Vulnerabilities > Use After Free

DATE CVE VULNERABILITY TITLE RISK
2018-05-17 CVE-2018-9951 Use After Free vulnerability in Foxitsoftware Phantompdf
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.
network
low complexity
foxitsoftware CWE-416
8.8
2018-05-17 CVE-2018-9945 Use After Free vulnerability in Foxitsoftware Phantompdf
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.
network
low complexity
foxitsoftware CWE-416
8.8
2018-05-17 CVE-2018-9944 Use After Free vulnerability in Foxitsoftware Phantompdf
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.
network
low complexity
foxitsoftware CWE-416
8.8
2018-05-17 CVE-2018-1180 Use After Free vulnerability in Foxitsoftware Phantompdf
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.
network
low complexity
foxitsoftware CWE-416
8.8
2018-05-17 CVE-2018-1178 Use After Free vulnerability in Foxitsoftware Phantompdf
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.
network
low complexity
foxitsoftware CWE-416
8.8
2018-05-17 CVE-2018-1177 Use After Free vulnerability in Foxitsoftware Phantompdf
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.
network
low complexity
foxitsoftware CWE-416
8.8
2018-05-17 CVE-2018-1173 Use After Free vulnerability in Foxitsoftware Phantompdf
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.
network
low complexity
foxitsoftware CWE-416
8.8
2018-05-17 CVE-2018-11230 Use After Free vulnerability in Jbig2Enc Project Jbig2Enc 0.29
jbig2_add_page in jbig2enc.cc in libjbig2enc.a in jbig2enc 0.29 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted file.
network
low complexity
jbig2enc-project CWE-416
8.8
2018-05-14 CVE-2018-8843 Use After Free vulnerability in Rockwellautomation Arena
Rockwell Automation Arena versions 15.10.00 and prior contains a use after free vulnerability caused by processing specially crafted Arena Simulation Software files that may cause the software application to crash, potentially losing any unsaved data..
local
low complexity
rockwellautomation CWE-416
5.5
2018-05-09 CVE-2018-0946 Use After Free vulnerability in Microsoft Chakracore and Edge
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore.
network
high complexity
microsoft CWE-416
7.5