Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-12-20 | CVE-2017-14836 | Use After Free vulnerability in Foxitsoftware Foxit Reader 8.3.1 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1. | 8.8 |
2017-12-20 | CVE-2017-14834 | Use After Free vulnerability in Foxitsoftware Foxit Reader 8.3.1.21155 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. | 8.8 |
2017-12-20 | CVE-2017-14833 | Use After Free vulnerability in Foxitsoftware Foxit Reader 8.3.1.21155 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. | 8.8 |
2017-12-20 | CVE-2017-14832 | Use After Free vulnerability in Foxitsoftware Foxit Reader 8.3.1.21155 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. | 8.8 |
2017-12-20 | CVE-2017-14831 | Use After Free vulnerability in Foxitsoftware Foxit Reader 8.3.1.21155 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. | 8.8 |
2017-12-20 | CVE-2017-10959 | Use After Free vulnerability in Foxitsoftware Foxit Reader 8.3.1.21155 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. | 8.8 |
2017-12-20 | CVE-2017-10958 | Use After Free vulnerability in Foxitsoftware Foxit Reader 8.3.1.21155 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. | 8.8 |
2017-12-20 | CVE-2017-10957 | Use After Free vulnerability in Foxitsoftware Foxit Reader 8.3.1.21155 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. | 8.8 |
2017-12-15 | CVE-2017-17670 | Use After Free vulnerability in multiple products In VideoLAN VLC media player through 2.2.8, there is a type conversion vulnerability in modules/demux/mp4/libmp4.c in the MP4 demux module leading to a invalid free, because the type of a box may be changed between a read operation and a free operation. | 8.8 |
2017-12-13 | CVE-2017-1635 | Use After Free vulnerability in IBM Tivoli Monitoring IBM Tivoli Monitoring V6 6.2.2.x could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free error. | 8.0 |