CVE-2018-1000559 : Détail

CVE-2018-1000559

6.1
/
Moyen
Cross-site Scripting
A03-Injection
0.38%V4
Network
2018-06-26
14h00 +00:00
2018-06-26
13h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

qutebrowser version introduced in v0.11.0 (1179ee7a937fb31414d77d9970bac21095358449) contains a Cross Site Scripting (XSS) vulnerability in history command, qute://history page that can result in Via injected JavaScript code, a website can steal the user's browsing history. This attack appear to be exploitable via the victim must open a page with a specially crafted attribute, and then open the qute://history site via the :history command. This vulnerability appears to have been fixed in fixed in v1.3.3 (4c9360237f186681b1e3f2a0f30c45161cf405c7, to be released today) and v1.4.0 (5a7869f2feaa346853d2a85413d6527c87ef0d9f, released later this week). </div> </div> <div class="card card-flush py-4"> <div class="card-header"> <div class="card-title"> <h2>Informations du CVE</h2> </div> </div> <div class="card-body pt-0"> <h2 class="tw-h3">Faiblesses connexes</h2> <div class="table-responsive"> <table class="table table-striped gy-7 gs-7"> <thead> <tr class="fw-semibold fs-6 text-gray-800 border-bottom border-gray-200"> <th><nobr>CWE-ID</nobr></th> <th>Nom de la faiblesse</th> <th>Source</th> </tr> </thead> <tbody> <tr> <td><nobr><a href="/fr/cwe/cwe-79.html">CWE-79</a></nobr></td> <td><b>Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')</b><br>The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.</td> <td></td> </tr> </tbody> </table> </div> <div class="separator my-10"></div> <h3>Métriques</h3> <div class="table-responsive"> <table class="table table-striped gy-7 gs-7"> <thead> <tr class="fw-semibold fs-6 text-gray-800 border-bottom border-gray-200"> <th>Métriques</th> <th>Score</th> <th>Gravité</th> <th>CVSS Vecteur</th> <th>Source</th> </tr> </thead> <tbody> <tr> <td>V3.0</td> <td>6.1</td> <td>MEDIUM</td> <td> CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N <div class="m-0"> <div class="d-flex align-items-center collapsible toggle mb-0 collapsed" data-bs-toggle="collapse" data-bs-target="#metric-174693764319949" aria-expanded="false"> <div class="btn btn-sm btn-icon mw-20px btn-active-color-primary me-5"> <i class="ki-duotone ki-minus-square toggle-on text-primary fs-4"> <span class="path1"></span> <span class="path2"></span> </i> <i class="ki-duotone ki-plus-square toggle-off fs-4"> <span class="path1"></span> <span class="path2"></span> <span class="path3"></span> </i> </div> <span class="text-gray-700 cursor-pointer mb-0">More informations</span> </div> <div id="metric-174693764319949" class="fs-7 ms-1 collapse" style=""> <div class="mb-4"> <div class="d-flex align-items-center ps-10 mb-n1"> <div class="text-gray-600 fs-7"> <h4 style='background-color: white; border: 1px solid gray; padding: 5px;'>Base: Exploitabilty Metrics</h4><p>The Exploitability metrics reflect the characteristics of the thing that is vulnerable, which we refer to formally as the vulnerable component.</p><div class='tw-h5' style='padding-left:10px'>Attack Vector</div><p style='padding-left:10px'>This metric reflects the context by which vulnerability exploitation is possible.</p><div style='display:flex;padding-left:10px;'><div style='width:70px;'><p style='text-align: center;background-color: black;color:white;'>Network</p></div><div style='flex: 1;margin-left:5px;'><p>A vulnerability exploitable with network access means the vulnerable component is bound to the network stack and the attacker's path is through OSI layer 3 (the network layer). Such a vulnerability is often termed 'remotely exploitable' and can be thought of as an attack being exploitable one or more network hops away (e.g. across layer 3 boundaries from routers). </p></div></div><div class='tw-h5' style='padding-left:10px'>Attack Complexity</div><p style='padding-left:10px'>This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.</p><div style='display:flex;padding-left:10px;'><div style='width:70px;'><p style='text-align: center;background-color: black;color:white;'>Low</p></div><div style='flex: 1;margin-left:5px;'><p>Specialized access conditions or extenuating circumstances do not exist. An attacker can expect repeatable success against the vulnerable component.</p></div></div><div class='tw-h5' style='padding-left:10px'>Privileges Required</div><p style='padding-left:10px'>This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.</p><div style='display:flex;padding-left:10px;'><div style='width:70px;'><p style='text-align: center;background-color: black;color:white;'>None</p></div><div style='flex: 1;margin-left:5px;'><p>The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files to carry out an attack.</p></div></div><div class='tw-h5' style='padding-left:10px'>User Interaction</div><p style='padding-left:10px'>This metric captures the requirement for a user, other than the attacker, to participate in the successful compromise of the vulnerable component.</p><div style='display:flex;padding-left:10px;'><div style='width:70px;'><p style='text-align: center;background-color: black;color:white;'>Required</p></div><div style='flex: 1;margin-left:5px;'><p>Successful exploitation of this vulnerability requires a user to take some action before the vulnerability can be exploited. For example, a successful exploit may only be possible during the installation of an application by a system administrator.</p></div></div><h4 style='background-color: white; border: 1px solid gray; padding: 5px;'>Base: Scope Metrics</h4><p>An important property captured by CVSS v3.0 is the ability for a vulnerability in one software component to impact resources beyond its means, or privileges. </p><div class='tw-h5' style='padding-left:10px'>Scope</div><p style='padding-left:10px'>Formally, Scope refers to the collection of privileges defined by a computing authority (e.g. an application, an operating system, or a sandbox environment) when granting access to computing resources (e.g. files, CPU, memory, etc). These privileges are assigned based on some method of identification and authorization. In some cases, the authorization may be simple or loosely controlled based upon predefined rules or standards. For example, in the case of Ethernet traffic sent to a network switch, the switch accepts traffic that arrives on its ports and is an authority that controls the traffic flow to other switch ports.</p><div style='display:flex;padding-left:10px;'><div style='width:70px;'><p style='text-align: center;background-color: black;color:white;'>Changed</p></div><div style='flex: 1;margin-left:5px;'><p> An exploited vulnerability can affect resources beyond the authorization privileges intended by the vulnerable component. In this case the vulnerable component and the impacted component are different.</p></div></div><h4 style='background-color: white; border: 1px solid gray; padding: 5px;'>Base: Impact Metrics</h4><p>The Impact metrics refer to the properties of the impacted component. </p><div class='tw-h5' style='padding-left:10px'>Confidentiality Impact</div><p style='padding-left:10px'>This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability.</p><div style='display:flex;padding-left:10px;'><div style='width:70px;'><p style='text-align: center;background-color: black;color:white;'>Low</p></div><div style='flex: 1;margin-left:5px;'><p>There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is constrained. The information disclosure does not cause a direct, serious loss to the impacted component.</p></div></div><div class='tw-h5' style='padding-left:10px'>Integrity Impact</div><p style='padding-left:10px'>This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information.</p><div style='display:flex;padding-left:10px;'><div style='width:70px;'><p style='text-align: center;background-color: black;color:white;'>Low</p></div><div style='flex: 1;margin-left:5px;'><p>Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is constrained. The data modification does not have a direct, serious impact on the impacted component.</p></div></div><div class='tw-h5' style='padding-left:10px'>Availability Impact</div><p style='padding-left:10px'>This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability.</p><div style='display:flex;padding-left:10px;'><div style='width:70px;'><p style='text-align: center;background-color: black;color:white;'>None</p></div><div style='flex: 1;margin-left:5px;'><p>There is no impact to availability within the impacted component.</p></div></div><h4 style='background-color: white; border: 1px solid gray; padding: 5px;'>Temporal Metrics</h4><p>The Temporal metrics measure the current state of exploit techniques or code availability, the existence of any patches or workarounds, or the confidence that one has in the description of a vulnerability.</p><h4 style='background-color: white; border: 1px solid gray; padding: 5px;'>Environmental Metrics</h4><p></p> </div> </div> </div> </div> </div> </td> <td>nvd@nist.gov</td> </tr> <tr> <td>V2</td> <td>4.3</td> <td></td> <td> AV:N/AC:M/Au:N/C:N/I:P/A:N </td> <td>nvd@nist.gov</td> </tr> </tbody> </table> </div> <div class="separator my-10"></div> <h2>EPSS</h2> <div class="mb-4">EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.</div> <h3>Score EPSS</h3> <div>Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.</div> <div id="chartEpss"></div> <div style="text-align:center;"> <input type="button" class="" value="Voir le tableau des valeurs" onclick="$(document).ready(function() {$('#chartEpssBoard').slideToggle();});"> </div> <div id="chartEpssBoard" style="display: none;align-content: center;"> <br><table border="1" cellspacing="0" cellpadding="5" class="table table-bordered"><thead><tr><th>Date</th><th>EPSS V0</th><th>EPSS V1</th><th>EPSS V2<br>(> 2022-02-04)</th><th>EPSS V3<br>(> 2025-03-07)</th><th>EPSS V4<br>(> 2025-03-17)</th></tr></thead><tbody><tr><td>2021-04-18</td><td>0.88%</td><td>–</td><td>–</td><td>–</td><td>–</td></tr><tr><td>2021-09-05</td><td>–</td><td>0.88%</td><td>–</td><td>–</td><td>–</td></tr><tr><td>2021-10-17</td><td>–</td><td>0.88%</td><td>–</td><td>–</td><td>–</td></tr><tr><td>2022-01-09</td><td>–</td><td>0.88%</td><td>–</td><td>–</td><td>–</td></tr><tr><td>2022-02-06</td><td>–</td><td>–</td><td>0.95%</td><td>–</td><td>–</td></tr><tr><td>2022-02-13</td><td>–</td><td>–</td><td>0.95%</td><td>–</td><td>–</td></tr><tr><td>2022-04-03</td><td>–</td><td>–</td><td>0.95%</td><td>–</td><td>–</td></tr><tr><td>2022-06-19</td><td>–</td><td>–</td><td>0.95%</td><td>–</td><td>–</td></tr><tr><td>2022-09-04</td><td>–</td><td>–</td><td>0.95%</td><td>–</td><td>–</td></tr><tr><td>2022-12-25</td><td>–</td><td>–</td><td>0.95%</td><td>–</td><td>–</td></tr><tr><td>2023-03-12</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2023-05-14</td><td>–</td><td>–</td><td>–</td><td>0.12%</td><td>–</td></tr><tr><td>2023-06-25</td><td>–</td><td>–</td><td>–</td><td>0.13%</td><td>–</td></tr><tr><td>2023-07-09</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2023-09-10</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2024-02-11</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2024-06-02</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2024-06-23</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2024-08-04</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2024-08-11</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2024-11-17</td><td>–</td><td>–</td><td>–</td><td>0.09%</td><td>–</td></tr><tr><td>2024-12-22</td><td>–</td><td>–</td><td>–</td><td>0.12%</td><td>–</td></tr><tr><td>2025-03-02</td><td>–</td><td>–</td><td>–</td><td>0.12%</td><td>–</td></tr><tr><td>2025-01-19</td><td>–</td><td>–</td><td>–</td><td>0.12%</td><td>–</td></tr><tr><td>2025-03-09</td><td>–</td><td>–</td><td>–</td><td>0.12%</td><td>–</td></tr><tr><td>2025-03-18</td><td>–</td><td>–</td><td>–</td><td>–</td><td>0.39%</td></tr><tr><td>2025-03-30</td><td>–</td><td>–</td><td>–</td><td>–</td><td>0.39%</td></tr><tr><td>2025-04-11</td><td>–</td><td>–</td><td>–</td><td>–</td><td>0.38%</td></tr><tr><td>2025-04-15</td><td>–</td><td>–</td><td>–</td><td>–</td><td>0.38%</td></tr><tr><td>2025-04-22</td><td>–</td><td>–</td><td>–</td><td>–</td><td>0.38%</td></tr><tr><td>2025-04-22</td><td>–</td><td>–</td><td>–</td><td>–</td><td>0.38,%</td></tr></tbody></table> </div> <h3>Percentile EPSS</h3> <div>Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.</div> <div id="chartPercentile"></div> <div class="text-center"> <a href="https://www.first.org/epss/" target="_parent">EPSS First.org<i class="ki-duotone ki-exit-right-corner" style="font-size: 10px;vertical-align:8px"><span class="path1"></span><span class="path2"></span></i></a> </div> <div style="text-align:center;"> <input type="button" class="" value="Voir le tableau des valeurs" onclick="$(document).ready(function() {$('#chartPercentileBoard').slideToggle();});"> </div> <div id="chartPercentileBoard" style="display: none;align-content: center;"> <br><table border="1" cellspacing="0" cellpadding="5" class="table table-bordered"><thead><tr><th>Date</th><th>Percentile</th></tr></thead><tbody><tr><td>2021-04-18</td><td>–</td></tr><tr><td>2021-09-05</td><td>59%</td></tr><tr><td>2021-10-17</td><td>6%</td></tr><tr><td>2022-01-09</td><td>25%</td></tr><tr><td>2022-02-06</td><td>16%</td></tr><tr><td>2022-02-13</td><td>17%</td></tr><tr><td>2022-04-03</td><td>33%</td></tr><tr><td>2022-06-19</td><td>34%</td></tr><tr><td>2022-09-04</td><td>35%</td></tr><tr><td>2022-12-25</td><td>36%</td></tr><tr><td>2023-03-12</td><td>36%</td></tr><tr><td>2023-05-14</td><td>45%</td></tr><tr><td>2023-06-25</td><td>46%</td></tr><tr><td>2023-07-09</td><td>38%</td></tr><tr><td>2023-09-10</td><td>39%</td></tr><tr><td>2024-02-11</td><td>38%</td></tr><tr><td>2024-06-02</td><td>39%</td></tr><tr><td>2024-06-23</td><td>4%</td></tr><tr><td>2024-08-04</td><td>39%</td></tr><tr><td>2024-08-11</td><td>4%</td></tr><tr><td>2024-11-17</td><td>41%</td></tr><tr><td>2024-12-22</td><td>47%</td></tr><tr><td>2025-03-02</td><td>48%</td></tr><tr><td>2025-01-19</td><td>47%</td></tr><tr><td>2025-03-09</td><td>48%</td></tr><tr><td>2025-03-18</td><td>58%</td></tr><tr><td>2025-03-30</td><td>57%</td></tr><tr><td>2025-04-11</td><td>57%</td></tr><tr><td>2025-04-15</td><td>58%</td></tr><tr><td>2025-04-22</td><td>59%</td></tr><tr><td>2025-04-22</td><td>59%</td></tr></tbody></table> </div> <script> var optionsEpss = { chart: { fontFamily: 'inherit', type: 'area', height: 250 }, series: [ {name: 'EPSS V0',data: [0.88,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null]}, {name: 'EPSS V1',data: [null,0.88,0.88,0.88,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null]}, {name: 'EPSS V2',data: [null,null,null,null,0.95,0.95,0.95,0.95,0.95,0.95,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null]}, {name: 'EPSS V3',data: [null,null,null,null,null,null,null,null,null,null,0.09,0.12,0.13,0.09,0.09,0.09,0.09,0.09,0.09,0.09,0.09,0.12,0.12,0.12,0.12,null,null,null,null,null,null]}, {name: 'EPSS V4',data: [null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,0.39,0.39,0.38,0.38,0.38,0.38,]} ], xaxis: { categories: [1618704000000,1630800000000,1634428800000,1641686400000,1644105600000,1644710400000,1648944000000,1655596800000,1662249600000,1671926400000,1678579200000,1684022400000,1687651200000,1688860800000,1694304000000,1707609600000,1717293603000,1719108006000,1722736817000,1723341603000,1731812414000,1734836401000,1740884415000,1737292985000,1741527565000,1742305220000,1743338553000,1744336800000,1744682416000,1745287221000,1745287221000], type: 'datetime' }, stroke: { curve: 'straight', }, tooltip: { x: { format: 'yyyy-dd-MM' }, y: { formatter: function(value) { if (value!=null) return `${value}%`; } } }, dataLabels: { enabled: true, formatter: function (val, opts) { if (val!=null) return val + '%'; } } }; </script> <script> var optionsPercentile = { chart: { fontFamily: 'inherit', type: 'area', height: 250 }, series: [{ name: 'Percentile', data: [null,59,60,25,16,17,33,34,35,36,36,45,46,38,39,38,39,40,39,40,41,47,48,47,48,58,57,57,58,59,59] }], xaxis: { categories: [1618704000000,1630800000000,1634428800000,1641686400000,1644105600000,1644710400000,1648944000000,1655596800000,1662249600000,1671926400000,1678579200000,1684022400000,1687651200000,1688860800000,1694304000000,1707609600000,1717293603000,1719108006000,1722736817000,1723341603000,1731812414000,1734836401000,1740884415000,1737292985000,1741527565000,1742305220000,1743338553000,1744336800000,1744682416000,1745287221000,1745287221000], type: 'datetime' }, stroke: { curve: 'straight', }, tooltip: { x: { format: 'yyyy-dd-MM' }, y: { formatter: function(value) { if (value!=null) return `${value}%`; } } }, dataLabels: { enabled: true, formatter: function (val, opts) { if (val!=null) return val + '%'; } } }; </script> <div class="separator my-10"></div> <h2 class="tw-h3">Products Mentioned</h2> <h3 class='tw-h4'>Configuraton 0</h3><p>Qutebrowser>>Qutebrowser >> Version From (including) 0.11.0 To (excluding) 1.3.3<ul><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 0.11.0<a href='/fr/cpe/267438B1-D082-429F-A196-BDE429E0654B.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 0.11.1<a href='/fr/cpe/A9ECB1A8-9D1F-4F39-88FF-F6C84F1ADFF5.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.0.0<a href='/fr/cpe/1A34A7F0-B794-4720-BE58-1392DD974C84.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.0.1<a href='/fr/cpe/1E33AECD-8827-44F2-AC49-A96A72870BB2.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.0.2<a href='/fr/cpe/B19A958F-CBB3-4DF6-A936-B0E243E16908.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.0.3<a href='/fr/cpe/C05660C2-13D1-4EE8-B371-BBA9CBD83A3D.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.0.4<a href='/fr/cpe/86021224-4F98-4471-BD81-8BD2A7076D13.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.1.0<a href='/fr/cpe/51290FA9-A227-4B9A-BD81-4B217A93DFAD.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.1.1<a href='/fr/cpe/B2B9CC6E-673A-4080-89FB-1E440053FFF7.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.1.2<a href='/fr/cpe/E47B978A-8870-49F5-9DC6-F9D6F21CE451.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.2.0<a href='/fr/cpe/2460318C-82E5-4E8E-B72D-47D81A358389.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.2.1<a href='/fr/cpe/FED8E579-1C8C-4F4F-B270-A8AB4CDE38E9.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.3.0<a href='/fr/cpe/F633ED8D-CB20-4EA2-81BF-B8C055B3B217.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.3.1<a href='/fr/cpe/5F1CB55A-BE3C-4E1D-B875-1140193AF8F2.html'> (Open CPE detail)</a></li><li style='margin-left:20px;'>Qutebrowser>>Qutebrowser >> Version 1.3.2<a href='/fr/cpe/6BE6F1E6-E544-4406-8762-ECDE65EBCBF8.html'> (Open CPE detail)</a></li></ul></p> <div class="separator my-10"></div> <h2 class='tw-h3'>Références</h2><div style='margin-bottom: 10px;'><a href='https://github.com/qutebrowser/qutebrowser/commit/4c9360237f186681b1e3f2a0f30c45161cf405c7' target='_blank'>https://github.com/qutebrowser/qutebrowser/commit/4c9360237f186681b1e3f2a0f30c45161cf405c7 <i class="ki-duotone ki-exit-right-corner" style="font-size: 10px;vertical-align:8px"><span class="path1"></span><span class="path2"></span></i></a><br><span style='margin-left:20px;'>Tags : x_refsource_MISC</span></div><div style='margin-bottom: 10px;'><a href='https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f' target='_blank'>https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f <i class="ki-duotone ki-exit-right-corner" style="font-size: 10px;vertical-align:8px"><span class="path1"></span><span class="path2"></span></i></a><br><span style='margin-left:20px;'>Tags : x_refsource_MISC</span></div><div style='margin-bottom: 10px;'><a href='https://github.com/qutebrowser/qutebrowser/issues/4011' target='_blank'>https://github.com/qutebrowser/qutebrowser/issues/4011 <i class="ki-duotone ki-exit-right-corner" style="font-size: 10px;vertical-align:8px"><span class="path1"></span><span class="path2"></span></i></a><br><span style='margin-left:20px;'>Tags : x_refsource_MISC</span></div><div class="separator my-10"></div> </div> </div> </div> </div> </div> </div> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "NewsArticle", "headline": "Information about the CVE-2018-1000559 vulnerability.", "datePublished": "2018-06-26T14:00:00+00:00", "dateModified": "2018-06-26T13:57:01+00:00", "author": [{ "@type": "Organization", "name": "The MITRE Corporation", "url": "https://www.cve.org" },{ "@type": "Organization", "name": "CVE Find", "url": "https://www.cvefind.com" }] } </script> <!--end::Container--> <!--begin::Footer--> <div class="footer py-4 d-flex flex-lg-column" id="kt_footer"> <div class="container-xxl d-flex flex-column flex-md-row align-items-center justify-content-between"> <div class="text-gray-900 order-2 order-md-1"> <span class="text-muted fw-semibold me-1">2025©</span> <a href="https://www.tesweb.com" target="_blank" class="text-gray-800 text-hover-primary">tesweb SA</a>, <a href="https://www.bexxo.ch" target="_blank" class="text-gray-800 text-hover-primary">bexxo Cyber Security</a> </div> <ul class="menu menu-gray-600 menu-hover-primary fw-semibold order-1"> <li class="menu-item"> <a href="/fr/official.html" class="menu-link px-2">Database Partners</a> </li> <li class="menu-item"> <a href="/fr/gdpr.html" class="menu-link px-2">GDPR</a> </li> <li class="menu-item"> <a href="/fr/contact.html" class="menu-link px-2">Contact</a> </li> <li class="menu-item"> <a href="/fr/plan-price.html" class="menu-link px-2">Purchase</a> </li> <li class="menu-item"> <a href="https://www.linkedin.com/company/cve-find/" class="menu-link px-2" target="_blank"><img src="/media/social/linkedin.svg" width="40" height="40" alt="LinkedIn Account"/></a> </li> <li class="menu-item"> <a href="https://www.facebook.com/people/CVE-Find-Alert/61561116452093/" class="menu-link px-2" target="_blank"><img src="/media/social/facebook.svg" width="40" height="40" alt="Facebook Account"/></a> </li> <li class="menu-item"> <a href="https://x.com/cvefindcom" class="menu-link px-2" target="_blank"><img src="/media/social/twitter.svg" width="40" height="40" alt="Twitter Account"/></a> </li> </ul> </div> </div> <div class="footer py-4"> <div class="container-xxl align-items-center justify-content-between"> Les informations affichées sur CVE Find proviennent de plusieurs sources de référence rigoureusement sélectionnées. Les données CVE sont fournies par <a href="https://cve.mitre.org/" target="_blank">MITRE Corporation</a> et la <a href="https://nvd.nist.gov/" target="_blank">National Vulnerability Database (NVD)</a>. Le catalogue des vulnérabilités activement exploitées (KEV) provient de la <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank">Cybersecurity and Infrastructure Security Agency (CISA)</a>, tandis que les scores EPSS sont issus de <a href="https://www.first.org/epss/" target="_blank">FIRST.org</a>. Enfin, les données relatives aux faiblesses logicielles (CWE) et aux schémas d'attaque courants (CAPEC) sont maintenues par <a href="https://mitre.org/" target="_blank">MITRE Corporation</a>, et les informations sur les configurations logicielles et matérielles (CPE) proviennent du <a href="https://nvd.nist.gov/products/cpe" target="_blank">NVD</a>. </div> </div> </div> </div> </div> <!--begin::Javascript--> <script>var hostUrl = "assets/";</script> <!--begin::Global Javascript Bundle(mandatory for all pages)--> <script src="/plugins/global/plugins.bundle.js"></script> <script src="/js/scripts.bundle.js"></script> <!--end::Global Javascript Bundle--> <script src="/js/app/custom.min.js"></script> <script src="/js/app/base.fr.min.js"></script> <!--begin::Vendors Javascript(used for this page only)--> <script src='https://www.cvefind.com/plugins/custom/datatables/datatables.bundle.js'></script> <script src='https://www.cvefind.com/js/app/bloc/cve/epss.min.js'></script> <script src='https://www.cvefind.com/js/aceeditor/ace.js'></script> <script src='https://www.cvefind.com/js/app/bloc/cve/exploitdb.min.js'></script> <script src="/js/app/account/manageAlertNeedAccount.min.js"></script> <!--end::Custom Javascript--> <!-- Specific Page JS --> <!--end::Javascript--> </body> </html> <script src="/cdn-cgi/scripts/7d0fa10a/cloudflare-static/rocket-loader.min.js" data-cf-settings="070a23483cff37ffa9274e16-|49" defer></script>