Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-11-08 | CVE-2023-5996 | Use After Free vulnerability in multiple products Use after free in WebAudio in Google Chrome prior to 119.0.6045.123 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2023-11-08 | CVE-2023-46768 | Use After Free vulnerability in Huawei Emui and Harmonyos Multi-thread vulnerability in the idmap module. | 7.5 |
2023-11-08 | CVE-2023-46769 | Use After Free vulnerability in Huawei Emui and Harmonyos Use-After-Free (UAF) vulnerability in the dubai module. | 7.5 |
2023-11-07 | CVE-2023-4295 | Use After Free vulnerability in ARM Mali GPU Kernel Driver and Valhall GPU Kernel Driver A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory. | 7.8 |
2023-11-03 | CVE-2023-47233 | Use After Free vulnerability in Linux Kernel The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. | 4.3 |
2023-11-03 | CVE-2023-1476 | Use After Free vulnerability in multiple products A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. | 7.0 |
2023-11-01 | CVE-2023-1192 | Use After Free vulnerability in multiple products A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. | 6.5 |
2023-11-01 | CVE-2023-1193 | Use After Free vulnerability in Linux Kernel A use-after-free flaw was found in setup_async_work in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. | 6.5 |
2023-11-01 | CVE-2023-5852 | Use After Free vulnerability in multiple products Use after free in Printing in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. | 8.8 |
2023-11-01 | CVE-2023-5854 | Use After Free vulnerability in multiple products Use after free in Profiles in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. | 8.8 |