Vulnerabilities > Use After Free

DATE CVE VULNERABILITY TITLE RISK
2023-05-16 CVE-2023-2722 Use After Free vulnerability in multiple products
Use after free in Autofill UI in Google Chrome on Android prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google debian fedoraproject CWE-416
8.8
2023-05-16 CVE-2023-2723 Use After Free vulnerability in multiple products
Use after free in DevTools in Google Chrome prior to 113.0.5672.126 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google debian fedoraproject CWE-416
8.8
2023-05-16 CVE-2023-2725 Use After Free vulnerability in multiple products
Use after free in Guest View in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google debian fedoraproject CWE-416
8.8
2023-05-12 CVE-2023-25006 Use After Free vulnerability in Autodesk 3DS MAX USD
A malicious actor may convince a user to open a malicious USD file that may trigger a use-after-free vulnerability which could result in code execution.
local
low complexity
autodesk CWE-416
7.8
2023-05-12 CVE-2023-2458 Use After Free vulnerability in Google Chrome
Use after free in ChromeOS Camera in Google Chrome on ChromeOS prior to 113.0.5672.114 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via UI interaction.
network
low complexity
google CWE-416
8.8
2023-05-10 CVE-2023-31566 Use After Free vulnerability in Podofo Project Podofo 0.10.0
Podofo v0.10.0 was discovered to contain a heap-use-after-free via the component PoDoFo::PdfEncrypt::IsMetadataEncrypted().
network
low complexity
podofo-project CWE-416
8.8
2023-05-10 CVE-2022-29919 Use After Free vulnerability in Intel Virtual Raid on CPU
Use after free in the Intel(R) VROC software before version 7.7.6.1003 may allow an authenticated user to potentially enable escalation of privilege via local access.
local
low complexity
intel CWE-416
7.8
2023-05-09 CVE-2023-29336 Use After Free vulnerability in Microsoft products
Win32k Elevation of Privilege Vulnerability
local
low complexity
microsoft CWE-416
7.8
2023-05-09 CVE-2023-31972 Use After Free vulnerability in Tortall Yasm 1.3.0
yasm v1.3.0 was discovered to contain a use after free via the function pp_getline at /nasm/nasm-pp.c.
local
low complexity
tortall CWE-416
5.5
2023-05-09 CVE-2023-31974 Use After Free vulnerability in Tortall Yasm 1.3.0
yasm v1.3.0 was discovered to contain a use after free via the function error at /nasm/nasm-pp.c.
local
low complexity
tortall CWE-416
5.5