Vulnerabilities > Use After Free

DATE CVE VULNERABILITY TITLE RISK
2021-07-01 CVE-2021-36085 Use After Free vulnerability in multiple products
The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).
local
low complexity
selinux-project fedoraproject CWE-416
3.3
2021-07-01 CVE-2021-36086 Use After Free vulnerability in multiple products
The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).
local
low complexity
selinux-project fedoraproject CWE-416
3.3
2021-06-29 CVE-2021-31516 Use After Free vulnerability in Vector35 Binary Ninja 2.3.2660
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Vector 35 Binary Ninja 2.3.2660 (Build ID 88f343c3).
network
vector35 CWE-416
6.8
2021-06-29 CVE-2021-22545 Use After Free vulnerability in Google Bindiff
An attacker can craft a specific IdaPro *.i64 file that will cause the BinDiff plugin to load an invalid memory offset.
local
low complexity
google CWE-416
4.6
2021-06-29 CVE-2021-28691 Use After Free vulnerability in multiple products
Guest triggered use-after-free in Linux xen-netback A malicious or buggy network PV frontend can force Linux netback to disable the interface and terminate the receive kernel thread associated with queue 0 in response to the frontend sending a malformed packet.
local
low complexity
linux netapp CWE-416
4.6
2021-06-28 CVE-2021-28562 Use After Free vulnerability in Adobe Acrobat DC
Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by a Use After Free vulnerability when executing search queries through Javascript.
network
adobe CWE-416
6.8
2021-06-23 CVE-2021-27649 Use After Free vulnerability in Synology products
Use after free vulnerability in file transfer protocol component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via unspecified vectors.
network
low complexity
synology CWE-416
7.5
2021-06-22 CVE-2021-0606 Use After Free vulnerability in Google Android
In drm_syncobj_handle_to_fd of drm_syncobj.c, there is a possible use after free due to incorrect refcounting.
local
low complexity
google CWE-416
4.6
2021-06-22 CVE-2021-0535 Use After Free vulnerability in Google Android 11.0
In wpas_ctrl_msg_queue_timeout of ctrl_iface_unix.c, there is a possible memory corruption due to a use after free.
local
low complexity
google CWE-416
4.6
2021-06-22 CVE-2021-0564 Use After Free vulnerability in Google Android 11.0
In decrypt of CryptoPlugin.cpp, there is a possible use-after-free due to a race condition.
local
google CWE-416
4.4