Vulnerabilities > Redhat > Enterprise Linux Desktop > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-06-11 | CVE-2017-5456 | Incorrect Permission Assignment for Critical Resource vulnerability in multiple products A mechanism to bypass file system access protections in the sandbox using the file system request constructor through an IPC message. | 7.5 |
2018-06-11 | CVE-2017-5448 | Out-of-bounds Write vulnerability in multiple products An out-of-bounds write in "ClearKeyDecryptor" while decrypting some Clearkey-encrypted media content. | 7.5 |
2018-06-11 | CVE-2017-5446 | Out-of-bounds Read vulnerability in multiple products An out-of-bounds read when an HTTP/2 connection to a servers sends "DATA" frames with incorrect data content. | 7.5 |
2018-06-11 | CVE-2017-5443 | Out-of-bounds Write vulnerability in multiple products An out-of-bounds write vulnerability while decoding improperly formed BinHex format archives. | 7.5 |
2018-06-11 | CVE-2017-5442 | Use After Free vulnerability in multiple products A use-after-free vulnerability during changes in style when manipulating DOM elements. | 7.5 |
2018-06-11 | CVE-2017-5441 | Use After Free vulnerability in multiple products A use-after-free vulnerability when holding a selection during scroll events. | 7.5 |
2018-06-11 | CVE-2017-5440 | Use After Free vulnerability in multiple products A use-after-free vulnerability during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. | 7.5 |
2018-06-11 | CVE-2017-5439 | Use After Free vulnerability in multiple products A use-after-free vulnerability during XSLT processing due to poor handling of template parameters. | 7.5 |
2018-06-11 | CVE-2017-5438 | Use After Free vulnerability in multiple products A use-after-free vulnerability during XSLT processing due to the result handler being held by a freed handler during handling. | 7.5 |
2018-06-11 | CVE-2017-5435 | Use After Free vulnerability in multiple products A use-after-free vulnerability occurs during transaction processing in the editor during design mode interactions. | 7.5 |