Vulnerabilities > Redhat > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-06-11 | CVE-2018-5154 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. | 9.8 |
2018-06-11 | CVE-2018-5150 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products Memory safety bugs were reported in Firefox 59, Firefox ESR 52.7, and Thunderbird 52.7. | 9.8 |
2018-06-11 | CVE-2018-5148 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur in the compositor during certain graphics operations when a raw pointer is used instead of a reference counted one. | 9.8 |
2018-06-11 | CVE-2018-5145 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products Memory safety bugs were reported in Firefox ESR 52.6. | 9.8 |
2018-06-11 | CVE-2018-5104 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur during font face manipulation when a font face is freed while still in use, resulting in a potentially exploitable crash. | 9.8 |
2018-06-11 | CVE-2018-5103 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur during mouse event handling due to issues with multiprocess support. | 9.8 |
2018-06-11 | CVE-2018-5102 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur when manipulating HTML media elements with media streams, resulting in a potentially exploitable crash. | 9.8 |
2018-06-11 | CVE-2018-5099 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur when the widget listener is holding strong references to browser objects that have previously been freed, resulting in a potentially exploitable crash when these references are used. | 9.8 |
2018-06-11 | CVE-2018-5098 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur when form input elements, focus, and selections are manipulated by script content. | 9.8 |
2018-06-11 | CVE-2018-5097 | Use After Free vulnerability in multiple products A use-after-free vulnerability can occur during XSL transformations when the source document for the transformation is manipulated by script content during the transformation. | 9.8 |