Vulnerabilities > Use After Free

DATE CVE VULNERABILITY TITLE RISK
2022-08-22 CVE-2022-38667 Use After Free vulnerability in Crowcpp Crow
HTTP applications (servers) based on Crow through 1.0+4 may allow a Use-After-Free and code execution when HTTP pipelining is used.
network
low complexity
crowcpp CWE-416
critical
9.8
2022-08-19 CVE-2022-23459 Use After Free vulnerability in Json++ Project Json++ 1.0.0/1.0.1
Jsonxx or Json++ is a JSON parser, writer and reader written in C++.
network
low complexity
json-project CWE-416
critical
9.8
2022-08-19 CVE-2022-2889 Use After Free vulnerability in multiple products
Use After Free in GitHub repository vim/vim prior to 9.0.0225.
local
low complexity
vim fedoraproject CWE-416
7.8
2022-08-17 CVE-2022-2862 Use After Free vulnerability in multiple products
Use After Free in GitHub repository vim/vim prior to 9.0.0221.
local
low complexity
vim fedoraproject CWE-416
7.8
2022-08-17 CVE-2022-36190 Use After Free vulnerability in Gpac
GPAC mp4box 2.1-DEV-revUNKNOWN-master has a use-after-free vulnerability in function gf_isom_dovi_config_get.
network
low complexity
gpac CWE-416
critical
9.8
2022-08-15 CVE-2022-2817 Use After Free vulnerability in multiple products
Use After Free in GitHub repository vim/vim prior to 9.0.0213.
local
low complexity
vim fedoraproject CWE-416
7.8
2022-08-12 CVE-2022-2603 Use After Free vulnerability in multiple products
Use after free in Omnibox in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google fedoraproject CWE-416
8.8
2022-08-12 CVE-2022-2604 Use After Free vulnerability in multiple products
Use after free in Safe Browsing in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google fedoraproject CWE-416
8.8
2022-08-12 CVE-2022-2606 Use After Free vulnerability in multiple products
Use after free in Managed devices API in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enable a specific Enterprise policy to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google fedoraproject CWE-416
8.8
2022-08-12 CVE-2022-2613 Use After Free vulnerability in multiple products
Use after free in Input in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific UI interactions.
network
low complexity
google fedoraproject CWE-416
8.8