Vulnerabilities > Use After Free

DATE CVE VULNERABILITY TITLE RISK
2022-11-08 CVE-2022-20447 Use After Free vulnerability in Google Android 13.0
In PAN_WriteBuf of pan_api.cc, there is a possible out of bounds read due to a use after free.
low complexity
google CWE-416
6.5
2022-11-08 CVE-2022-32607 Use After Free vulnerability in Google Android 11.0/12.0
In aee, there is a possible use after free due to a missing bounds check.
local
low complexity
google CWE-416
6.7
2022-11-08 CVE-2022-41663 Use After Free vulnerability in Siemens Jt2Go and Teamcenter Visualization
A vulnerability has been identified in JT2Go (All versions < V14.1.0.4), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.7), Teamcenter Visualization V14.0 (All versions < V14.0.0.3), Teamcenter Visualization V14.1 (All versions < V14.1.0.4).
local
low complexity
siemens CWE-416
7.8
2022-11-01 CVE-2022-3654 Use After Free vulnerability in Google Chrome
Use after free in Layout in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google CWE-416
8.8
2022-11-01 CVE-2022-3657 Use After Free vulnerability in Google Chrome
Use after free in Extensions in Google Chrome prior to 107.0.5304.62 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
network
low complexity
google CWE-416
8.8
2022-11-01 CVE-2022-3658 Use After Free vulnerability in Google Chrome
Use after free in Feedback service on Chrome OS in Google Chrome on Chrome OS prior to 107.0.5304.62 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interaction.
network
low complexity
google CWE-416
8.8
2022-11-01 CVE-2022-3659 Use After Free vulnerability in Google Chrome
Use after free in Accessibility in Google Chrome on Chrome OS prior to 107.0.5304.62 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific UI interactions.
network
low complexity
google CWE-416
8.8
2022-11-01 CVE-2022-26709 Use After Free vulnerability in Apple products
A use after free issue was addressed with improved memory management.
network
low complexity
apple CWE-416
8.8
2022-11-01 CVE-2022-26710 Use After Free vulnerability in Apple products
A use after free issue was addressed with improved memory management.
network
low complexity
apple CWE-416
8.8
2022-11-01 CVE-2022-26717 Use After Free vulnerability in Apple products
A use after free issue was addressed with improved memory management.
network
low complexity
apple CWE-416
8.8