Vulnerabilities > Use After Free

DATE CVE VULNERABILITY TITLE RISK
2022-02-08 CVE-2022-0520 Use After Free vulnerability in multiple products
Use After Free in NPM radare2.js prior to 5.6.2.
local
low complexity
radare fedoraproject CWE-416
7.8
2022-02-08 CVE-2022-0523 Use After Free vulnerability in multiple products
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.
local
low complexity
radare fedoraproject CWE-416
7.8
2022-02-08 CVE-2022-0139 Use After Free vulnerability in Radare Radare2
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0.
network
low complexity
radare CWE-416
7.5
2022-02-04 CVE-2021-40420 Use After Free vulnerability in Foxit PDF Reader 11.1.0.52543
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.1.0.52543.
network
foxit CWE-416
6.8
2022-02-04 CVE-2021-4154 Use After Free vulnerability in multiple products
A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser.
local
low complexity
linux redhat netapp CWE-416
8.8
2022-02-04 CVE-2022-0487 Use After Free vulnerability in multiple products
A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel.
local
low complexity
linux redhat debian CWE-416
2.1
2022-02-04 CVE-2022-23584 Use After Free vulnerability in Google Tensorflow
Tensorflow is an Open Source Machine Learning Framework.
network
low complexity
google CWE-416
4.0
2022-02-02 CVE-2022-0443 Use After Free vulnerability in multiple products
Use After Free in GitHub repository vim/vim prior to 8.2.
local
low complexity
vim fedoraproject debian CWE-416
7.8
2022-02-01 CVE-2022-23597 Use After Free vulnerability in Element Desktop
Element Desktop is a Matrix client for desktop platforms with Element Web at its core.
network
high complexity
element CWE-416
5.1
2022-02-01 CVE-2021-46669 Use After Free vulnerability in multiple products
MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.
network
low complexity
mariadb fedoraproject debian CWE-416
7.5