Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-39831

Summary
Assigner-OpenHarmony
Assigner Org ID-0cf5dd6e-1214-4398-a481-30441e48fafd
Published At-08 Oct, 2024 | 03:03
Updated At-08 Oct, 2024 | 14:02
Rejected At-
Credits

AccessTokenManager has an use after free vulnerability

in OpenHarmony v4.1.0 allow a local attacker with high privileges arbitrary code execution in pre-installed apps through use after free.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:OpenHarmony
Assigner Org ID:0cf5dd6e-1214-4398-a481-30441e48fafd
Published At:08 Oct, 2024 | 03:03
Updated At:08 Oct, 2024 | 14:02
Rejected At:
▼CVE Numbering Authority (CNA)
AccessTokenManager has an use after free vulnerability

in OpenHarmony v4.1.0 allow a local attacker with high privileges arbitrary code execution in pre-installed apps through use after free.

Affected Products
Vendor
OpenHarmony (OpenAtom Foundation)OpenHarmony
Product
OpenHarmony
Default Status
unaffected
Versions
Affected
  • From v4.0.0 through 4.1.0 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-416CWE-416 Use After Free
Type: CWE
CWE ID: CWE-416
Description: CWE-416 Use After Free
Metrics
VersionBase scoreBase severityVector
3.14.4MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md
N/A
Hyperlink: https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:scy@openharmony.io
Published At:08 Oct, 2024 | 04:15
Updated At:16 Oct, 2024 | 16:53

in OpenHarmony v4.1.0 allow a local attacker with high privileges arbitrary code execution in pre-installed apps through use after free.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Secondary3.14.4MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Type: Primary
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CPE Matches

OpenAtom Foundation
openatom
>>openharmony>>Versions up to 4.1.0(inclusive)
cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*
Weaknesses
CWE IDTypeSource
CWE-416Primarynvd@nist.gov
CWE-416Secondaryscy@openharmony.io
CWE ID: CWE-416
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-416
Type: Secondary
Source: scy@openharmony.io
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.mdscy@openharmony.io
Third Party Advisory
Hyperlink: https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md
Source: scy@openharmony.io
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

137Records found

CVE-2024-2312
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.01%
||
7 Day CHG+0.02%
Published-05 Apr, 2024 | 19:40
Updated-26 Aug, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GRUB2 does not call the module fini functions on exit, leading to Debian/Ubuntu's peimage GRUB2 module leaving UEFI system table hooks after exit. This lead to a use-after-free condition, and could possibly lead to secure boot bypass.

Action-Not Available
Vendor-NetApp, Inc.GNUDebian GNU/Linux
Product-bootstrap_oshci_compute_nodegrub2Debian based GNU GRUBgrub2
CWE ID-CWE-416
Use After Free
CVE-2022-42829
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.08% / 24.81%
||
7 Day CHG+0.01%
Published-01 Nov, 2022 | 00:00
Updated-21 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A use after free issue was addressed with improved memory management. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13. An app with root privileges may be able to execute arbitrary code with kernel privileges.

Action-Not Available
Vendor-Apple Inc.
Product-ipadosmacosiphone_osmacOS
CWE ID-CWE-416
Use After Free
CVE-2022-20185
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 2.62%
||
7 Day CHG~0.00%
Published-15 Jun, 2022 | 13:22
Updated-03 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In TBD of TBD, there is a possible use after free bug. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-208842348References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CVE-2022-20158
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 1.64%
||
7 Day CHG~0.00%
Published-11 Aug, 2022 | 14:58
Updated-03 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In bdi_put and bdi_unregister of backing-dev.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182815710References: Upstream kernel

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CVE-2022-20581
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.40%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-18 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Pixel camera driver, there is a possible use after free due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-245916120References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CVE-2022-42520
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 5.71%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-17 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ServiceInterface::HandleRequest of serviceinterface.cpp, there is a possible use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242994270References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CVE-2024-23370
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.59%
||
7 Day CHG~0.00%
Published-07 Oct, 2024 | 12:58
Updated-16 Oct, 2024 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Automotive Multimedia

Memory corruption when a process invokes IOCTL calls from user-space to create a HAB virtual channel and another process invokes IOCTL calls to destroy the same.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwareqca6584auwsa8830qca9367_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584au_firmwaresw5100psnapdragon_auto_5g_modem-rf_gen_2wcn3980qca9377qca6698aqqca9367wcn3988_firmwarewsa8830_firmwarewsa8835wcn3988wsa8835_firmwaresw5100sw5100_firmwarewcn3980_firmwaresw5100p_firmwareqca6698aq_firmwareSnapdragonwcn3988_firmwareqca9377_firmwarewsa8830_firmwareqca9367_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584au_firmwarewsa8835_firmwaresw5100_firmwarewcn3980_firmwaresw5100p_firmwareqca6698aq_firmware
CWE ID-CWE-416
Use After Free
CVE-2024-23376
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.59%
||
7 Day CHG~0.00%
Published-07 Oct, 2024 | 12:58
Updated-16 Oct, 2024 | 20:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in ComputerVision

Memory corruption while sending the persist buffer command packet from the user-space to the kernel space through the IOCTL call.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800snapdragon_8_gen_1_mobile_platformsa6155p_firmwarewsa8830wcd9380_firmwaresa6150p_firmwaresa8145p_firmwaresw5100psnapdragon_w5\+_gen_1_wearable_platformfastconnect_6900fastconnect_6900_firmwarewcn3988_firmwareqca6574ausa8155p_firmwarewsa8835sa6145p_firmwaresa8195pwcd9380sa8150p_firmwarefastconnect_7800_firmwaresw5100sa6155psw5100p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresa6145pqca6174a_firmwareqca6174aqca6696_firmwarewcn3980sa8145pqca6696sa8150psa6150psa8155pwsa8830_firmwarewcn3988wsa8835_firmwareqca6574au_firmwaresa8195p_firmwaresw5100_firmwarewcn3980_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareSnapdragonqca6174a_firmwaresa6155p_firmwarewcd9380_firmwaresa6150p_firmwaresa8145p_firmwareqca6696_firmwarefastconnect_6900_firmwarewcn3988_firmwarewsa8830_firmwaresa6145p_firmwaresa8155p_firmwarewsa8835_firmwaresa8150p_firmwarefastconnect_7800_firmwareqca6574au_firmwaresa8195p_firmwaresw5100_firmwarewcn3980_firmwaresw5100p_firmwaresnapdragon_8_gen_1_mobile_platform_firmware
CWE ID-CWE-416
Use After Free
CVE-2022-33225
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.63%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 06:58
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use after free in Trusted Application Environment

Memory corruption due to use after free in trusted application environment.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6564au_firmwarewcd9380_firmwaresdm429wmsm8996au_firmwaresd429sdxr2_5gsd865_5gwcn6851_firmwareqca6564ausdx55m_firmwaremdm9628_firmwareqca6574ausd205sd429_firmwaremsm8996ausd205_firmwareqca6564a_firmwaresdm429w_firmwarewcd9340wsa8810_firmwarequalcomm215_firmwarewcd9380wsa8810sd870qca6390_firmwareqca6436qualcomm215wcn6851sd210_firmwareqca6574aqca6426apq8096ausd870_firmwareqca6391_firmwaresdxr2_5g_firmwareqca6390mdm9628wcd9340_firmwarewcn3660bwsa8815wcn6850apq8096au_firmwaresd210sd865_5g_firmwarewcn3620_firmwareqca6426_firmwarewcn3660b_firmwarewcn6850_firmwareqca6574a_firmwarewcn3620qca6574au_firmwarewsa8815_firmwarewcn3610_firmwareqca6564aqca6391sdx55mqca6436_firmwarewcn3610Snapdragonqca6564au_firmwarewcd9380_firmwaremsm8996au_firmwaresd870_firmwareqca6391_firmwaresdxr2_5g_firmwarewcn6851_firmwaresdx55m_firmwaremdm9628_firmwarewcd9340_firmwareapq8096au_firmwaresd429_firmwaresd205_firmwaresdm429w_firmwareqca6564a_firmwaresd865_5g_firmwarewcn3620_firmwareqca6426_firmwarewsa8810_firmwarequalcomm215_firmwarewcn3660b_firmwarewcn6850_firmwareqca6574a_firmwarewsa8815_firmwareqca6574au_firmwareqca6390_firmwarewcn3610_firmwaresd210_firmwareqca6436_firmware
CWE ID-CWE-416
Use After Free
CVE-2024-20861
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-6||MEDIUM
EPSS-0.07% / 21.19%
||
7 Day CHG~0.00%
Published-07 May, 2024 | 04:28
Updated-10 Feb, 2025 | 21:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free vulnerability in SveService prior to SMR May-2024 Release 1 allows local privileged attackers to cause memory corruption.

Action-Not Available
Vendor-Samsung ElectronicsSamsung
Product-androidSamsung Mobile Devicesandroid
CWE ID-CWE-416
Use After Free
CVE-2022-33263
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.63%
||
7 Day CHG~0.00%
Published-06 Jun, 2023 | 07:38
Updated-07 Jan, 2025 | 19:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use after free in Core

Memory corruption due to use after free in Core when multiple DCI clients register and deregister.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwareqam8255p_firmwarewcn3991wsa8830wcd9380_firmwaresw5100psnapdragon_w5\+_gen_1_wearable_platformwcn785x-5sm8350-ac_firmwaresm8150-acwsa8835wcn3950_firmwaresd_8_gen1_5gwcd9380sm4450_firmwareqca6420_firmwareqca6595au_firmwaresnapdragon_wear_4100\+_platform_firmwaresm8350wcd9370snapdragon_wear_4100\+_platformwcn685x-5_firmwarewcn685x-1sm8450wcn6750qca6430_firmwarewcn3998wcn3980wcd9385_firmwarewcn3950sd_8_gen1_5g_firmwarewcn3660bsd855wsa8815sm4450wcn3660b_firmwareqca6574au_firmwarewcn3680b_firmwareqca6595auwcn3998_firmwarewcn785x-5_firmwarewcn3980_firmwarewcn3610_firmwareqca6420snapdragon_w5\+_gen_1_wearable_platform_firmwaresm8475_firmwareaqt1000_firmwarewcn6740_firmwaresa6155p_firmwareqcs8155wsa8832_firmwareqca6698aqsm8350_firmwarewcn685x-5wcn3988_firmwareqca6430qca6797aq_firmwarewcn785x-1_firmwareqca6574ausa8155p_firmwaresa8195pwsa8810_firmwarewcd9341_firmwaresm8450_firmwaresw5100wsa8810wsa8832sa8255p_firmwaresa6155psw5100p_firmwaresm8150-ac_firmwareqca6698aq_firmwarewcn3680bsm8350-acwcn685x-1_firmwarewcd9385sm8150_firmwaresa8255pwcd9341wcn6740qca6797aqwcd9370_firmwareaqt1000sa8155pwsa8830_firmwaresd855_firmwaresm8150wcn785x-1wcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqcs8155_firmwaresw5100_firmwaresm8475wcn6750_firmwareqam8255pwcn3610Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2022-33298
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.07%
||
7 Day CHG~0.00%
Published-04 Apr, 2023 | 04:46
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use after free in Modem

Memory corruption due to use after free in Modem while modem initialization.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8830sa6150p_firmwaresa8145p_firmwarewcn3950_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresd730_firmwarewcd9370snapdragon_835_mobile_platform_firmwareqca6564qca6426wcn685x-1wcn3990_firmwaresm4375wcn3998sm8250-abwcd9385_firmwarewcn3950wcd9326_firmwaresm6375_firmwarewcn3660bsm7150-acqca6320_firmwaresnapdragon_x55_5g_modem-rf_systemqca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595auwcn3998_firmwarewcd9375_firmwarewcn3610_firmwareqca6420qca6436_firmwaresm4350-acsnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6564au_firmwaresa6155p_firmwareqca6310sm8250_firmwaresm8250-acwcn3988_firmwareqca6430sa6145p_firmwaresm6250wcd9340sa8195psxr1120sdm710_firmwarewsa8810_firmwaresm4375_firmwaresw5100qca6436wcd9326wcd9335sa6155pwcn685x-1_firmwarewcd9385sm8150_firmwaresxr2130_firmwarewcd9341qca6696_firmwaresm7150-abqca6390sm4350_firmwarewcd9375aqt1000sa8150psm6250_firmwaresm6150_firmwaresm8250-ac_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwaresm8150wcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresxr1120_firmwarewcn3610sm6375wcd9380_firmwarewcn3990sw5100psd865_5gsnapdragon_w5\+_gen_1_wearable_platformqca6564ausm8150-acsm6150wsa8835snapdragon_835_mobile_platformwcd9380snapdragon_wear_4100\+_platform_firmwaresxr2130qca6574asnapdragon_wear_4100\+_platformwcn685x-5_firmwaresm7150-aa_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwarewcn3980sm7150-ac_firmwarewcd9340_firmwaresd855sm6150-ac_firmwarewsa8815qca6320snapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwareqca6574a_firmwaresd835wcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresd730qca6391sm8250-ab_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresm7150-aasm7125aqt1000_firmwaresnapdragon_xr2_5g_platformsnapdragon_xr1_platformsm7150-ab_firmwarewcn685x-5qca6574ausa8155p_firmwaresdm710wcd9341_firmwarewsa8810sw5100p_firmwaresm8150-ac_firmwaresa6145pwcn3680bsd835_firmwareqca6564_firmwaresa8145pqca6696qca6391_firmwaresm4350wcd9370_firmwaresm6150-acsm4350-ac_firmwaresm7125_firmwaresa6150psdx55snapdragon_x50_5g_modem-rf_systemsa8155psm8250sw5100_firmwaresnapdragon_xr1_platform_firmwareSnapdragonwcd9380_firmwaresa6150p_firmwaresa8145p_firmwarewcn3950_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwaresd730_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_835_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn3990_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwarewcd9385_firmwarewcd9326_firmwarewcd9340_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwareqca6320_firmwarefastconnect_6200_firmwarewcn3680b_firmwareqca6574a_firmwareqca6574au_firmwaresdx55_firmwaresnapdragon_695_5g_mobile_platform_firmwarewcd9375_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3610_firmwareqca6436_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareaqt1000_firmwareqca6564au_firmwaresa6155p_firmwarefastconnect_6900_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwarewsa8810_firmwarewcd9341_firmwaresw5100p_firmwaresd835_firmwareqca6564_firmwaresxr2130_firmwareqca6696_firmwareqca6391_firmwaresnapdragon_710_mobile_platform_firmwaresnapdragon_855_mobile_platform_firmwarewcd9370_firmwaresm6250_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwaresw5100_firmwarefastconnect_6800_firmwaresxr1120_firmwaresnapdragon_720g_mobile_platform_firmwaresnapdragon_xr1_platform_firmwaresnapdragon_675_mobile_platform_firmware
CWE ID-CWE-416
Use After Free
CVE-2024-22252
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-9.3||CRITICAL
EPSS-0.27% / 50.37%
||
7 Day CHG~0.00%
Published-05 Mar, 2024 | 17:57
Updated-27 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use-after-free vulnerability

VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)Apple Inc.
Product-workstationesxifusionmacosVMware FusionVMware Cloud FoundationVMware ESXiVMware Workstationesxivmware_workstationfusioncloud_foundation
CWE ID-CWE-416
Use After Free
CVE-2024-22253
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-9.3||CRITICAL
EPSS-0.06% / 19.21%
||
7 Day CHG~0.00%
Published-05 Mar, 2024 | 17:57
Updated-07 May, 2025 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use-after-free vulnerability

VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.

Action-Not Available
Vendor-n/aApple Inc.VMware (Broadcom Inc.)
Product-fusionesximacosworkstationcloud_foundationVMware WorkstationVMware ESXiVMware FusionVMware Cloud Foundationfusionesxivmware_workstationcloud_foundation
CWE ID-CWE-416
Use After Free
CVE-2023-52447
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 1.38%
||
7 Day CHG~0.00%
Published-22 Feb, 2024 | 16:21
Updated-04 May, 2025 | 07:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
bpf: Defer the free of inner map when necessary

In the Linux kernel, the following vulnerability has been resolved: bpf: Defer the free of inner map when necessary When updating or deleting an inner map in map array or map htab, the map may still be accessed by non-sleepable program or sleepable program. However bpf_map_fd_put_ptr() decreases the ref-counter of the inner map directly through bpf_map_put(), if the ref-counter is the last one (which is true for most cases), the inner map will be freed by ops->map_free() in a kworker. But for now, most .map_free() callbacks don't use synchronize_rcu() or its variants to wait for the elapse of a RCU grace period, so after the invocation of ops->map_free completes, the bpf program which is accessing the inner map may incur use-after-free problem. Fix the free of inner map by invoking bpf_map_free_deferred() after both one RCU grace period and one tasks trace RCU grace period if the inner map has been removed from the outer map before. The deferment is accomplished by using call_rcu() or call_rcu_tasks_trace() when releasing the last ref-counter of bpf map. The newly-added rcu_head field in bpf_map shares the same storage space with work field to reduce the size of bpf_map.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinuxlinux_kernel
CWE ID-CWE-416
Use After Free
CVE-2024-0193
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.15%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 18:05
Updated-01 Aug, 2025 | 18:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation

A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.

Action-Not Available
Vendor-Red Hat, Inc.Linux Kernel Organization, Inc
Product-enterprise_linuxlinux_kernelRed Hat Enterprise Linux 7RHOL-5.8-RHEL-9Red Hat Enterprise Linux 6Red Hat Enterprise Linux 9Red Hat Enterprise Linux 8Red Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 9.0 Update Services for SAP Solutions
CWE ID-CWE-416
Use After Free
CVE-2024-0775
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 0.70%
||
7 Day CHG~0.00%
Published-22 Jan, 2024 | 13:03
Updated-17 Jun, 2025 | 21:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kernel: use-after-free while changing the mount option in __ext4_remount leading

A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.

Action-Not Available
Vendor-Red Hat, Inc.Linux Kernel Organization, Inc
Product-enterprise_linuxlinux_kernelRed Hat Enterprise Linux 9Red Hat Enterprise Linux 7Red Hat Enterprise Linux 6Red Hat Enterprise Linux 8
CWE ID-CWE-416
Use After Free
CVE-2021-35120
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.10% / 28.09%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:40
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper handling between export and release functions on the same handle from client can lead to use after free in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwaremdm9150_firmwarewsa8830qcs610qcs2290_firmwareqca8337sdx65csra6620qcs4290wcn3950_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresa6155sd690_5gwcd9370csra6620_firmwareqcs605_firmwarecsra6640_firmwareqcs6125_firmwareqca6426wcn3990_firmwareqrb5165n_firmwarewcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950sm4125wcd9326_firmwarewcn3615_firmwaresd_8_gen1_5g_firmwarewcn3660bsd662sd460_firmwaresa8155wcn7850qca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595ausa6155_firmwarewcd9375_firmwarewcn3615sm7250p_firmwarewcn3998_firmwarewcn3999_firmwareqca6420qca6436_firmwareapq8053_firmwareqrb5165nsm7450_firmwaresd680_firmwaresa6155p_firmwarewcn3999sa515m_firmwareqcs6490qrb5165_firmwareqrb5165m_firmwaresd429sdxr2_5gqcs6125wcn7851sa8155_firmwaresd662_firmwareqcs405qca6430wcn3988_firmwaresd429_firmwarewsa8810_firmwarequalcomm215_firmwaresd765gsd765_firmwareqca6436sd680wcd9326sa6155pwcd9335wcn6851qcs603_firmwarewcn7851_firmwareqcs4290_firmwarewcd9385wcd9341qcs6490_firmwaresd750gsd870_firmwareqca6390ar8035sd750g_firmwareaqt1000wcd9375wcn3910_firmwaremsm8953_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3620_firmwareqcm6490sd888_5g_firmwarewcn3988wcn3620wcn6850_firmwarewcn7850_firmwarewsa8815_firmwaresm7450wsa8835_firmwaresm8475wcn6750_firmwareqcm6125_firmwareqcm2290_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewcn3990sdm429wsd780gsd865_5gsdx55m_firmwarewcn6856_firmwarewsa8835qca6574sdm429w_firmwarewcd9380sd888_5gqualcomm215qcs410qca6574asd690_5g_firmwarewcn6855_firmwareqca6430_firmwarewcd9335_firmwarewcn3980wcn6750sa515mqca6574_firmwareqcs605sd855sm4125_firmwarewcn6850wsa8815wcn3910sd765qca6426_firmwarewcn3660b_firmwarewcn3680qca6574a_firmwaresd768g_firmwareqrb5165mwcn3980_firmwaresd460qca6391sdx55msm8475_firmwareaqt1000_firmwarewcn6740_firmwaremsm8953sdx65_firmwarear8031_firmwareqcm4290qcm6490_firmwarewcn3680_firmwarewsa8832_firmwareqrb5165sd480_firmwareqcs603wcn6851_firmwareqca6574ausa8155p_firmwarewcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wcn6855wsa8810wsa8832qcs610_firmwaremdm9150wcn6856wcn3680bsd768gar8031qcs405_firmwarewcn6740qca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55apq8053sa8155pcsra6640sm7250pqcs410_firmwaresm8475p_firmwarear8035_firmwareqcm2290sm8475pSnapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-416
Use After Free
CVE-2021-30266
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.83%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:16
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible use after free due to improper memory validation when initializing new interface via Interface add command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm7250sa6150p_firmwareqcs610ipq4028_firmwareqcn5550qca8337ar9380ipq8173_firmwareqca9561_firmwaresdx65qcn5124qca4024_firmwarewcn3950_firmwareipq8078asa8150p_firmwareqca6595au_firmwaresa6155qca6335qcn5064csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwareqca9987_firmwaresa415mwcn3998wcn3950qcn6024_firmwareipq8076amdm9206_firmwaresm6375_firmwarewcn3660bsd460_firmwarewcn7850qca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6420apq8053_firmwareqca6438_firmwareqca9986ipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwarewcn3999qrb5165_firmwareqca7500ipq8072_firmwareipq4029_firmwareqcs6125sa8155_firmwareipq6010sd662_firmwareipq8068qcs405qca6430sd765gqualcomm215_firmwareqca6436wcn6851sa6155pqcs603_firmwarewcn7851_firmwareqca9888_firmwarewcd9341ipq8068_firmwareqca6696_firmwaresd870_firmwareqca9988_firmwareqcn5154_firmwaresa8150pwsa8830_firmwareqca9992_firmwaresd865_5g_firmwaresd855_firmwarewcn3988qca6438wcn7850_firmwaresa8195p_firmwareqcn5121qcn5022_firmwarewcn6750_firmwareqca9898ipq4028wcn3610qca6428_firmwareipq5018_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwarewcd9330msm8996au_firmwareipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca9558qca6574csr8811_firmwarewcd9380qualcomm215qcn5054_firmwareqcs410qcn5024sd690_5g_firmwareipq4019_firmwareqca9985qcn9012_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareipq6018_firmwareqcs605wsa8815wcn6850qca6320mdm9650_firmwareqca9986_firmwareqca6426_firmwarewcn3660b_firmwarewcn3680qca9984ipq6028ipq8064qcn9024wcn3980_firmwaresd730qcn5550_firmwarewcd9330_firmwaresdx55mipq8064_firmwarewcn6740_firmwaremsm8953qcn5064_firmwaresd678_firmwarear8031_firmwarewcn3680_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareqcs603ipq8070qca9896qcn5502qca9994qca9887_firmwareqca9980qcn9024_firmwareipq8174_firmwareqca6564a_firmwareqca9880qcm4290_firmwaresd480sd870wcn6855qcn5121_firmwaresd210_firmwareqcs610_firmwaresa6145pipq6018qca9886_firmwarear8031apq8096auqca6595_firmwareqcs405_firmwaresa8145pqca6391_firmwareqca4024wcd9370_firmwaresd780g_firmwaresdx55apq8053qcn5021_firmwarecsra6640sa8155psd675qca9531_firmwarear8035_firmwareqcn5024_firmwarewcn3991_firmwareqcn5500wsa8830sd678qca9561qcn9070sa8145p_firmwaresm7250_firmwarecsrb31024qca9563_firmwaremdm9650csra6620qca9987qcn9072qca9880_firmwareqca9992qcs4290sd765g_firmwareqca6420_firmwareipq8069_firmwareapq8009_firmwareqca6390_firmwaresd690_5gipq6000sd730_firmwarewcd9370sd675_firmwareipq8072qcn5152_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377sm8450ipq5018wcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwareqca9563ipq8074asd662qcn5124_firmwareqca9982sa8155qca6320_firmwarewcn3680b_firmwareqcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwareqca6595auwcn3999_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwareqca6584ausd778gsa6155p_firmwareqca6310ipq8174wcn7851qca9990qcs6490sdxr2_5gqcn5052qca9367sa415m_firmwarewcn3988_firmwareqcn9074sd205sa6145p_firmwaresd778g_firmwaresa8195pwsa8810_firmwareqca6694sm8450_firmwaresd765_firmwarewcd9326wcd9335qca8081qca9982_firmwareqcn6023ipq8071aipq8071a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwareqca6390qca9898_firmwarewcd9375aqt1000ar8035csr8811ipq4019qca6694_firmwaremsm8953_firmwareqcn9100_firmwaresd210ipq5010_firmwareipq8074a_firmwaresd888_5g_firmwarewsa8815_firmwareqcm6490wcn6850_firmwarewsa8835_firmwareqca6564aqca9988qcm6125_firmwareqca9882wcn3990qcn9000sd_675sd780gsd865_5gqca6595ar9380_firmwaresm8450p_firmwareqcn9012qca9558_firmwareqca9896_firmwarewsa8835ipq8065_firmwaremsm8996ausd665_firmwaresd888_5gqcn5154qca8075_firmwareipq4018qca6574aipq6005_firmwaremdm9206wcn6855_firmwareqca9889qca9888qca6310_firmwaresm7325ipq8074qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwareqca6574_firmwareqca9886qcn5502_firmwaresd855sd665ipq8076sd765qca9887qca6574a_firmwareqcn5021ipq8069qcn5152sd768g_firmwareapq8009sd460qca6391ipq6005aqt1000_firmwareqcn9100sdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwareqca9882_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwareqca9531ipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122sd205_firmwarewcd9341_firmwareqcm6125wsa8810sm8450pqcn5500_firmwarewcn6856qcn5022wcn3680bsd768gipq6010_firmwarewcn6740qca6696sa6150pqca8075qcn9022_firmwareapq8096au_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn9072_firmwareipq6000_firmwareipq8071_firmwareqcn9074_firmwareqcs410_firmwareipq4029sm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-416
Use After Free
CVE-2023-48414
Matching Score-4
Assigner-Google Devices
ShareView Details
Matching Score-4
Assigner-Google Devices
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 0.75%
||
7 Day CHG~0.00%
Published-08 Dec, 2023 | 15:44
Updated-02 Aug, 2024 | 21:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Pixel Camera Driver, there is a possible use after free due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CVE-2021-3543
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.10% / 27.92%
||
7 Day CHG~0.00%
Published-01 Jun, 2021 | 13:20
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw null pointer dereference in the Nitro Enclaves kernel driver was found in the way that Enclaves VMs forces closures on the enclave file descriptor. A local user of a host machine could use this flaw to crash the system or escalate their privileges on the system.

Action-Not Available
Vendor-nitro_enclaves_projectn/aRed Hat, Inc.Fedora Project
Product-nitro_enclavesenterprise_linuxfedorakernel
CWE ID-CWE-416
Use After Free
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2020-12464
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.09% / 26.80%
||
7 Day CHG~0.00%
Published-29 Apr, 2020 | 17:59
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.

Action-Not Available
Vendor-n/aNetApp, Inc.Linux Kernel Organization, Inc
Product-linux_kernelhci_storage_nodescloud_backupactive_iq_unified_managersolidfire_baseboard_management_controllerhci_baseboard_management_controllersolidfire_\&_hci_storage_nodehci_compute_nodeaff_a700ssteelstore_cloud_integrated_storagen/a
CWE ID-CWE-416
Use After Free
CVE-2021-22040
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-6.7||MEDIUM
EPSS-1.15% / 77.64%
||
7 Day CHG~0.00%
Published-16 Feb, 2022 | 16:37
Updated-03 Aug, 2024 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-workstation_playerfusionworkstation_proesxicloud_foundationVMware ESXi , Workstation, Fusion and VMware Cloud Foundation
CWE ID-CWE-416
Use After Free
CVE-2020-11147
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 14.38%
||
7 Day CHG~0.00%
Published-22 Feb, 2021 | 06:25
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free issue in audio modules while removing and freeing objects during list iteration due to incorrect usage of macro in Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfs2580qpm5679_firmwareqpm5620_firmwareqdm5579qdm2307qfs2608_firmwareqfs2530qpm8870_firmwareqpa8802qpm6585_firmwarepm6125qat3519qbt2000_firmwareqat5522_firmwarewcn3950_firmwarepm8150aqtc800hqdm5670qpa5581_firmwarepm7150lqpa8821smr546_firmwaresd_675_firmwareqdm5671qpm4650_firmwareqat3518pm456_firmwareqpa5580_firmwaresdr425_firmwarewcn3998smr526_firmwarewcn3950sd720gwgr7640_firmwareqpm5670_firmwaresd710_firmwaresd460_firmwareqdm5652qpa4360_firmwareqpm8870wcd9375_firmwarewcn3998_firmwareqpm5679qbt2000pm855pqca6420pm6150aqpm6670_firmwarepmx50_firmwaresdr735gpm660_firmwarepm8150bqdm3301_firmwareqsm7250sd662_firmwareqca6430qat3522pmr735asd765grsw8577_firmwareqdm2308_firmwaresdr660wcn6851qpa6560qfs2630_firmwaresdr675_firmwaresdr865qdm5620_firmwarewcd9341sm7350_firmwaresmr545qdm4643_firmwareqln5020qet4100_firmwaresd750gqdm3302qpm5657pm6350qdm5621qtc800sqpm5875_firmwareqat3514_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwareqdm5650wcn3988wtr3925sd660_firmwaresdr052smb1390qat5516_firmwarepm6150lpm855l_firmwareqet4100qpa8686_firmwareqpm6585wcn3991wcd9380_firmwaresmb1355qln4650qpa8801sdr735g_firmwarepm8350bhs_firmwarewgr7640qat5568qet5100qdm5671_firmwareqpa8801_firmwarepm8150l_firmwareqat5533_firmwaresdx55m_firmwarewcn6856_firmwareqpa8673_firmwarepm6150qet4101_firmwaresmb1354_firmwaresd670_firmwarepm7250bqln4642_firmwareqfs2630qpa8842sdr052_firmwarewcd9380smb1355_firmwarepm7250b_firmwaresmb1351_firmwarepmk8350_firmwaresmb1381pm855p_firmwaresd690_5g_firmwaresdx50m_firmwaresdr735pm7250smb1395pm660lqpa8803smr526qca6430_firmwarepmk8003qtc801s_firmwarewcd9335_firmwareqat3522_firmwarewcn3980pm7350c_firmwarewsa8815wcn6850qdm5621_firmwaresmb1394pm8350_firmwarepm8009wcn3980_firmwaresd730sdr051_firmwarepm660l_firmwaresdx55mpm6250_firmwarewcn6740_firmwarepm8008pm8350b_firmwareqtm525_firmwareqat3518_firmwareqpm5621_firmwarepm855lwcn6851_firmwarersw8577qdm5670_firmwareqpa6560_firmwareqpa8802_firmwarepm7150a_firmwarepm8150b_firmwareqpm5621sd670smr545_firmwarepm8009_firmwareqdm2310_firmwareqfs2580_firmwarepm8150lqdm5677pm855_firmwarepm660a_firmwarepm855b_firmwarewtr2965qca6391_firmwarewcd9370_firmwareqln4650_firmwareqat3516_firmwareqpm5875sdx55qet5100msd675pm8350bhsqet4101qat3555_firmwareqat3516qpa8803_firmwareqpm5658pm855bqpm5658_firmwareqpm5870wcn3991_firmwareqdm5652_firmwarewsa8830sdr051pm660qet6110_firmwareqdm5579_firmwareqln5030pm6125_firmwareqbt1500qpa5581pmi632qpa2625_firmwarepm456pm8350bh_firmwarepmr735b_firmwareqbt1500_firmwareqet5100_firmwareqpm5870_firmwareqpm4621qet6100_firmwareqet6100sd765g_firmwareqpa8686qca6420_firmwaresmb1394_firmwareqca6390_firmwaresd690_5gsmb1396pm7150asd730_firmwarewcd9370sd675_firmwarepm8350qpa5461_firmwaresdr425pm8350c_firmwarepmr525_firmwarewcn3990_firmwareqpm5641pmi632_firmwarewcd9385_firmwareqdm5650_firmwareqpa4340_firmwarewcd9326_firmwareqat5516pm7250_firmwareqdm5620sd662qpa8821_firmwarepm8350bhpmk8002_firmwarepm3003aqdm4650_firmwaresdx55_firmwareqat5533sm7250p_firmwaresm7350qsm7250_firmwareqpm6670smb1354pm7150l_firmwareqpm8820qpm4641qat5515_firmwareqln5020_firmwarepm855pm8250smb1398qdm4643qfs2530_firmwarewcn3988_firmwarepmx55qpm4641_firmwaresdr675pm8150c_firmwareqpa8842_firmwareqdm3301sdr735_firmwareqat3519_firmwaresm6250wsa8810_firmwareqpm5677qat5515sd765_firmwareqat3514wcd9326wcd9335qdm5677_firmwarepm6350_firmwarepm8004_firmwaresdr8150_firmwarewcd9385qtc800h_firmwarepmk7350_firmwareqpm5620qat3550_firmwareqln5040_firmwareqpm4630qca6390wcd9375sd750g_firmwareaqt1000qpa8673sm6250_firmwareqdm2310qln5030_firmwareqln4642qpm5677_firmwarewsa8815_firmwaresd888_5g_firmwaresmr525_firmwarewtr3925_firmwarepmk7350smb1396_firmwareqpm8820_firmwarewcn6850_firmwarewsa8835_firmwareqpm6621_firmwaresmr546qet6110qln5040qpm8895qpm5670wcn3990sd_675pmx55_firmwaresd865_5gpmk8350smb1398_firmwareqdm3302_firmwarepm8350bqat5522qdm2307_firmwarewsa8835pm8150cpmr735bqpm5657_firmwaresd888_5gqpa4360pmk8003_firmwaresdr660_firmwareqpm4640_firmwaresmb1390_firmwareqdm5679_firmwarepm8350csmr525qpm4640pm6150l_firmwarepmr525pm7350cpm8150a_firmwareqet5100m_firmwareqpm4650qtm525sd855pm6150a_firmwarepm6150_firmwaresd765qpm4630_firmwaresd768g_firmwaresdr865_firmwareqat3555pm8250_firmwaresd460qca6391smb1351qpa5461aqt1000_firmwareqpm8895_firmwarewtr2965_firmwarepm660aqpa4340sdx50msdr8150qfs2608qtc801ssmb1395_firmwareqdm4650qpm5641_firmwaresd710pm8008_firmwarewcd9341_firmwareqpm6621wsa8810pmr735a_firmwareqat5568_firmwareqdm2308pmx50qat3550wcn6856qdm5679sd768gpm3003a_firmwarewcn6740qtc800s_firmwaresmb1381_firmwarepm8004pmk8002qpa2625sm7250psd720g_firmwareqpm4621_firmwarepm6250qpa5580Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-416
Use After Free
CVE-2020-11148
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 11.04%
||
7 Day CHG~0.00%
Published-21 Jan, 2021 | 09:41
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free issue in HIDL while using callback to post event in Rx thread when internal mutex is not acquired and meantime close is triggered and callback instance is deleted in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfs2580qpm5870qfe2550wsa8830pm660qln5030qbt1500qdm5579pmi632qpa5581qdm2307qfs2530qpa8802pm6125qat3519qpa5373qpm4621qet6100sdr660gpmm855aupm8150aqtc800hqdm5670qpa8686msm8917pm7150lqpa8821pm7150asmb1396wcd9370pm8350qdm5671qca6426qat3518sd632qpm5641wcn3998wcn3950qat5516wtr2955wcn3660bqdm5620qfe4320qfe4308pm8350bhpm3003asa8155qdm5652sd6905gqat5533qca6595auqpm5679qbt2000qpm8870wcn3615sm7350pm6150aqpm6670qdm2305qpm8820sdr735gpm8937qpm4641pm8150bpm855qsm7250sd429pm8250smb1398qdm4643qfe2101smb1360pmx55qat3522pmr735aqca6421qdm3301sa8195ppm8953qat5515qpm5677sd765gqat3514qca6436sdr660sa6155pwcd9326wcn6851qpa6560sdr865smb1358wcd9341wcd9385pm439pmi8952qca6431smr545qln5020sd750gqdm3302qpm4630qca6390wcd9375qpa8673sa8150ppm6350pmm8195auqdm2310qdm5621qfe3340qln4642sda429wqdm5650wcn3988wtr3925pmi8937wcn3620pmk7350smb1390apq8017smr546pm6150lsd8885gwcn3610qet6110qln5040qpm8895qpm6585qtc410sqpm5670wcn3991wcn3990smb1355qln4650qpa8801sdm429wwgr7640qat5568qet5100qca6595pmk8350qpm8830sdxr25gpm6150pm8350bqat5522wsa8835pm7250bpm8150cpmr735bqfs2630qpa8842wcd9380qualcomm215qpa4360smb1381qca6574aqpa4361sdr735pm7250smb1395pm660lpm8350cqpa8803smr525smr526qpm4640pmk8003wcn3980pmr525qdm2301pm7350cqpm4650qsw8573qtm525qcs605sd855wsa8815wcn6850sd665qfe4305sd765smb1394wcn3680pm640pqfe4309qat3555pm8009smb1351qca6391sdx55mqpa5461qfe4373fcpm8008msm8953qsw8574qfe2520pm640aqfs2608pm855lpm8916qtc801sqdm4650sd8655gqfe4302qca6574auqpm5621qpm6582qsw6310qfe4303qpm6621wsa8810pm670pm8150lqdm2308qat3550qdm5677wcn6856qdm5679wcn3680bpm215qdm2302sdxr1sdr8250sd768gwcn6740qca6696qfe4301wtr2965qpm5875qet5100mpm640lpmk8002apq8053qpa2625sd675pm8350bhssdx55sd439qet4101qat3516pm670lsm7250pqpm5658pm855bqpa5580Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-416
Use After Free
CVE-2023-43521
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 4.56%
||
7 Day CHG~0.00%
Published-06 May, 2024 | 14:32
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in HLOS

Memory corruption when multiple listeners are being registered with the same file descriptor.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100pqcs410_firmwaresa6150p_firmwaresd865_5gqcs610_firmwaresxr2130_firmwaresrv1mqca8081_firmwarewcd9370ar8035_firmwareqca6696wcd9340_firmwarewcd9341_firmwareqcc710_firmwareqca6426wcn3610qcn9074wsa8815_firmwaresnapdragon_wear_4100\+_firmwaresa8195p_firmwareqca8337_firmwareqca8337qca6426_firmwareqca6574au_firmwaresnapdragon_x72_5g_modem-rfqam8295pwcd9341qca6574ausa8620p_firmwarewcn3950wsa8810_firmwaresnapdragon_870_5g_mobile_firmwaresa9000p_firmwaresrv1hsnapdragon_auto_5g_modem-rf_gen_2_firmwarewcn3660b_firmwarefastconnect_6800_firmwaresa8295p_firmwaresnapdragon_870_5g_mobilevideo_collaboration_vc1_platform_firmwaresa8770pc-v2x_9150qca6584auqcn6274_firmwareqcc710snapdragon_xr2_5g_firmwaresw5100_firmwarefastconnect_6800qfw7114_firmwaresnapdragon_wear_4100\+fastconnect_7800_firmwarefastconnect_6900snapdragon_w5\+_gen_1_wearable_firmwarevideo_collaboration_vc1_platformsnapdragon_865_5g_mobile_firmwaresa7255pqfw7114fastconnect_6900_firmwareqam8255p_firmwarewcd9380sa6145p_firmwareqam8255psnapdragon_xr2_5gsnapdragon_8_gen_1_mobile_firmwaresa8150psa6155pwsa8810qam8650psa9000psrv1h_firmwaresw5100video_collaboration_vc3_platformc-v2x_9150_firmwaresa6155p_firmwareqam8295p_firmwaresrv1m_firmwaresnapdragon_x55_5g_modem-rfqfw7124_firmwareqca6698aq_firmwareqca6436_firmwaresnapdragon_8_gen_1_mobilesnapdragon_x55_5g_modem-rf_firmwarewcn3610_firmwaresa8255psnapdragon_865\+_5g_mobilewcd9370_firmwaresa7255p_firmwaresnapdragon_x72_5g_modem-rf_firmwarewcn3660bsxr2130qca6174asa8195pwcd9340qamsrv1msnapdragon_auto_5g_modem-rf_gen_2qca6174a_firmwareqam8650p_firmwarewcn3988qca6584au_firmwarewcn3980_firmwareqcn6274qca6436qfw7124sa8775psnapdragon_w5\+_gen_1_wearablewsa8835qca6391_firmwaresw5100p_firmwaresa8775p_firmwareqamsrv1hqca6696_firmwarewcd9380_firmwaresa6150pqcs410sa8155p_firmwareqca8081wsa8815sa8155pwsa8830qam8775psa6145psnapdragon_x75_5g_modem-rfqcn9074_firmwaresa8620psa8255p_firmwarear8035qamsrv1m_firmwaresa8650p_firmwaresnapdragon_865_5g_mobileqca6391qcn6224snapdragon_865\+_5g_mobile_firmwareqca6698aqwcn3950_firmwaresa8770p_firmwaresa8295pfastconnect_7800sa8145p_firmwaresa8650pqam8775p_firmwaresd865_5g_firmwarewcn3680bsa8150p_firmwarewcn3988_firmwareqamsrv1h_firmwarevideo_collaboration_vc3_platform_firmwaresa8145psnapdragon_x75_5g_modem-rf_firmwarewsa8835_firmwarewcn3980wsa8830_firmwarewcn3680b_firmwareqcn6224_firmwareqcs610Snapdragonqam8255p_firmwarequalcomm_video_collaboration_vc1_platform_firmwareqca8337_firmwarewcd9380_firmwaresa6150p_firmwaresa8145p_firmwareqcn6224_firmwarewcn3950_firmwaresa8150p_firmwaresnapdragon_x72_5g_modem-rf_system_firmwareqca6584au_firmwarec-v2x_9150_firmwareqfw7114_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqamsrv1h_firmwarewcd9340_firmwareqam8295p_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwaresa9000p_firmwarewcn3680b_firmwareqca6574au_firmwareqca8081_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3610_firmwareqca6436_firmwaresa8620p_firmwaresa6155p_firmwareqcn6274_firmwaresa8775p_firmwaresa8650p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwaresrv1h_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwaresa7255p_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwaresa8255p_firmwaresw5100p_firmwareqcs610_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqca6698aq_firmwareqamsrv1m_firmwaresrv1m_firmwareqca6174a_firmwareqam8650p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwaresxr2130_firmwareqca6696_firmwareqca6391_firmwarewcd9370_firmwareqcc710_firmwarewsa8830_firmwaresd865_5g_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwaresw5100_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresa8295p_firmwareqfw7124_firmwarear8035_firmware
CWE ID-CWE-416
Use After Free
CVE-2021-20292
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.21%
||
7 Day CHG~0.00%
Published-28 May, 2021 | 10:42
Updated-03 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/LinuxRed Hat, Inc.
Product-debian_linuxlinux_kernelfedoraenterprise_linuxkernel
CWE ID-CWE-416
Use After Free
CVE-2023-43543
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 5.63%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 10:05
Updated-27 Jan, 2025 | 19:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Audio

Memory corruption in Audio during a playback or a recording due to race condition between allocation and deallocation of graph object.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6584au_firmwarewsa8835wsa8835_firmwarewcn3988_firmwaresa9000psnapdragon_w5\+_gen_1_wearablewsa8830qca6698aqsnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584ausa8770p_firmwaresnapdragon_w5\+_gen_1_wearable_firmwaresw5100_firmwareqca6698aq_firmwaresa9000p_firmwareqam8255psw5100p_firmwaresa8255p_firmwaresnapdragon_auto_5g_modem-rf_gen_2sw5100psa8775pwcn3980_firmwarewcn3980qam8255p_firmwaresa8255psa8775p_firmwarewcn3988qam8775psa8770pwsa8830_firmwaresw5100qam8775p_firmwareSnapdragonqam8255p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwareqca6584au_firmwaresa8775p_firmwarewcn3988_firmwarewsa8830_firmwaresa9000p_firmwarewsa8835_firmwaresw5100_firmwarewcn3980_firmwaresa8255p_firmwaresw5100p_firmwareqca6698aq_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmware
CWE ID-CWE-416
Use After Free
CVE-2021-0941
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.89%
||
7 Day CHG~0.00%
Published-25 Oct, 2021 | 13:20
Updated-03 Aug, 2024 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-0664
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 11.52%
||
7 Day CHG~0.00%
Published-18 Nov, 2021 | 14:57
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ccu, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05827158; Issue ID: ALPS05827158.

Action-Not Available
Vendor-n/aGoogle LLCMediaTek Inc.
Product-mt6873mt6771mt8385mt6833mt6885mt8788mt6877mt8183mt6765mt6853mt8768androidmt6889mt6768mt6779mt6785MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6889, MT8183, MT8385, MT8768, MT8788
CWE ID-CWE-416
Use After Free
CVE-2021-0656
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 2.27%
||
7 Day CHG~0.00%
Published-18 Nov, 2021 | 14:57
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In edma driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05709376; Issue ID: ALPS05709376.

Action-Not Available
Vendor-n/aGoogle LLCMediaTek Inc.
Product-mt6873mt6853tmt6893androidmt6885mt8797mt6889mt8791mt6877mt8195mt6853mt6883MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8195, MT8791, MT8797
CWE ID-CWE-416
Use After Free
CVE-2023-43544
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 5.63%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 10:05
Updated-27 Jan, 2025 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Audio

Memory corruption when IPC callback handle is used after it has been released during register callback by another thread.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6584au_firmwarewsa8835wsa8835_firmwarewcn3988_firmwareqca8337_firmwaresa9000pqfw7124_firmwaresnapdragon_w5\+_gen_1_wearablewsa8830qcc710qca6698aqqca8081_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584auqcn6224_firmwareqfw7114_firmwareqca8081sa8770p_firmwaresnapdragon_w5\+_gen_1_wearable_firmwaresw5100_firmwaresnapdragon_x75_5g_modem-rfqcn6224qcn6274_firmwareqfw7114fastconnect_7800qca6698aq_firmwaresa9000p_firmwareqam8255par8035fastconnect_7800_firmwaresw5100p_firmwaresa8255p_firmwaresnapdragon_auto_5g_modem-rf_gen_2sw5100pwcd9340sa8775pqca8337wcn3980_firmwareqcc710_firmwarear8035_firmwareqcn6274qfw7124wcn3980qam8255p_firmwarewcd9340_firmwaresa8255psa8775p_firmwarewcn3988qam8775psa8770pwsa8830_firmwaresw5100qam8775p_firmwaresnapdragon_x75_5g_modem-rf_firmwareSnapdragonqam8255p_firmwareqca8337_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwareqca6584au_firmwareqcn6274_firmwaresa8775p_firmwareqfw7114_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcd9340_firmwarewcn3988_firmwareqcc710_firmwareqcn6224_firmwarewsa8830_firmwaresa9000p_firmwarewsa8835_firmwarefastconnect_7800_firmwaresw5100_firmwareqca8081_firmwarewcn3980_firmwaresa8255p_firmwareqfw7124_firmwaresw5100p_firmwarear8035_firmwareqca6698aq_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmware
CWE ID-CWE-416
Use After Free
CVE-2021-0935
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.75%
||
7 Day CHG~0.00%
Published-25 Oct, 2021 | 13:20
Updated-03 Aug, 2024 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ip6_xmit of ip6_output.c, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-168607263References: Upstream kernel

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-4394
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.12%
||
7 Day CHG~0.00%
Published-17 Aug, 2023 | 12:49
Updated-27 Feb, 2025 | 21:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Memory leak in btrfs_get_dev_args_from_path()

A use-after-free flaw was found in btrfs_get_dev_args_from_path in fs/btrfs/volumes.c in btrfs file-system in the Linux Kernel. This flaw allows a local attacker with special privileges to cause a system crash or leak internal kernel information

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncRed Hat, Inc.Fedora Project
Product-linux_kernelRed Hat Enterprise Linux 9FedoraRed Hat Enterprise Linux 7KernelRed Hat Enterprise Linux 8Red Hat Enterprise Linux 6
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-416
Use After Free
CVE-2021-0898
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 2.93%
||
7 Day CHG~0.00%
Published-17 Dec, 2021 | 16:10
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In apusys, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05672071.

Action-Not Available
Vendor-n/aGoogle LLCMediaTek Inc.
Product-mt6873mt6893androidmt6885mt6875mt8797mt6889mt8791mt6877mt8195mt6891mt6883MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8195, MT8791, MT8797
CWE ID-CWE-416
Use After Free
CVE-2021-0535
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 2.62%
||
7 Day CHG~0.00%
Published-22 Jun, 2021 | 11:01
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wpas_ctrl_msg_queue_timeout of ctrl_iface_unix.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-168314741

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CVE-2021-0899
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 2.93%
||
7 Day CHG~0.00%
Published-17 Dec, 2021 | 16:10
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In apusys, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05672059.

Action-Not Available
Vendor-n/aGoogle LLCMediaTek Inc.
Product-mt6873mt6893androidmt6885mt6875mt8797mt6889mt8791mt6877mt8195mt6891mt6883MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8195, MT8791, MT8797
CWE ID-CWE-416
Use After Free
CVE-2021-0669
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 2.01%
||
7 Day CHG~0.00%
Published-18 Nov, 2021 | 14:58
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In apusys, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05681550; Issue ID: ALPS05681550.

Action-Not Available
Vendor-n/aGoogle LLCMediaTek Inc.
Product-mt9638mt9980mt6873mt6893mt6885mt9981mt9669mt9650mt6877mt8195mt6891mt6883mt6853mt9636mt6853tmt9970androidmt9652mt6875mt8797mt6889mt9686mt9639mt8791MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8195, MT8791, MT8797, MT9636, MT9638, MT9639, MT9650, MT9652, MT9669, MT9686, MT9970, MT9980, MT9981
CWE ID-CWE-416
Use After Free
CVE-2021-0349
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.22%
||
7 Day CHG~0.00%
Published-04 Feb, 2021 | 17:10
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In display driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-9, Android-10, Android-11; Patch ID: ALPS05362646.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CVE-2021-0342
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 5.34%
||
7 Day CHG~0.00%
Published-11 Jan, 2021 | 20:28
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Versions: Android kernel; Android ID: A-146554327.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CVE-2021-0365
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 4.35%
||
7 Day CHG~0.00%
Published-02 Feb, 2021 | 23:00
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In display driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05454782.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CVE-2023-42722
Matching Score-4
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
ShareView Details
Matching Score-4
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.83%
||
7 Day CHG~0.00%
Published-04 Dec, 2023 | 00:54
Updated-02 Aug, 2024 | 19:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In camera service, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed

Action-Not Available
Vendor-Google LLCUnisoc (Shanghai) Technologies Co., Ltd.
Product-t310t820t616androidt610t770t612t606s8000sc9832et760sc7731esc9863at618SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000
CWE ID-CWE-416
Use After Free
CVE-2020-9237
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.64%
||
7 Day CHG~0.00%
Published-17 Aug, 2020 | 15:16
Updated-04 Aug, 2024 | 10:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Huawei smartphone Taurus-AL00B with versions earlier than 10.1.0.126(C00E125R5P3) have a user after free vulnerability. A module is lack of lock protection. Attackers can exploit this vulnerability by launching specific request. This could compromise normal service of the affected device.

Action-Not Available
Vendor-n/aHuawei Technologies Co., Ltd.
Product-taurus-al00b_firmwaretaurus-al00bTaurus-AL00B
CWE ID-CWE-416
Use After Free
CVE-2022-25677
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.24%
||
7 Day CHG~0.00%
Published-13 Dec, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in diag due to use after free while processing dci packet in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwareqcn9072_firmwaremsm8996auqca6310qca6595au_firmwareqcn9000qualcomm215_firmwaresd429_firmwaresd730ipq6028qcn9070qcn5122qsm8250_firmwareqca6564auqca6426_firmwarewcn3660bsd720gipq8078asd205_firmwaremsm8996au_firmwareqca9889_firmwareqcn5124wsa8815ipq9008wcn3680bqca6430wcn3620_firmwaresd855ipq9008_firmwarewcd9340sdx55_firmwaresdxr2_5g_firmwareqcn5022_firmwaremdm9650qca8072qca6574asd865_5g_firmwaresdm429w_firmwaresd835_firmwareqcn5024ipq4019_firmwareqca9994qca6335sd_675qcn5024_firmwareqca6595qca6430_firmwareqca8081sd870ipq6018mdm9150ipq5018_firmwareipq9574qca6390_firmwareqcn9024_firmwareipq4028_firmwareipq8072aipq8070aipq8070a_firmwareqca9880_firmwaresd870_firmwaresm6250qcs8155ipq8078_firmwareipq4019qca6595auwcd9370wcn3980qcn5152qca9992qcn9022sd720g_firmwareipq8065_firmwareqca9985_firmwaremdm9150_firmwareqca9888_firmwaresdx55mwcn6850_firmwareqcn9274wsa8810_firmwarewsa8815_firmwarewcn3991_firmwareipq8078ipq8076aqca6436ipq8071aqca4024sa8155pwsa8810aqt1000_firmwareqcn9012ipq8076wcd9335_firmwareqcn5154_firmwarear9380_firmwareqca6391qcn9024qcn5052_firmwarewcn3998_firmwarewcn6851wcd9370_firmwaresd675qca6420_firmwareipq8074aqcn6023_firmwaresd210_firmwareipq4028qca9886_firmwareqca7500_firmwareipq8174ipq8064_firmwareqcn6122sdm429wipq8070qcs610qualcomm215qca6391_firmwaresd205qcn9012_firmwaresa8155p_firmwaresa6145pwcn3610wcd9375ipq8076_firmwareqca9980_firmwaresd865_5gwcn3990_firmwarewcn3950_firmwarewcn3988ipq8071a_firmwareqca9980qca6310_firmwareqcs8155_firmwareqca6436_firmwareqcn5021_firmwarewcd9341_firmwareipq8074a_firmwareqca9886ipq6000_firmwareqcn6102ipq4018wcd9340_firmwaresd_675_firmwareqca6564a_firmwareqcn5021sd855_firmwareqcn5054_firmwaremdm9650_firmwareqca9889sdx50mqcn6024_firmwaresdx55ipq5018wcn3610_firmwareqca9990wcn3660b_firmwareqca7500sa6145p_firmwareipq5028_firmwareqca6390sda429w_firmwaresdx50m_firmwareipq5010_firmwaresa6155pqca4024_firmwarewcn6850csr8811wcn3950ipq6018_firmwareqca6320_firmwareqcn9100_firmwareqcn5122_firmwareqcn6024wcd9335ipq8078a_firmwaresd835wcn3680b_firmwareqca6595_firmwareipq6010qca6574au_firmwareipq4029_firmwareqca6564_firmwareqcs610_firmwareqcn9074qcn9274_firmwareqcn5054wcd9380qcn6102_firmwareqcn5052sd730_firmwareipq8064wcd9375_firmwareipq8070_firmwareqca9880qcn6132_firmwareaqt1000qcn5152_firmwareqcn6100_firmwareqca9985qcn6112qca8072_firmwareqsm8250qca6420qca9898_firmwareqcn5124_firmwaresa515msd845_firmwaresa515m_firmwareqcn5164_firmwareqca9994_firmwarewcn3990sd429ipq6028_firmwareqcn6023qca8081_firmwareqca9984ipq8068wcn3998csr8811_firmwareqca8337_firmwareqca9898qca8075_firmwareqcn5164qcn6122_firmwareqca9990_firmwareipq8068_firmwareipq8072a_firmwaresd678qca6574auqcn6112_firmwareipq4029ipq9574_firmwareapq8096auqcs410_firmwareqcn9000_firmwaresd210ipq8173_firmwareipq8065qcn9070_firmwarepmp8074qca8075pmp8074_firmwaresd678_firmwareipq6010_firmwareqca9984_firmwarewcn3991ipq8076a_firmwarear9380qca6564asd675_firmwareqca6574a_firmwareqca9888sda429wqca6320ipq8174_firmwareqca8337sm6250_firmwareqcn6100sdxr2_5gqcn6132wcd9341wcn3980_firmwarewcn6851_firmwareipq4018_firmwaresa6155p_firmwareqcn9074_firmwareqca9992_firmwareqcn5154apq8096au_firmwareipq8173qcn9072qca6564au_firmwareqca6426qca6335_firmwaresdx55m_firmwareqcn9100qcn5022ipq6000wcn3620qca6564ipq5010wcn3988_firmwareqcn9022_firmwareipq5028sd845qcs410Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-416
Use After Free
CVE-2022-25666
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 11.88%
||
7 Day CHG~0.00%
Published-19 Oct, 2022 | 00:00
Updated-09 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption due to use after free in service while trying to access maps by different threads in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9340_firmwaresd210_firmwaresw5100pqcn6024wcd9385_firmwarewcn3988_firmwareqcs610qam8295p_firmwaresd210qcn5124qcn5024qsm8250_firmwareipq8072a_firmwareapq8096au_firmwareipq5028sd_8_gen1_5g_firmwareipq8068wcd9385wcn7850_firmwareipq5028_firmwaresdx55m_firmwarewcd9340sd845ipq8074a_firmwaremdm9150_firmwareqca9886qcn6122qca9980sw5100p_firmwarewcn7850sdx55msdm429wwcn6851_firmwaresa8155ipq4028_firmwareqca6574_firmwareqca6595auipq8071a_firmwareqcs8155wcn3680bsa8150pwcn3660bqca8337_firmwareqca9994_firmwareipq6010wcn7851_firmwarewsa8835pmp8074wcn3990_firmwareipq8071asdm429w_firmwareqca6320_firmwaresa8195psa6150pqcn5122_firmwareipq8076_firmwareipq8174_firmwaresd865_5gipq8064ipq5018qca6574asd429_firmwareqca6310_firmwaresdxr2_5gwcn3990wsa8810_firmwarewcd9335_firmwarewcn3998_firmwareqca7500_firmwareipq6010_firmwarewsa8815qca6436_firmwaresd888_5gsa6155psa8155psdx55qca6335qca6564aar9380qca6564a_firmwareqcn9074wcn3660b_firmwareqca6391_firmwareipq8072aqca9889_firmwareqca6696_firmwarewcn6855qcn5154_firmwareipq5010_firmwareipq8173_firmwareqcn5021_firmwaresd845_firmwareqca9888_firmwarecsr8811qca9984sd205sm8475qca4024_firmwareqca8081aqt1000_firmwarewcn3620qcn5164_firmwarewcn7851qcn6024_firmwaresa8155_firmwareqca8075qcn6122_firmwareqcn5024_firmwaresa8145p_firmwareipq4029wcd9380_firmwareipq5010qca4024ipq8070_firmwareqcn6023_firmwareqcn9022_firmwaremsm8996au_firmwareqca9889wcd9370sa6155apq8096auipq4019qca6574auqcn9070sa6145pqcc5100_firmwarewsa8815_firmwareipq8078aqcn9000_firmwareqcn5054wcn3950_firmwaresdxr2_5g_firmwareipq8174sd870sw5100qcn5124_firmwareqcn9070_firmwareqca8081_firmwareqca6426_firmwaresa8150p_firmwaresd870_firmwarewcn3950sa6155_firmwarewcd9380qca9886_firmwaremdm9150ipq4029_firmwareqcs610_firmwareipq6018qcn9024_firmwareqcn9100qca6420_firmwareqca9888sa515m_firmwareqcn9022qcn5022_firmwarepmp8074_firmwarewcd9341qca9880_firmwareqca7500mdm9650_firmwareqcn5021qca9992qca6426qca6335_firmwareipq8078wsa8835_firmwareqca6390sd205_firmwarewcn3980qca6696wcn6856_firmwareqca9898qcn9000qca9980_firmwareqsm8250ipq8070mdm9650qca9990qcn9072sa6150p_firmwarewcn3620_firmwareqcn5052_firmwareqca9994qcc5100sa8295pqca6420qca8337qcn5122ipq8078a_firmwareipq8076a_firmwareipq8070a_firmwareipq8065qcn5154ipq8076aipq8076qca9992_firmwareqca6430qualcomm215_firmwarewsa8810sd865_5g_firmwarecsr8811_firmwarewcd9341_firmwarewcn6850ipq4018ipq5018_firmwareqca6574a_firmwareqca6595au_firmwareipq8173sda429wqca9898_firmwaresa8295p_firmwareqca6390_firmwareqcn5152_firmwareqca6564au_firmwaresw5100_firmwareqca9985qca6574wcn3610wcn3610_firmwareqcn5054_firmwarewcn3998wcd9335ipq8068_firmwareqca9880qca6430_firmwareqca6436aqt1000qca8072_firmwareqcn6023ipq6028sa515msd855_firmwaresd855wcn6856qcn9024qcs410_firmwareqcn5164ipq4028qam8295pqcn9012wcn6855_firmwareipq6018_firmwaresd429qcn9012_firmwaresd835_firmwareipq8074aqca9985_firmwareqcs410qca6391ipq4019_firmwareqcs8155_firmwareqcn5052sd835sa6155p_firmwareqca9984_firmwareqca8075_firmwaresa8195p_firmwareqca6574au_firmwarewcd9370_firmwaresa8155p_firmwareqcn5152sd888_5g_firmwareqca6310qcn9074_firmwaresda429w_firmwarewsa8830qca6564qcn5022msm8996auwcn3980_firmwareipq8065_firmwareipq6028_firmwareqca6320qca8072wcn6850_firmwareqca6564_firmwareqcn9072_firmwarewcn6851qca9990_firmwareipq8078_firmwarear9380_firmwareqca6564auqcn9100_firmwarewsa8830_firmwarewcn3680b_firmwarewcn3988sdx55_firmwarequalcomm215ipq8070asa8145pipq8064_firmwareqcn6132_firmwareipq4018_firmwareqcn6132sa6145p_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-416
Use After Free
CVE-2020-36694
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 1.50%
||
7 Day CHG~0.00%
Published-21 May, 2023 | 00:00
Updated-31 Jan, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-416
Use After Free
CVE-2020-35506
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.81%
||
7 Day CHG~0.00%
Published-28 May, 2021 | 10:20
Updated-04 Aug, 2024 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A use-after-free vulnerability was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0 during the handling of the 'Information Transfer' command (CMD_TI). This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service or potential code execution with the privileges of the QEMU process.

Action-Not Available
Vendor-n/aQEMU
Product-qemuQEMU
CWE ID-CWE-416
Use After Free
CVE-2020-27066
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.24%
||
7 Day CHG~0.00%
Published-15 Dec, 2020 | 16:17
Updated-04 Aug, 2024 | 16:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In xfrm6_tunnel_free_spi of net/ipv6/xfrm6_tunnel.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-168043318

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CWE ID-CWE-667
Improper Locking
CVE-2020-0484
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.29%
||
7 Day CHG~0.00%
Published-15 Dec, 2020 | 15:55
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In destroyResources of ComposerClient.h, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-155769496

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-0483
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.29%
||
7 Day CHG~0.00%
Published-15 Dec, 2020 | 15:55
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In DrmManagerService::~DrmManagerService() of DrmManagerService.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-155647761

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found