Vulnerabilities (CVE)

Filtered by CWE-416
Total 5654 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-0216 2 Fedoraproject, Qemu 2 Fedora, Qemu 2024-11-21 N/A 4.4 MEDIUM
A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.
CVE-2022-0156 3 Apple, Fedoraproject, Vim 3 Macos, Fedora, Vim 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
vim is vulnerable to Use After Free
CVE-2022-0139 1 Radare 1 Radare2 2024-11-21 7.5 HIGH 9.8 CRITICAL
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0.
CVE-2022-0107 2 Fedoraproject, Google 3 Fedora, Chrome, Chrome Os 2024-11-21 6.8 MEDIUM 8.8 HIGH
Use after free in File Manager API in Google Chrome on Chrome OS prior to 97.0.4692.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
CVE-2022-0106 2 Fedoraproject, Google 2 Fedora, Chrome 2024-11-21 6.8 MEDIUM 8.8 HIGH
Use after free in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gesture to potentially exploit heap corruption via a crafted HTML page.
CVE-2022-0105 2 Fedoraproject, Google 2 Fedora, Chrome 2024-11-21 6.8 MEDIUM 8.8 HIGH
Use after free in PDF Accessibility in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2022-0103 2 Fedoraproject, Google 2 Fedora, Chrome 2024-11-21 6.8 MEDIUM 8.8 HIGH
Use after free in SwiftShader in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2022-0099 2 Fedoraproject, Google 2 Fedora, Chrome 2024-11-21 6.8 MEDIUM 8.8 HIGH
Use after free in Sign-in in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gestures to potentially exploit heap corruption via specific user gesture.
CVE-2022-0098 2 Fedoraproject, Google 2 Fedora, Chrome 2024-11-21 6.8 MEDIUM 8.8 HIGH
Use after free in Screen Capture in Google Chrome on Chrome OS prior to 97.0.4692.71 allowed an attacker who convinced a user to perform specific user gestures to potentially exploit heap corruption via specific user gestures.
CVE-2022-0096 2 Fedoraproject, Google 2 Fedora, Chrome 2024-11-21 6.8 MEDIUM 8.8 HIGH
Use after free in Storage in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-4322 1 Google 1 Chrome 2024-11-21 N/A 8.8 HIGH
Use after free in DevTools in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: Medium)
CVE-2021-4320 1 Google 1 Chrome 2024-11-21 N/A 8.8 HIGH
Use after free in Blink in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
CVE-2021-4319 1 Google 1 Chrome 2024-11-21 N/A 8.8 HIGH
Use after free in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
CVE-2021-4317 1 Google 1 Chrome 2024-11-21 N/A 8.8 HIGH
Use after free in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
CVE-2021-4202 1 Linux 1 Linux Kernel 2024-11-21 6.9 MEDIUM 7.0 HIGH
A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalation problem.
CVE-2021-4192 4 Apple, Debian, Fedoraproject and 1 more 5 Mac Os X, Macos, Debian Linux and 2 more 2024-11-21 6.8 MEDIUM 7.8 HIGH
vim is vulnerable to Use After Free
CVE-2021-4187 3 Apple, Fedoraproject, Vim 4 Mac Os X, Macos, Fedora and 1 more 2024-11-21 6.8 MEDIUM 7.8 HIGH
vim is vulnerable to Use After Free
CVE-2021-4173 3 Apple, Fedoraproject, Vim 4 Mac Os X, Macos, Fedora and 1 more 2024-11-21 6.8 MEDIUM 7.8 HIGH
vim is vulnerable to Use After Free
CVE-2021-4154 3 Linux, Netapp, Redhat 4 Linux Kernel, Hci Baseboard Management Controller, Enterprise Linux and 1 more 2024-11-21 7.2 HIGH 8.8 HIGH
A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.
CVE-2021-4150 1 Linux 1 Linux Kernel 2024-11-21 4.9 MEDIUM 5.5 MEDIUM
A use-after-free flaw was found in the add_partition in block/partitions/core.c in the Linux kernel. A local attacker with user privileges could cause a denial of service on the system. The issue results from the lack of code cleanup when device_add call fails when adding a partition to the disk.