Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-06-11 | CVE-2018-5096 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur while editing events in form elements on a page, resulting in a potentially exploitable crash. | 9.8 |
2018-06-11 | CVE-2018-5092 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur when the thread for a Web Worker is freed from memory prematurely instead of from memory in the main thread while cancelling fetch operations. | 9.8 |
2018-06-11 | CVE-2018-5091 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur during WebRTC connections when interacting with the DTMF timers. | 9.8 |
2018-06-11 | CVE-2017-7828 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur when flushing and resizing layout because the "PressShell" object has been freed while still in use. | 9.8 |
2018-06-11 | CVE-2017-7819 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur in design mode when image objects are resized if objects referenced during the resizing have been freed from memory. | 9.8 |
2018-06-11 | CVE-2017-7818 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur when manipulating arrays of Accessible Rich Internet Applications (ARIA) elements within containers through the DOM. | 9.8 |
2018-06-11 | CVE-2017-7809 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur when an editor DOM node is deleted prematurely during tree traversal while still bound to the document. | 9.8 |
2018-06-11 | CVE-2017-7806 | Use After Free vulnerability in Mozilla Firefox A use-after-free vulnerability can occur when the layer manager is freed too early when rendering specific SVG content, resulting in a potentially exploitable crash. | 7.5 |
2018-06-11 | CVE-2017-7805 | Use After Free vulnerability in multiple products During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. | 7.5 |
2018-06-11 | CVE-2017-7802 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur when manipulating the DOM during the resize event of an image element. | 9.8 |