Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-05-08 | CVE-2023-27969 | Use After Free vulnerability in Apple products A use after free issue was addressed with improved memory management. | 7.8 |
2023-05-08 | CVE-2023-32233 | Use After Free vulnerability in multiple products In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. | 7.8 |
2023-05-05 | CVE-2023-32269 | Use After Free vulnerability in Linux Kernel An issue was discovered in the Linux kernel before 6.1.11. | 6.7 |
2023-05-03 | CVE-2020-22429 | Use After Free vulnerability in Redox-Os Redox 0.1.0 redox-os v0.1.0 was discovered to contain a use-after-free bug via the gethostbyaddr() function at /src/header/netdb/mod.rs. | 7.8 |
2023-05-03 | CVE-2023-2461 | Use After Free vulnerability in multiple products Use after free in OS Inputs in Google Chrome on ChromeOS prior to 113.0.5672.63 allowed a remote attacker who convinced a user to enage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. | 8.8 |
2023-05-02 | CVE-2022-33292 | Use After Free vulnerability in Qualcomm products Memory corruption in Qualcomm IPC due to use after free while receiving the incoming packet and reposting it. | 7.8 |
2023-05-01 | CVE-2023-2235 | Use After Free vulnerability in Linux Kernel A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation. The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability. We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2. | 7.8 |
2023-05-01 | CVE-2023-2236 | Use After Free vulnerability in multiple products A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability. We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4. | 7.8 |
2023-04-19 | CVE-2023-21096 | Use After Free vulnerability in Google Android 12.0/12.1/13.0 In OnWakelockReleased of attribution_processor.cc, there is a use after free that could lead to remote code execution with no additional execution privileges needed. | 9.8 |
2023-04-19 | CVE-2023-2162 | Use After Free vulnerability in Linux Kernel A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. | 5.5 |