Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-01-26 | CVE-2023-0468 | Use After Free vulnerability in Linux Kernel A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcomponent in the Linux Kernel due to a race condition of poll_refs. | 4.7 |
2023-01-26 | CVE-2023-0469 | Use After Free vulnerability in Linux Kernel A use-after-free flaw was found in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent in the Linux Kernel during call cleanup. | 5.5 |
2023-01-26 | CVE-2023-20920 | Use After Free vulnerability in Google Android In queue of UsbRequest.java, there is a possible way to corrupt memory due to a use after free. | 7.8 |
2023-01-26 | CVE-2023-20925 | Use After Free vulnerability in Google Android In setUclampMinLocked of PowerSessionManager.cpp, there is a possible way to corrupt memory due to a use after free. | 7.8 |
2023-01-26 | CVE-2022-3094 | Use After Free vulnerability in ISC Bind Sending a flood of dynamic DNS updates may cause `named` to allocate large amounts of memory. | 7.5 |
2023-01-26 | CVE-2022-42374 | Use After Free vulnerability in Pdf-Xchange Editor This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. | 7.8 |
2023-01-26 | CVE-2022-42408 | Use After Free vulnerability in Pdf-Xchange Editor This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. | 5.5 |
2023-01-26 | CVE-2022-42414 | Use After Free vulnerability in Pdf-Xchange Editor This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. | 5.5 |
2023-01-20 | CVE-2021-33641 | Use After Free vulnerability in Openeuler Byacc When processing files, malloc stores the data of the current line. | 7.8 |
2023-01-20 | CVE-2022-45748 | Use After Free vulnerability in Assimp 5.1.4 An issue was discovered with assimp 5.1.4, a use after free occurred in function ColladaParser::ExtractDataObjectFromChannel in file /code/AssetLib/Collada/ColladaParser.cpp. | 8.8 |