn Account"/></a> </li> <li class="menu-item"> <a href="https://www.facebook.com/people/CVE-Find-Alert/61561116452093/" class="menu-link px-2" target="_blank"><img src="/media/social/facebook.svg" width="40" height="40" alt="Facebook Account"/></a> </li> <li class="menu-item"> <a href="https://x.com/cvefindcom" class="menu-link px-2" target="_blank"><img src="/media/social/twitter.svg" width="40" height="40" alt="Twitter Account"/></a> </li> </ul> </div> </div> <div class="footer py-4"> <div class="container-xxl align-items-center justify-content-between"> The information presented on CVE Find originates from several carefully selected reference sources. CVE data is provided by <a href="https://cve.mitre.org/" target="_blank">MITRE Corporation</a> and the <a href="https://nvd.nist.gov/" target="_blank">National Vulnerability Database (NVD)</a>. The Known Exploited Vulnerabilities (KEV) catalog is sourced from the <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank">Cybersecurity and Infrastructure Security Agency (CISA)</a>, while EPSS scores come from <a href="https://www.first.org/epss/" target="_blank">FIRST.org</a>. Additionally, data regarding software weaknesses (CWE) and common attack patterns (CAPEC) is maintained by <a href="https://mitre.org/" target="_blank">MITRE Corporation</a>, and information on hardware and software configurations (CPE) is provided by the <a href="https://nvd.nist.gov/products/cpe" target="_blank">NVD</a>. </div> </div> </div> </div> </div> <!--begin::Javascript--> <script>var hostUrl = "assets/";</script> <!--begin::Global Javascript Bundle(mandatory for all pages)--> <script src="/plugins/global/plugins.bundle.js"></script> <script src="/js/scripts.bundle.js"></script> <!--end::Global Javascript Bundle--> <script src="/js/app/custom.min.js"></script> <script src="/js/app/base.en.min.js"></script> <!--begin::Vendors Javascript(used for this page only)--> <script src='https://www.cvefind.com/plugins/custom/datatables/datatables.bundle.js'></script> <script src='https://www.cvefind.com/js/app/bloc/cve/epss.min.js'></script> <script src='https://www.cvefind.com/js/aceeditor/ace.js'></script> <script src='https://www.cvefind.com/js/app/bloc/cve/exploitdb.min.js'></script> <script src="/js/app/account/manageAlertNeedAccount.min.js"></script> <!--end::Custom Javascript--> <!-- Specific Page JS --> <!--end::Javascript--> </body> </html> <script src="/cdn-cgi/scripts/7d0fa10a/cloudflare-static/rocket-loader.min.js" data-cf-settings="307499f6aa4919636fb401d2-|49" defer></script>