Vulnerabilities > Use After Free

DATE CVE VULNERABILITY TITLE RISK
2017-01-19 CVE-2016-5216 Use After Free vulnerability in Google Chrome
A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.
network
low complexity
google CWE-416
6.3
2017-01-19 CVE-2016-5215 Use After Free vulnerability in Google Chrome
A use after free in webaudio in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
network
low complexity
google CWE-416
6.3
2017-01-19 CVE-2016-5213 Use After Free vulnerability in Google Chrome
A use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google CWE-416
8.8
2017-01-19 CVE-2016-5211 Use After Free vulnerability in Google Chrome
A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
network
low complexity
google CWE-416
8.8
2017-01-19 CVE-2016-5203 Use After Free vulnerability in Google Chrome
A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
network
low complexity
google CWE-416
8.8
2017-01-18 CVE-2016-9678 Use After Free vulnerability in Citrix Provisioning Services
Use-after-free vulnerability in Citrix Provisioning Services before 7.12 allows attackers to execute arbitrary code via unspecified vectors.
network
low complexity
citrix CWE-416
critical
9.8
2017-01-18 CVE-2016-9584 Use After Free vulnerability in Libical Project Libical
libical allows remote attackers to cause a denial of service (use-after-free) and possibly read heap memory via a crafted ics file.
network
low complexity
libical-project CWE-416
critical
9.1
2017-01-18 CVE-2016-9279 Use After Free vulnerability in Samsung Exynos Fimg2D Driver
Use-after-free vulnerability in the Samsung Exynos fimg2d driver for Android with Exynos 5433, 54xx, or 7420 chipsets allows attackers to obtain sensitive information via unspecified vectors.
network
low complexity
samsung CWE-416
7.5
2017-01-18 CVE-2016-7906 Use After Free vulnerability in multiple products
magick/attribute.c in ImageMagick 7.0.3-2 allows remote attackers to cause a denial of service (use-after-free) via a crafted file.
local
low complexity
imagemagick debian CWE-416
5.5
2017-01-15 CVE-2017-2584 Use After Free vulnerability in Linux Kernel
arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.
local
low complexity
linux CWE-416
7.1