Vulnerabilities > Use After Free

DATE CVE VULNERABILITY TITLE RISK
2022-11-30 CVE-2022-4191 Use After Free vulnerability in Google Chrome
Use after free in Sign-In in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via profile destruction.
network
low complexity
google CWE-416
8.8
2022-11-30 CVE-2022-4192 Use After Free vulnerability in Google Chrome
Use after free in Live Caption in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via UI interaction.
network
low complexity
google CWE-416
8.8
2022-11-30 CVE-2022-4194 Use After Free vulnerability in Google Chrome
Use after free in Accessibility in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google CWE-416
8.8
2022-11-29 CVE-2022-45343 Use After Free vulnerability in Gpac
GPAC v2.1-DEV-rev478-g696e6f868-master was discovered to contain a heap use-after-free via the Q_IsTypeOn function at /gpac/src/bifs/unquantize.c.
local
low complexity
gpac CWE-416
7.8
2022-11-27 CVE-2022-45919 Use After Free vulnerability in multiple products
An issue was discovered in the Linux kernel through 6.0.10.
local
high complexity
linux netapp CWE-416
7.0
2022-11-25 CVE-2022-45884 Use After Free vulnerability in multiple products
An issue was discovered in the Linux kernel through 6.0.9.
local
high complexity
linux netapp CWE-416
7.0
2022-11-25 CVE-2022-45885 Use After Free vulnerability in multiple products
An issue was discovered in the Linux kernel through 6.0.9.
local
high complexity
linux netapp CWE-416
7.0
2022-11-25 CVE-2022-45886 Use After Free vulnerability in multiple products
An issue was discovered in the Linux kernel through 6.0.9.
local
high complexity
linux netapp CWE-416
7.0
2022-11-25 CVE-2022-45888 Use After Free vulnerability in multiple products
An issue was discovered in the Linux kernel through 6.0.9.
high complexity
linux netapp CWE-416
6.4
2022-11-23 CVE-2022-42896 Use After Free vulnerability in Linux Kernel
There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit  https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url
low complexity
linux CWE-416
8.8