Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-08-22 | CVE-2022-38667 | Use After Free vulnerability in Crowcpp Crow HTTP applications (servers) based on Crow through 1.0+4 may allow a Use-After-Free and code execution when HTTP pipelining is used. | 9.8 |
2022-08-19 | CVE-2022-23459 | Use After Free vulnerability in Json++ Project Json++ 1.0.0/1.0.1 Jsonxx or Json++ is a JSON parser, writer and reader written in C++. | 9.8 |
2022-08-19 | CVE-2022-2889 | Use After Free vulnerability in multiple products Use After Free in GitHub repository vim/vim prior to 9.0.0225. | 7.8 |
2022-08-17 | CVE-2022-2862 | Use After Free vulnerability in multiple products Use After Free in GitHub repository vim/vim prior to 9.0.0221. | 7.8 |
2022-08-17 | CVE-2022-36190 | Use After Free vulnerability in Gpac GPAC mp4box 2.1-DEV-revUNKNOWN-master has a use-after-free vulnerability in function gf_isom_dovi_config_get. | 9.8 |
2022-08-15 | CVE-2022-2817 | Use After Free vulnerability in multiple products Use After Free in GitHub repository vim/vim prior to 9.0.0213. | 7.8 |
2022-08-12 | CVE-2022-2603 | Use After Free vulnerability in multiple products Use after free in Omnibox in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-08-12 | CVE-2022-2604 | Use After Free vulnerability in multiple products Use after free in Safe Browsing in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-08-12 | CVE-2022-2606 | Use After Free vulnerability in multiple products Use after free in Managed devices API in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enable a specific Enterprise policy to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-08-12 | CVE-2022-2613 | Use After Free vulnerability in multiple products Use after free in Input in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific UI interactions. | 8.8 |