CWE:
 

Topic
Date
Author
High
Sqlite3 Window Function Remote Code Execution
13.05.2019
Cisco Talos
Med.
PHP 5.6.9 Use-After-Free
10.06.2015
High-Tech Bridge Secur...


CVEMAP Search Results

CVE
Details
Description
2021-07-13
Medium
CVE-2021-1940

Updating...
 

 
Use after free can occur due to improper handling of response from firmware in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

 
2021-07-09
Medium
CVE-2021-27037

Vendor: Autodesk
Software: Design review
 

 
A maliciously crafted PNG, PDF or DWF file in Autodesk 2018, 2017, 2013, 2012, 2011 can be used to attempt to free an object that has already been freed while parsing them. This vulnerability can be exploited by remote attackers to execute arbitrary code.

 
2021-07-08
Medium
CVE-2021-21806

Vendor: Webkitgtk
Software: Webkitgtk
 

 
An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.

 
Medium
CVE-2021-21779

Vendor: Webkitgtk
Software: Webkitgtk
 

 

 
2021-07-07
Medium
CVE-2021-21775

Vendor: Webkitgtk
Software: Webkitgtk
 

 
A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.

 
2021-07-02
Medium
CVE-2021-30557

Vendor: Google
Software: Chrome
 

 
Use after free in TabGroups in Google Chrome prior to 91.0.4472.114 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.

 
Medium
CVE-2021-30556

Vendor: Google
Software: Chrome
 

 
Use after free in WebAudio in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

 
Medium
CVE-2021-30555

Vendor: Google
Software: Chrome
 

 
Use after free in Sharing in Google Chrome prior to 91.0.4472.114 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page and user gesture.

 
Medium
CVE-2021-30554

Vendor: Google
Software: Chrome
 

 
Use after free in WebGL in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

 
Medium
CVE-2021-36145

Vendor: Linux
Software: ACRN
 

 
The Device Model in ACRN through 2.5 has a devicemodel/core/mem.c use-after-free for a freed rb_entry.

 

 


Copyright 2021, cxsecurity.com

 

Back to Top