Vulnerabilities > Use After Free

DATE CVE VULNERABILITY TITLE RISK
2022-08-18 CVE-2022-35164 Use After Free vulnerability in GNU Libredwg
LibreDWG v0.12.4.4608 & commit f2dea29 was discovered to contain a heap use-after-free via bit_copy_chain.
network
low complexity
gnu CWE-416
critical
9.8
2022-08-17 CVE-2022-36190 Use After Free vulnerability in Gpac
GPAC mp4box 2.1-DEV-revUNKNOWN-master has a use-after-free vulnerability in function gf_isom_dovi_config_get.
network
low complexity
gpac CWE-416
critical
9.8
2022-08-16 CVE-2022-36149 Use After Free vulnerability in Monostream Tifig 0.2.2
tifig v0.2.2 was discovered to contain a heap-use-after-free via temInfoEntry().
local
low complexity
monostream CWE-416
5.5
2022-08-12 CVE-2022-2603 Use After Free vulnerability in multiple products
Use after free in Omnibox in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google fedoraproject CWE-416
8.8
2022-08-12 CVE-2022-2604 Use After Free vulnerability in multiple products
Use after free in Safe Browsing in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google fedoraproject CWE-416
8.8
2022-08-12 CVE-2022-2606 Use After Free vulnerability in multiple products
Use after free in Managed devices API in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enable a specific Enterprise policy to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google fedoraproject CWE-416
8.8
2022-08-12 CVE-2022-2613 Use After Free vulnerability in multiple products
Use after free in Input in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific UI interactions.
network
low complexity
google fedoraproject CWE-416
8.8
2022-08-12 CVE-2022-2614 Use After Free vulnerability in multiple products
Use after free in Sign-In Flow in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google fedoraproject CWE-416
8.8
2022-08-12 CVE-2022-2621 Use After Free vulnerability in multiple products
Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.
network
low complexity
google fedoraproject CWE-416
8.8
2022-08-12 CVE-2021-29117 Use After Free vulnerability in Esri Arcreader
A use-after-free vulnerability when parsing a specially crafted file in Esri ArcReader 10.8.1 (and earlier) allows an unauthenticated attacker to achieve arbitrary code execution in the context of the current user.
local
low complexity
esri CWE-416
7.8