Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-02-08 | CVE-2022-0520 | Use After Free vulnerability in multiple products Use After Free in NPM radare2.js prior to 5.6.2. | 7.8 |
2022-02-08 | CVE-2022-0523 | Use After Free vulnerability in multiple products Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2. | 7.8 |
2022-02-08 | CVE-2022-0139 | Use After Free vulnerability in Radare Radare2 Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0. | 7.5 |
2022-02-04 | CVE-2021-40420 | Use After Free vulnerability in Foxit PDF Reader 11.1.0.52543 A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.1.0.52543. | 6.8 |
2022-02-04 | CVE-2021-4154 | Use After Free vulnerability in multiple products A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. | 8.8 |
2022-02-04 | CVE-2022-0487 | Use After Free vulnerability in multiple products A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. | 2.1 |
2022-02-04 | CVE-2022-23584 | Use After Free vulnerability in Google Tensorflow Tensorflow is an Open Source Machine Learning Framework. | 4.0 |
2022-02-02 | CVE-2022-0443 | Use After Free vulnerability in multiple products Use After Free in GitHub repository vim/vim prior to 8.2. | 7.8 |
2022-02-01 | CVE-2022-23597 | Use After Free vulnerability in Element Desktop Element Desktop is a Matrix client for desktop platforms with Element Web at its core. | 5.1 |
2022-02-01 | CVE-2021-46669 | Use After Free vulnerability in multiple products MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used. | 7.5 |