Vulnerabilities > Use After Free

DATE CVE VULNERABILITY TITLE RISK
2017-09-21 CVE-2017-8277 Use After Free vulnerability in Google Android
In all Qualcomm products with Android releases from CAF using the Linux kernel, in the function msm_dba_register_client, if the client registers failed, it would be freed.
local
low complexity
google CWE-416
7.8
2017-09-20 CVE-2015-6673 Use After Free vulnerability in Libpgf 6.11.42/6.12.24/6.14.12
Use-after-free vulnerability in Decoder.cpp in libpgf before 6.15.32.
network
low complexity
libpgf CWE-416
critical
9.8
2017-09-20 CVE-2015-3890 Use After Free vulnerability in Litespeedtech Openlitespeed
Use-after-free vulnerability in Open Litespeed before 1.3.10.
network
low complexity
litespeedtech CWE-416
7.5
2017-09-20 CVE-2015-1329 Use After Free vulnerability in Canonical Ubuntu Linux 14.04/15.04
Use-after-free vulnerability in oxide::qt::URLRequestDelegatedJob in oxide-qt in Ubuntu 15.04 and 14.04 LTS might allow remote attackers to execute arbitrary code.
network
low complexity
canonical CWE-416
8.8
2017-09-18 CVE-2017-9798 Use After Free vulnerability in multiple products
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed.
network
low complexity
apache debian CWE-416
7.5
2017-09-18 CVE-2017-14528 Use After Free vulnerability in multiple products
The TIFFSetProfiles function in coders/tiff.c in ImageMagick 7.0.6 has incorrect expectations about whether LibTIFF TIFFGetField return values imply that data validation has occurred, which allows remote attackers to cause a denial of service (use-after-free after an invalid call to TIFFSetField, and application crash) via a crafted file.
network
low complexity
imagemagick debian CWE-416
6.5
2017-09-07 CVE-2017-12133 Use After Free vulnerability in GNU Glibc
Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.
network
high complexity
gnu CWE-416
5.9
2017-09-05 CVE-2017-2821 Use After Free vulnerability in Lexmark Perceptive Document Filters 11.3.0.2400/11.4.0.2452
An exploitable use-after-free exists in the PDF parsing functionality of Lexmark Perspective Document Filters 11.3.0.2400 and 11.4.0.2452.
network
low complexity
lexmark CWE-416
8.8
2017-09-05 CVE-2017-2808 Use After Free vulnerability in Ledger-Cli Ledger 3.1.1
An exploitable use-after-free vulnerability exists in the account parsing component of the Ledger-CLI 3.1.1.
local
low complexity
ledger-cli CWE-416
7.8
2017-09-01 CVE-2017-14103 Use After Free vulnerability in Graphicsmagick 1.3.26
The ReadJNGImage and ReadOneJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 do not properly manage image pointers after certain error conditions, which allows remote attackers to conduct use-after-free attacks via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call.
network
low complexity
graphicsmagick CWE-416
8.8