Vulnerabilities > Use After Free
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-10-19 | CVE-2023-34366 | Use After Free vulnerability in Justsystems products A use-after-free vulnerability exists in the Figure stream parsing functionality of Ichitaro 2023 1.0.1.59372. | 7.8 |
2023-10-16 | CVE-2023-45898 | Use After Free vulnerability in Linux Kernel The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent. | 7.8 |
2023-10-11 | CVE-2023-5218 | Use After Free vulnerability in multiple products Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2023-10-11 | CVE-2023-5473 | Use After Free vulnerability in multiple products Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. | 6.3 |
2023-10-11 | CVE-2023-5476 | Use After Free vulnerability in multiple products Use after free in Blink History in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2023-10-11 | CVE-2023-35660 | Use After Free vulnerability in Google Android In lwis_transaction_client_cleanup of lwis_transaction.c, there is a possible way to corrupt memory due to a use after free. | 6.7 |
2023-10-11 | CVE-2023-44095 | Use After Free vulnerability in Huawei Emui and Harmonyos Use-After-Free (UAF) vulnerability in the surfaceflinger module.Successful exploitation of this vulnerability can cause system crash. | 7.5 |
2023-10-10 | CVE-2023-41675 | Use After Free vulnerability in Fortinet Fortios and Fortiproxy A use after free vulnerability [CWE-416] in FortiOS version 7.2.0 through 7.2.4 and version 7.0.0 through 7.0.10 and FortiProxy version 7.2.0 through 7.2.2 and version 7.0.0 through 7.0.8 may allow an unauthenticated remote attacker to crash the WAD process via multiple crafted packets reaching proxy policies or firewall policies with proxy mode alongside SSL deep packet inspection. | 5.3 |
2023-10-08 | CVE-2023-40632 | Use After Free vulnerability in Google Android 13.0 In jpg driver, there is a possible use after free due to a logic error. | 7.5 |
2023-10-06 | CVE-2023-45322 | Use After Free vulnerability in Xmlsoft Libxml2 libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. | 6.5 |