Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-08-18 | CVE-2022-35164 | Use After Free vulnerability in GNU Libredwg LibreDWG v0.12.4.4608 & commit f2dea29 was discovered to contain a heap use-after-free via bit_copy_chain. | 9.8 |
2022-08-17 | CVE-2022-36190 | Use After Free vulnerability in Gpac GPAC mp4box 2.1-DEV-revUNKNOWN-master has a use-after-free vulnerability in function gf_isom_dovi_config_get. | 9.8 |
2022-08-16 | CVE-2022-36149 | Use After Free vulnerability in Monostream Tifig 0.2.2 tifig v0.2.2 was discovered to contain a heap-use-after-free via temInfoEntry(). | 5.5 |
2022-08-12 | CVE-2022-2603 | Use After Free vulnerability in multiple products Use after free in Omnibox in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-08-12 | CVE-2022-2604 | Use After Free vulnerability in multiple products Use after free in Safe Browsing in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-08-12 | CVE-2022-2606 | Use After Free vulnerability in multiple products Use after free in Managed devices API in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enable a specific Enterprise policy to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-08-12 | CVE-2022-2613 | Use After Free vulnerability in multiple products Use after free in Input in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific UI interactions. | 8.8 |
2022-08-12 | CVE-2022-2614 | Use After Free vulnerability in multiple products Use after free in Sign-In Flow in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-08-12 | CVE-2022-2621 | Use After Free vulnerability in multiple products Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions. | 8.8 |
2022-08-12 | CVE-2021-29117 | Use After Free vulnerability in Esri Arcreader A use-after-free vulnerability when parsing a specially crafted file in Esri ArcReader 10.8.1 (and earlier) allows an unauthenticated attacker to achieve arbitrary code execution in the context of the current user. | 7.8 |