Vulnerability & Exploit Database

Displaying all 9 entries

Results for: CVE-2018-5098 Back to search

Oracle Solaris 11: CVE-2018-5098: Vulnerability in Firefox, Thunderbird Vulnerability

  • Severity: 8
  • Published: February 22, 2018

A use-after-free vulnerability can occur when form input elements, focus, and selections are manipulated by script content. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.

Gentoo Linux: CVE-2018-5098: Mozilla Thunderbird: Multiple vulnerabilities Vulnerability

  • Severity: 8
  • Published: February 20, 2018

A use-after-free vulnerability can occur when form input elements, focus, and selections are manipulated by script content. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.

Ubuntu: (Multiple Advisories) (CVE-2018-5098): Thunderbird vulnerabilities Vulnerability

  • Severity: 8
  • Published: January 29, 2018

A use-after-free vulnerability can occur when form input elements, focus, and selections are manipulated by script content. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.

SUSE: CVE-2018-5098: SUSE Linux Security Advisory Vulnerability

  • Severity: 8
  • Published: January 29, 2018

A use-after-free vulnerability can occur when form input elements, focus, and selections are manipulated by script content. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.

CentOS: (CVE-2018-5098) (Multiple Advisories): thunderbird Vulnerability

  • Severity: 8
  • Published: January 29, 2018

A use-after-free vulnerability can occur when form input elements, focus, and selections are manipulated by script content. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.