Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-07-26 | CVE-2022-1636 | Use After Free vulnerability in Google Chrome Use after free in Performance APIs in Google Chrome prior to 101.0.4951.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-07-26 | CVE-2022-1639 | Use After Free vulnerability in Google Chrome Use after free in ANGLE in Google Chrome prior to 101.0.4951.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-07-26 | CVE-2022-1640 | Use After Free vulnerability in Google Chrome Use after free in Sharing in Google Chrome prior to 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2022-07-26 | CVE-2022-1641 | Use After Free vulnerability in Google Chrome Use after free in Web UI Diagnostics in Google Chrome on Chrome OS prior to 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific user interaction. | 8.8 |
2022-07-26 | CVE-2021-33453 | Use After Free vulnerability in Long Range ZIP Project Long Range ZIP 0.641 An issue was discovered in lrzip version 0.641. | 7.8 |
2022-07-26 | CVE-2021-33461 | Use After Free vulnerability in Tortall Yasm 1.3.0 An issue was discovered in yasm version 1.3.0. | 5.5 |
2022-07-26 | CVE-2021-33462 | Use After Free vulnerability in Tortall Yasm 1.3.0 An issue was discovered in yasm version 1.3.0. | 5.5 |
2022-07-26 | CVE-2021-33467 | Use After Free vulnerability in Tortall Yasm 1.3.0 An issue was discovered in yasm version 1.3.0. | 5.5 |
2022-07-26 | CVE-2021-33468 | Use After Free vulnerability in Tortall Yasm 1.3.0 An issue was discovered in yasm version 1.3.0. | 5.5 |
2022-07-25 | CVE-2022-1305 | Use After Free vulnerability in Google Chrome Use after free in storage in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |