Vulnerabilities (CVE)

CWE filter

CWE-416

Filter

1294 total CVE
CVE Vendors Products Updated CVSS
CVE-2019-2215 1 Google 1 Android 2019-10-16 4.6
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local...
CVE-2016-10906 1 Linux 1 Linux Kernel 2019-10-15 4.4
An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use-after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.
CVE-2018-9009 2 Libming, Debian 2 Libming, Debian Linux 2019-10-12 6.8
In libming 0.4.8, there is a use-after-free in the decompileJUMP function of the decompile.c file.
CVE-2019-6776 1 Foxitsoftware 2 Phantompdf, Reader 2019-10-11 6.8
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a...
CVE-2019-13317 1 Foxitsoftware 2 Phantompdf, Reader 2019-10-11 6.8
This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a...
CVE-2019-5047 1 Gonitro 1 Nitropdf 2019-10-11 6.8
An exploitable Use After Free vulnerability exists in the CharProcs parsing functionality of NitroPDF. A specially crafted PDF can cause a type confusion, resulting in a Use After Free. An attacker can craft a malicious PDF to trigger this vulnerability.
CVE-2019-6775 1 Foxitsoftware 2 Phantompdf, Reader 2019-10-09 6.8
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a...
CVE-2019-6774 1 Foxitsoftware 2 Phantompdf, Reader 2019-10-09 6.8
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a...
CVE-2019-6773 1 Foxitsoftware 2 Foxit Reader, Phantompdf 2019-10-09 4.3
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or...
CVE-2019-6772 1 Foxitsoftware 2 Foxit Reader, Phantompdf 2019-10-09 4.3
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 2019.010.20098. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or...
CVE-2019-6771 1 Foxitsoftware 2 Foxit Reader, Phantompdf 2019-10-09 4.3
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 2019.010.20098. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or...
CVE-2019-6770 1 Foxitsoftware 2 Foxit Reader, Phantompdf 2019-10-09 4.3
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or...
CVE-2019-6769 1 Foxitsoftware 2 Foxit Reader, Phantompdf 2019-10-09 6.8
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a...
CVE-2019-6768 1 Foxitsoftware 2 Foxit Reader, Phantompdf 2019-10-09 6.8
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a...
CVE-2019-6767 1 Foxitsoftware 2 Foxit Reader, Phantompdf 2019-10-09 6.8
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a...
CVE-2019-6766 1 Foxitsoftware 2 Foxit Reader, Phantompdf 2019-10-09 4.3
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or...
CVE-2019-6763 1 Foxitsoftware 2 Foxit Reader, Phantompdf 2019-10-09 6.8
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a...
CVE-2019-6762 1 Foxitsoftware 2 Foxit Reader, Phantompdf 2019-10-09 6.8
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a...
CVE-2019-6761 1 Foxitsoftware 2 Foxit Reader, Phantompdf 2019-10-09 6.8
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.0.16811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a...
CVE-2019-6758 1 Foxitsoftware 2 Foxit Reader, Phantompdf 2019-10-09 4.3
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.4.16811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open...