Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-09-21 | CVE-2017-8277 | Use After Free vulnerability in Google Android In all Qualcomm products with Android releases from CAF using the Linux kernel, in the function msm_dba_register_client, if the client registers failed, it would be freed. | 7.8 |
2017-09-20 | CVE-2015-6673 | Use After Free vulnerability in Libpgf 6.11.42/6.12.24/6.14.12 Use-after-free vulnerability in Decoder.cpp in libpgf before 6.15.32. | 9.8 |
2017-09-20 | CVE-2015-3890 | Use After Free vulnerability in Litespeedtech Openlitespeed Use-after-free vulnerability in Open Litespeed before 1.3.10. | 7.5 |
2017-09-20 | CVE-2015-1329 | Use After Free vulnerability in Canonical Ubuntu Linux 14.04/15.04 Use-after-free vulnerability in oxide::qt::URLRequestDelegatedJob in oxide-qt in Ubuntu 15.04 and 14.04 LTS might allow remote attackers to execute arbitrary code. | 8.8 |
2017-09-18 | CVE-2017-9798 | Use After Free vulnerability in multiple products Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. | 7.5 |
2017-09-18 | CVE-2017-14528 | Use After Free vulnerability in multiple products The TIFFSetProfiles function in coders/tiff.c in ImageMagick 7.0.6 has incorrect expectations about whether LibTIFF TIFFGetField return values imply that data validation has occurred, which allows remote attackers to cause a denial of service (use-after-free after an invalid call to TIFFSetField, and application crash) via a crafted file. | 6.5 |
2017-09-07 | CVE-2017-12133 | Use After Free vulnerability in GNU Glibc Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path. | 5.9 |
2017-09-05 | CVE-2017-2821 | Use After Free vulnerability in Lexmark Perceptive Document Filters 11.3.0.2400/11.4.0.2452 An exploitable use-after-free exists in the PDF parsing functionality of Lexmark Perspective Document Filters 11.3.0.2400 and 11.4.0.2452. | 8.8 |
2017-09-05 | CVE-2017-2808 | Use After Free vulnerability in Ledger-Cli Ledger 3.1.1 An exploitable use-after-free vulnerability exists in the account parsing component of the Ledger-CLI 3.1.1. | 7.8 |
2017-09-01 | CVE-2017-14103 | Use After Free vulnerability in Graphicsmagick 1.3.26 The ReadJNGImage and ReadOneJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 do not properly manage image pointers after certain error conditions, which allows remote attackers to conduct use-after-free attacks via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call. | 8.8 |