Vulnerabilities > Canonical > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-06-11 | CVE-2018-5145 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products Memory safety bugs were reported in Firefox ESR 52.6. | 7.5 |
2018-06-11 | CVE-2018-5144 | Integer Overflow or Wraparound vulnerability in multiple products An integer overflow can occur during conversion of text to some Unicode character sets due to an unchecked length parameter. | 7.5 |
2018-06-11 | CVE-2018-5128 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur when manipulating elements, events, and selection ranges during editor operations. | 7.5 |
2018-06-11 | CVE-2018-5126 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products Memory safety bugs were reported in Firefox 58. | 7.5 |
2018-06-11 | CVE-2018-5122 | Integer Overflow or Wraparound vulnerability in multiple products A potential integer overflow in the "DoCrypt" function of WebCrypto was identified. | 7.5 |
2018-06-11 | CVE-2018-5116 | Origin Validation Error vulnerability in multiple products WebExtensions with the "ActiveTab" permission are able to access frames hosted within the active tab even if the frames are cross-origin. | 7.5 |
2018-06-11 | CVE-2018-5105 | WebExtensions can bypass user prompts to first save and then open an arbitrarily downloaded file. | 7.2 |
2018-06-11 | CVE-2018-5104 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur during font face manipulation when a font face is freed while still in use, resulting in a potentially exploitable crash. | 7.5 |
2018-06-11 | CVE-2018-5103 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur during mouse event handling due to issues with multiprocess support. | 7.5 |
2018-06-11 | CVE-2018-5102 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur when manipulating HTML media elements with media streams, resulting in a potentially exploitable crash. | 7.5 |