Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-01-19 | CVE-2016-5216 | Use After Free vulnerability in Google Chrome A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file. | 6.3 |
2017-01-19 | CVE-2016-5215 | Use After Free vulnerability in Google Chrome A use after free in webaudio in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. | 6.3 |
2017-01-19 | CVE-2016-5213 | Use After Free vulnerability in Google Chrome A use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2017-01-19 | CVE-2016-5211 | Use After Free vulnerability in Google Chrome A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. | 8.8 |
2017-01-19 | CVE-2016-5203 | Use After Free vulnerability in Google Chrome A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. | 8.8 |
2017-01-18 | CVE-2016-9678 | Use After Free vulnerability in Citrix Provisioning Services Use-after-free vulnerability in Citrix Provisioning Services before 7.12 allows attackers to execute arbitrary code via unspecified vectors. | 9.8 |
2017-01-18 | CVE-2016-9584 | Use After Free vulnerability in Libical Project Libical libical allows remote attackers to cause a denial of service (use-after-free) and possibly read heap memory via a crafted ics file. | 9.1 |
2017-01-18 | CVE-2016-9279 | Use After Free vulnerability in Samsung Exynos Fimg2D Driver Use-after-free vulnerability in the Samsung Exynos fimg2d driver for Android with Exynos 5433, 54xx, or 7420 chipsets allows attackers to obtain sensitive information via unspecified vectors. | 7.5 |
2017-01-18 | CVE-2016-7906 | Use After Free vulnerability in multiple products magick/attribute.c in ImageMagick 7.0.3-2 allows remote attackers to cause a denial of service (use-after-free) via a crafted file. | 5.5 |
2017-01-15 | CVE-2017-2584 | Use After Free vulnerability in Linux Kernel arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt. | 7.1 |