Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-11-30 | CVE-2022-4191 | Use After Free vulnerability in Google Chrome Use after free in Sign-In in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via profile destruction. | 8.8 |
2022-11-30 | CVE-2022-4192 | Use After Free vulnerability in Google Chrome Use after free in Live Caption in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via UI interaction. | 8.8 |
2022-11-30 | CVE-2022-4194 | Use After Free vulnerability in Google Chrome Use after free in Accessibility in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-11-29 | CVE-2022-45343 | Use After Free vulnerability in Gpac GPAC v2.1-DEV-rev478-g696e6f868-master was discovered to contain a heap use-after-free via the Q_IsTypeOn function at /gpac/src/bifs/unquantize.c. | 7.8 |
2022-11-27 | CVE-2022-45919 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel through 6.0.10. | 7.0 |
2022-11-25 | CVE-2022-45884 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel through 6.0.9. | 7.0 |
2022-11-25 | CVE-2022-45885 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel through 6.0.9. | 7.0 |
2022-11-25 | CVE-2022-45886 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel through 6.0.9. | 7.0 |
2022-11-25 | CVE-2022-45888 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel through 6.0.9. | 6.4 |
2022-11-23 | CVE-2022-42896 | Use After Free vulnerability in Linux Kernel There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url | 8.8 |