Vulnerabilities (CVE)

Filtered by CWE-416
Total 4506 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-32091 3 Debian, Fedoraproject, Mariadb 3 Debian Linux, Fedora, Mariadb 2023-11-07 5.0 MEDIUM 7.5 HIGH
MariaDB v10.7 was discovered to contain an use-after-poison in in __interceptor_memset at /libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc.
CVE-2022-32081 2 Fedoraproject, Mariadb 2 Fedora, Mariadb 2023-11-07 7.5 HIGH 7.5 HIGH
MariaDB v10.4 to v10.7 was discovered to contain an use-after-poison in prepare_inplace_add_virtual at /storage/innobase/handler/handler0alter.cc.
CVE-2022-30657 3 Adobe, Apple, Microsoft 3 Incopy, Macos, Windows 2023-11-07 9.3 HIGH 7.8 HIGH
Adobe InCopy versions 17.2 (and earlier) and 16.4.1 (and earlier) are affected by a Use-After-Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-30655 3 Adobe, Apple, Microsoft 3 Incopy, Macos, Windows 2023-11-07 9.3 HIGH 7.8 HIGH
Adobe InCopy versions 17.2 (and earlier) and 16.4.1 (and earlier) are affected by a Use-After-Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-30648 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2023-11-07 6.8 MEDIUM 7.8 HIGH
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by a Use-After-Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-30647 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2023-11-07 6.8 MEDIUM 7.8 HIGH
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by a Use-After-Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-2982 2 Fedoraproject, Vim 2 Fedora, Vim 2023-11-07 N/A 7.8 HIGH
Use After Free in GitHub repository vim/vim prior to 9.0.0260.
CVE-2022-2978 2 Debian, Linux 2 Debian Linux, Linux Kernel 2023-11-07 N/A 7.8 HIGH
A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
CVE-2022-2946 3 Debian, Fedoraproject, Vim 3 Debian Linux, Fedora, Vim 2023-11-07 N/A 7.8 HIGH
Use After Free in GitHub repository vim/vim prior to 9.0.0246.
CVE-2022-2889 2 Fedoraproject, Vim 2 Fedora, Vim 2023-11-07 N/A 7.8 HIGH
Use After Free in GitHub repository vim/vim prior to 9.0.0225.
CVE-2022-2862 2 Fedoraproject, Vim 2 Fedora, Vim 2023-11-07 N/A 7.8 HIGH
Use After Free in GitHub repository vim/vim prior to 9.0.0221.
CVE-2022-2859 2 Fedoraproject, Google 2 Fedora, Chrome 2023-11-07 N/A 8.8 HIGH
Use after free in Chrome OS Shell in Google Chrome prior to 104.0.5112.101 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific UI interactions.
CVE-2022-2858 2 Fedoraproject, Google 2 Fedora, Chrome 2023-11-07 N/A 8.8 HIGH
Use after free in Sign-In Flow in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via specific UI interaction.
CVE-2022-2855 2 Fedoraproject, Google 2 Fedora, Chrome 2023-11-07 N/A 8.8 HIGH
Use after free in ANGLE in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2022-2852 2 Fedoraproject, Google 2 Fedora, Chrome 2023-11-07 N/A 8.8 HIGH
Use after free in FedCM in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2022-2817 2 Fedoraproject, Vim 2 Fedora, Vim 2023-11-07 N/A 7.8 HIGH
Use After Free in GitHub repository vim/vim prior to 9.0.0213.
CVE-2022-2614 2 Fedoraproject, Google 2 Fedora, Chrome 2023-11-07 N/A 8.8 HIGH
Use after free in Sign-In Flow in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2022-2613 2 Fedoraproject, Google 3 Fedora, Chrome, Chrome Os 2023-11-07 N/A 8.8 HIGH
Use after free in Input in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific UI interactions.
CVE-2022-2606 2 Fedoraproject, Google 2 Fedora, Chrome 2023-11-07 N/A 8.8 HIGH
Use after free in Managed devices API in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enable a specific Enterprise policy to potentially exploit heap corruption via a crafted HTML page.
CVE-2022-2604 2 Fedoraproject, Google 2 Fedora, Chrome 2023-11-07 N/A 8.8 HIGH
Use after free in Safe Browsing in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.