Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-05-17 | CVE-2018-9951 | Use After Free vulnerability in Foxitsoftware Phantompdf This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. | 8.8 |
2018-05-17 | CVE-2018-9945 | Use After Free vulnerability in Foxitsoftware Phantompdf This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. | 8.8 |
2018-05-17 | CVE-2018-9944 | Use After Free vulnerability in Foxitsoftware Phantompdf This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. | 8.8 |
2018-05-17 | CVE-2018-1180 | Use After Free vulnerability in Foxitsoftware Phantompdf This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. | 8.8 |
2018-05-17 | CVE-2018-1178 | Use After Free vulnerability in Foxitsoftware Phantompdf This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. | 8.8 |
2018-05-17 | CVE-2018-1177 | Use After Free vulnerability in Foxitsoftware Phantompdf This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. | 8.8 |
2018-05-17 | CVE-2018-1173 | Use After Free vulnerability in Foxitsoftware Phantompdf This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. | 8.8 |
2018-05-17 | CVE-2018-11230 | Use After Free vulnerability in Jbig2Enc Project Jbig2Enc 0.29 jbig2_add_page in jbig2enc.cc in libjbig2enc.a in jbig2enc 0.29 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted file. | 8.8 |
2018-05-14 | CVE-2018-8843 | Use After Free vulnerability in Rockwellautomation Arena Rockwell Automation Arena versions 15.10.00 and prior contains a use after free vulnerability caused by processing specially crafted Arena Simulation Software files that may cause the software application to crash, potentially losing any unsaved data.. | 5.5 |
2018-05-09 | CVE-2018-0946 | Use After Free vulnerability in Microsoft Chakracore and Edge A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. | 7.5 |