Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2018-10-02 CVE-2018-3962 Use After Free vulnerability in Foxitsoftware Phantompdf
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096.
local
low complexity
foxitsoftware CWE-416
7.3
2018-10-02 CVE-2018-3961 Use After Free vulnerability in Foxitsoftware Phantompdf
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096.
local
low complexity
foxitsoftware CWE-416
7.8
2018-10-02 CVE-2018-3960 Use After Free vulnerability in Foxitsoftware Phantompdf
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096.
local
low complexity
foxitsoftware CWE-416
7.8
2018-10-02 CVE-2018-3959 Use After Free vulnerability in Foxitsoftware Phantompdf
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096.
local
low complexity
foxitsoftware CWE-416
7.8
2018-10-02 CVE-2018-3958 Use After Free vulnerability in Foxitsoftware Phantompdf
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096.
local
low complexity
foxitsoftware CWE-416
7.8
2018-10-02 CVE-2018-3957 Use After Free vulnerability in Foxitsoftware Phantompdf
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096.
local
low complexity
foxitsoftware CWE-416
7.8
2018-10-02 CVE-2018-3944 Use After Free vulnerability in Foxitsoftware Phantompdf
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.1.0.5096.
network
low complexity
foxitsoftware CWE-416
8.8
2018-10-02 CVE-2018-3943 Use After Free vulnerability in Foxitsoftware Phantompdf
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.1.0.5096.
network
low complexity
foxitsoftware CWE-416
8.8
2018-10-02 CVE-2017-7908 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
A heap-based buffer overflow exists in the third-party product Gigasoft, v5 and prior, included in GE Communicator 3.15 and prior.
network
low complexity
gigasoft ge CWE-119
7.6
2018-10-02 CVE-2018-9515 Unspecified vulnerability in Google Android
In sdcardfs_create and sdcardfs_mkdir of inode.c, there is a possible memory corruption due to improper locking.
local
low complexity
google
7.8