Vulnerabilities > Redhat > Enterprise Linux Server AUS
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-06-11 | CVE-2017-5441 | Use After Free vulnerability in multiple products A use-after-free vulnerability when holding a selection during scroll events. | 9.8 |
2018-06-11 | CVE-2017-5440 | Use After Free vulnerability in multiple products A use-after-free vulnerability during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. | 9.8 |
2018-06-11 | CVE-2017-5439 | Use After Free vulnerability in multiple products A use-after-free vulnerability during XSLT processing due to poor handling of template parameters. | 9.8 |
2018-06-11 | CVE-2017-5438 | Use After Free vulnerability in multiple products A use-after-free vulnerability during XSLT processing due to the result handler being held by a freed handler during handling. | 9.8 |
2018-06-11 | CVE-2017-5436 | Out-of-bounds Write vulnerability in multiple products An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. | 8.8 |
2018-06-11 | CVE-2017-5435 | Use After Free vulnerability in multiple products A use-after-free vulnerability occurs during transaction processing in the editor during design mode interactions. | 9.8 |
2018-06-11 | CVE-2017-5433 | Use After Free vulnerability in multiple products A use-after-free vulnerability in SMIL animation functions occurs when pointers to animation elements in an array are dropped from the animation controller while still in use. | 9.8 |
2018-06-11 | CVE-2017-5432 | Use After Free vulnerability in multiple products A use-after-free vulnerability occurs during certain text input selection resulting in a potentially exploitable crash. | 9.8 |
2018-06-11 | CVE-2017-5428 | Integer Overflow or Wraparound vulnerability in multiple products An integer overflow in "createImageBitmap()" was reported through the Pwn2Own contest. | 9.8 |
2018-06-11 | CVE-2017-5410 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. | 9.8 |