Vulnerabilities > Use After Free

DATE CVE VULNERABILITY TITLE RISK
2018-08-15 CVE-2018-8353 Use After Free vulnerability in Microsoft Internet Explorer 10/11/9
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10.
network
high complexity
microsoft CWE-416
7.5
2018-08-14 CVE-2018-14424 Use After Free vulnerability in Gnome Display Manager
The daemon in GDM through 3.29.1 does not properly unexport display objects from its D-Bus interface when they are destroyed, which allows a local attacker to trigger a use-after-free via a specially crafted sequence of D-Bus method calls, resulting in a denial of service or potential code execution.
local
low complexity
gnome CWE-416
7.8
2018-08-01 CVE-2018-3939 Use After Free vulnerability in Foxitsoftware Foxit Reader
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.1.0.5096.
network
low complexity
foxitsoftware CWE-416
8.8
2018-08-01 CVE-2018-3924 Use After Free vulnerability in Foxitsoftware Foxit Reader
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.5096.
local
low complexity
foxitsoftware CWE-416
7.8
2018-07-31 CVE-2018-14315 Use After Free vulnerability in Foxitsoftware Foxit Reader
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096.
network
low complexity
foxitsoftware CWE-416
8.8
2018-07-31 CVE-2018-14314 Use After Free vulnerability in Foxitsoftware Foxit Reader
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096.
network
low complexity
foxitsoftware CWE-416
8.8
2018-07-31 CVE-2018-14312 Use After Free vulnerability in Foxitsoftware Foxit Reader
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096.
network
low complexity
foxitsoftware CWE-416
8.8
2018-07-31 CVE-2018-14310 Use After Free vulnerability in Foxitsoftware Foxit Reader
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096.
network
low complexity
foxitsoftware CWE-416
8.8
2018-07-31 CVE-2018-14309 Use After Free vulnerability in Foxitsoftware Foxit Reader
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096.
network
low complexity
foxitsoftware CWE-416
8.8
2018-07-31 CVE-2018-14308 Use After Free vulnerability in Foxitsoftware Foxit Reader
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096.
network
low complexity
foxitsoftware CWE-416
8.8