Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-5398

Summary
Assigner-freebsd
Assigner Org ID-63664ac6-956c-4cba-a5d0-f46076e16109
Published At-22 Apr, 2026 | 02:23
Updated At-23 Apr, 2026 | 03:56
Rejected At-
Credits

Kernel use-after-free bug in the TIOCNOTTY handler

The implementation of TIOCNOTTY failed to clear a back-pointer from the structure representing the controlling terminal to the calling process' session. If the invoking process then exits, the terminal structure may end up containing a pointer to freed memory. A malicious process can abuse the dangling pointer to grant itself root privileges.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:freebsd
Assigner Org ID:63664ac6-956c-4cba-a5d0-f46076e16109
Published At:22 Apr, 2026 | 02:23
Updated At:23 Apr, 2026 | 03:56
Rejected At:
â–¼CVE Numbering Authority (CNA)
Kernel use-after-free bug in the TIOCNOTTY handler

The implementation of TIOCNOTTY failed to clear a back-pointer from the structure representing the controlling terminal to the calling process' session. If the invoking process then exits, the terminal structure may end up containing a pointer to freed memory. A malicious process can abuse the dangling pointer to grant itself root privileges.

Affected Products
Vendor
FreeBSD FoundationFreeBSD
Product
FreeBSD
Modules
  • tty
Default Status
unknown
Versions
Affected
  • From 15.0-RELEASE before p6 (release)
  • From 14.4-RELEASE before p2 (release)
  • From 14.3-RELEASE before p11 (release)
  • From 13.5-RELEASE before p12 (release)
Problem Types
TypeCWE IDDescription
CWECWE-416CWE-416: Use After Free
Type: CWE
CWE ID: CWE-416
Description: CWE-416: Use After Free
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Nicholas Carlini using Claude, Anthropic
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security.freebsd.org/advisories/FreeBSD-SA-26:10.tty.asc
vendor-advisory
Hyperlink: https://security.freebsd.org/advisories/FreeBSD-SA-26:10.tty.asc
Resource:
vendor-advisory
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.18.4HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 8.4
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secteam@freebsd.org
Published At:22 Apr, 2026 | 03:16
Updated At:01 May, 2026 | 12:49

The implementation of TIOCNOTTY failed to clear a back-pointer from the structure representing the controlling terminal to the calling process' session. If the invoking process then exits, the terminal structure may end up containing a pointer to freed memory. A malicious process can abuse the dangling pointer to grant itself root privileges.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.4HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.4
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

FreeBSD Foundation
freebsd
>>freebsd>>13.5
cpe:2.3:o:freebsd:freebsd:13.5:-:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>13.5
cpe:2.3:o:freebsd:freebsd:13.5:beta3:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>13.5
cpe:2.3:o:freebsd:freebsd:13.5:p1:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>13.5
cpe:2.3:o:freebsd:freebsd:13.5:p10:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>13.5
cpe:2.3:o:freebsd:freebsd:13.5:p11:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>13.5
cpe:2.3:o:freebsd:freebsd:13.5:p2:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>13.5
cpe:2.3:o:freebsd:freebsd:13.5:p3:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>13.5
cpe:2.3:o:freebsd:freebsd:13.5:p4:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>13.5
cpe:2.3:o:freebsd:freebsd:13.5:p5:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>13.5
cpe:2.3:o:freebsd:freebsd:13.5:p6:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>13.5
cpe:2.3:o:freebsd:freebsd:13.5:p7:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>13.5
cpe:2.3:o:freebsd:freebsd:13.5:p8:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>13.5
cpe:2.3:o:freebsd:freebsd:13.5:p9:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:-:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p1:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p10:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p2:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p3:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p4:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p5:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p6:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p7:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p8:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p9:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.4
cpe:2.3:o:freebsd:freebsd:14.4:-:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.4
cpe:2.3:o:freebsd:freebsd:14.4:p1:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.4
cpe:2.3:o:freebsd:freebsd:14.4:rc1:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>15.0
cpe:2.3:o:freebsd:freebsd:15.0:-:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>15.0
cpe:2.3:o:freebsd:freebsd:15.0:p1:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>15.0
cpe:2.3:o:freebsd:freebsd:15.0:p2:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>15.0
cpe:2.3:o:freebsd:freebsd:15.0:p3:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>15.0
cpe:2.3:o:freebsd:freebsd:15.0:p4:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>15.0
cpe:2.3:o:freebsd:freebsd:15.0:p5:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-416Secondarysecteam@freebsd.org
CWE ID: CWE-416
Type: Secondary
Source: secteam@freebsd.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://security.freebsd.org/advisories/FreeBSD-SA-26:10.tty.ascsecteam@freebsd.org
Vendor Advisory
Hyperlink: https://security.freebsd.org/advisories/FreeBSD-SA-26:10.tty.asc
Source: secteam@freebsd.org
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

130Records found

CVE-2024-45288
Matching Score-8
Assigner-FreeBSD
ShareView Details
Matching Score-8
Assigner-FreeBSD
CVSS Score-8.4||HIGH
EPSS-0.07% / 21.66%
||
7 Day CHG~0.00%
Published-05 Sep, 2024 | 03:18
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple vulnerabilities in libnv

A missing null-termination character in the last element of an nvlist array string can lead to writing outside the allocated buffer.

Action-Not Available
Vendor-FreeBSD Foundation
Product-FreeBSDfreebsd
CWE ID-CWE-170
Improper Null Termination
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-43110
Matching Score-8
Assigner-FreeBSD
ShareView Details
Matching Score-8
Assigner-FreeBSD
CVSS Score-8.4||HIGH
EPSS-2.67% / 85.92%
||
7 Day CHG~0.00%
Published-05 Sep, 2024 | 04:31
Updated-04 Nov, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple issues in ctl(4) CAM Target Layer

The ctl_request_sense function could expose up to three bytes of the kernel heap to userspace. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.

Action-Not Available
Vendor-FreeBSD Foundation
Product-freebsdFreeBSDfreebsd
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-41928
Matching Score-8
Assigner-FreeBSD
ShareView Details
Matching Score-8
Assigner-FreeBSD
CVSS Score-8.4||HIGH
EPSS-0.05% / 14.16%
||
7 Day CHG~0.00%
Published-05 Sep, 2024 | 03:32
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
bhyve(8) privileged guest escape via TPM device passthrough

Malicious software running in a guest VM can exploit the buffer overflow to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process.

Action-Not Available
Vendor-FreeBSD Foundation
Product-FreeBSDfreebsd
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-1285
Improper Validation of Specified Index, Position, or Offset in Input
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-42416
Matching Score-8
Assigner-FreeBSD
ShareView Details
Matching Score-8
Assigner-FreeBSD
CVSS Score-8.4||HIGH
EPSS-1.00% / 77.14%
||
7 Day CHG~0.00%
Published-05 Sep, 2024 | 04:31
Updated-04 Nov, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple issues in ctl(4) CAM Target Layer

The ctl_report_supported_opcodes function did not sufficiently validate a field provided by userspace, allowing an arbitrary write to a limited amount of kernel help memory. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.

Action-Not Available
Vendor-FreeBSD Foundation
Product-freebsdFreeBSDfreebsd
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CWE ID-CWE-790
Improper Filtering of Special Elements
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2019-5606
Matching Score-6
Assigner-FreeBSD
ShareView Details
Matching Score-6
Assigner-FreeBSD
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.53%
||
7 Day CHG-0.00%
Published-26 Jul, 2019 | 00:33
Updated-04 Aug, 2024 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeBSD 12.0-STABLE before r349805, 12.0-RELEASE before 12.0-RELEASE-p8, 11.3-STABLE before r349806, 11.3-RELEASE before 11.3-RELEASE-p1, and 11.2-RELEASE before 11.2-RELEASE-p12, code which handles close of a descriptor created by posix_openpt fails to undo a signal configuration. This causes an incorrect signal to be raised leading to a write after free of kernel memory allowing a malicious user to gain root privileges or escape a jail.

Action-Not Available
Vendor-FreeBSD Foundation
Product-freebsdFreeBSD
CWE ID-CWE-416
Use After Free
CVE-2019-15874
Matching Score-6
Assigner-FreeBSD
ShareView Details
Matching Score-6
Assigner-FreeBSD
CVSS Score-9.8||CRITICAL
EPSS-0.61% / 69.78%
||
7 Day CHG~0.00%
Published-28 Apr, 2020 | 23:41
Updated-05 Aug, 2024 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeBSD 12.1-STABLE before r356035, 12.1-RELEASE before 12.1-RELEASE-p4, 11.3-STABLE before r356036, and 11.3-RELEASE before 11.3-RELEASE-p8, incomplete packet data validation may result in memory access after it has been freed leading to a kernel panic or other unpredictable results.

Action-Not Available
Vendor-n/aFreeBSD FoundationNetApp, Inc.
Product-freebsdclustered_data_ontapFreeBSD
CWE ID-CWE-416
Use After Free
CWE ID-CWE-20
Improper Input Validation
CVE-2018-6916
Matching Score-6
Assigner-FreeBSD
ShareView Details
Matching Score-6
Assigner-FreeBSD
CVSS Score-9.8||CRITICAL
EPSS-0.49% / 65.71%
||
7 Day CHG~0.00%
Published-09 Mar, 2018 | 15:00
Updated-17 Sep, 2024 | 02:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p7, 10.4-STABLE, 10.4-RELEASE-p7, and 10.3-RELEASE-p28, the kernel does not properly validate IPsec packets coming from a trusted host. Additionally, a use-after-free vulnerability exists in the IPsec AH handling code. This issue could cause a system crash or other unpredictable results.

Action-Not Available
Vendor-FreeBSD Foundation
Product-freebsdFreeBSD
CWE ID-CWE-416
Use After Free
CVE-2024-45063
Matching Score-6
Assigner-FreeBSD
ShareView Details
Matching Score-6
Assigner-FreeBSD
CVSS Score-9.8||CRITICAL
EPSS-6.89% / 91.45%
||
7 Day CHG~0.00%
Published-05 Sep, 2024 | 04:31
Updated-04 Nov, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple issues in ctl(4) CAM Target Layer

The function ctl_write_buffer incorrectly set a flag which resulted in a kernel Use-After-Free when a command finished processing. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.

Action-Not Available
Vendor-FreeBSD Foundation
Product-freebsdFreeBSDfreebsd
CWE ID-CWE-416
Use After Free
CVE-2024-43102
Matching Score-6
Assigner-FreeBSD
ShareView Details
Matching Score-6
Assigner-FreeBSD
CVSS Score-9.8||CRITICAL
EPSS-1.14% / 78.55%
||
7 Day CHG~0.00%
Published-05 Sep, 2024 | 04:54
Updated-16 Sep, 2024 | 21:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
umtx Kernel panic or Use-After-Free

Concurrent removals of certain anonymous shared memory mappings by using the UMTX_SHM_DESTROY sub-request of UMTX_OP_SHM can lead to decreasing the reference count of the object representing the mapping too many times, causing it to be freed too early. A malicious code exercizing the UMTX_SHM_DESTROY sub-request in parallel can panic the kernel or enable further Use-After-Free attacks, potentially including code execution or Capsicum sandbox escape.

Action-Not Available
Vendor-FreeBSD Foundation
Product-freebsdFreeBSDfreebsd
CWE ID-CWE-416
Use After Free
CWE ID-CWE-911
Improper Update of Reference Count
CVE-2017-1081
Matching Score-6
Assigner-FreeBSD
ShareView Details
Matching Score-6
Assigner-FreeBSD
CVSS Score-7.5||HIGH
EPSS-2.21% / 84.58%
||
7 Day CHG~0.00%
Published-10 Apr, 2018 | 13:00
Updated-16 Sep, 2024 | 20:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeBSD before 11.0-STABLE, 11.0-RELEASE-p10, 10.3-STABLE, and 10.3-RELEASE-p19, ipfilter using "keep state" or "keep frags" options can cause a kernel panic when fed specially crafted packet fragments due to incorrect memory handling.

Action-Not Available
Vendor-FreeBSD Foundation
Product-freebsdFreeBSD
CWE ID-CWE-416
Use After Free
CWE ID-CWE-20
Improper Input Validation
CVE-2021-29626
Matching Score-6
Assigner-FreeBSD
ShareView Details
Matching Score-6
Assigner-FreeBSD
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.56%
||
7 Day CHG~0.00%
Published-07 Apr, 2021 | 14:48
Updated-03 Aug, 2024 | 22:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeBSD 13.0-STABLE before n245117, 12.2-STABLE before r369551, 11.4-STABLE before r369559, 13.0-RC5 before p1, 12.2-RELEASE before p6, and 11.4-RELEASE before p9, copy-on-write logic failed to invalidate shared memory page mappings between multiple processes allowing an unprivileged process to maintain a mapping after it is freed, allowing the process to read private data belonging to other processes or the kernel.

Action-Not Available
Vendor-n/aFreeBSD Foundation
Product-freebsdFreeBSD
CWE ID-CWE-416
Use After Free
CVE-2021-29627
Matching Score-6
Assigner-FreeBSD
ShareView Details
Matching Score-6
Assigner-FreeBSD
CVSS Score-7.8||HIGH
EPSS-1.05% / 77.67%
||
7 Day CHG~0.00%
Published-07 Apr, 2021 | 14:45
Updated-03 Aug, 2024 | 22:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeBSD 13.0-STABLE before n245050, 12.2-STABLE before r369525, 13.0-RC4 before p0, and 12.2-RELEASE before p6, listening socket accept filters implementing the accf_create callback incorrectly freed a process supplied argument string. Additional operations on the socket can lead to a double free or use after free.

Action-Not Available
Vendor-n/aFreeBSD Foundation
Product-freebsdFreeBSD
CWE ID-CWE-416
Use After Free
CWE ID-CWE-415
Double Free
CVE-2020-7469
Matching Score-6
Assigner-FreeBSD
ShareView Details
Matching Score-6
Assigner-FreeBSD
CVSS Score-7.5||HIGH
EPSS-0.54% / 67.58%
||
7 Day CHG~0.00%
Published-04 Jun, 2021 | 11:55
Updated-04 Aug, 2024 | 09:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeBSD 12.2-STABLE before r367402, 11.4-STABLE before r368202, 12.2-RELEASE before p1, 12.1-RELEASE before p11 and 11.4-RELEASE before p5 the handler for a routing option caches a pointer into the packet buffer holding the ICMPv6 message. However, when processing subsequent options the packet buffer may be freed, rendering the cached pointer invalid. The network stack may later dereference the pointer, potentially triggering a use-after-free.

Action-Not Available
Vendor-n/aFreeBSD FoundationNetApp, Inc.
Product-freebsdclustered_data_ontapFreeBSD
CWE ID-CWE-416
Use After Free
CVE-2020-7463
Matching Score-6
Assigner-FreeBSD
ShareView Details
Matching Score-6
Assigner-FreeBSD
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.29%
||
7 Day CHG~0.00%
Published-26 Mar, 2021 | 20:48
Updated-04 Aug, 2024 | 09:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeBSD 12.1-STABLE before r364644, 11.4-STABLE before r364651, 12.1-RELEASE before p9, 11.4-RELEASE before p3, and 11.3-RELEASE before p13, improper handling in the kernel causes a use-after-free bug by sending large user messages from multiple threads on the same SCTP socket. The use-after-free situation may result in unintended kernel behaviour including a kernel panic.

Action-Not Available
Vendor-n/aFreeBSD FoundationApple Inc.
Product-freebsditunesiphone_osipadostvoswatchossafarimacosicloudFreeBSD
CWE ID-CWE-416
Use After Free
CVE-2020-7457
Matching Score-6
Assigner-FreeBSD
ShareView Details
Matching Score-6
Assigner-FreeBSD
CVSS Score-8.1||HIGH
EPSS-44.58% / 97.60%
||
7 Day CHG~0.00%
Published-09 Jul, 2020 | 13:46
Updated-04 Aug, 2024 | 09:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeBSD 12.1-STABLE before r359565, 12.1-RELEASE before p7, 11.4-STABLE before r362975, 11.4-RELEASE before p1, and 11.3-RELEASE before p11, missing synchronization in the IPV6_2292PKTOPTIONS socket option set handler contained a race condition allowing a malicious application to modify memory after being freed, possibly resulting in code execution.

Action-Not Available
Vendor-n/aFreeBSD Foundation
Product-freebsdFreeBSD
CWE ID-CWE-416
Use After Free
CWE ID-CWE-662
Improper Synchronization
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2020-7462
Matching Score-6
Assigner-FreeBSD
ShareView Details
Matching Score-6
Assigner-FreeBSD
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.74%
||
7 Day CHG~0.00%
Published-26 Mar, 2021 | 20:48
Updated-04 Aug, 2024 | 09:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In 11.4-PRERELEASE before r360733 and 11.3-RELEASE before p13, improper mbuf handling in the kernel causes a use-after-free bug by sending IPv6 Hop-by-Hop options over the loopback interface. The use-after-free situation may result in unintended kernel behaviour including a kernel panic.

Action-Not Available
Vendor-n/aFreeBSD Foundation
Product-freebsdFreeBSD
CWE ID-CWE-416
Use After Free
CVE-2022-23090
Matching Score-6
Assigner-FreeBSD
ShareView Details
Matching Score-6
Assigner-FreeBSD
CVSS Score-7.7||HIGH
EPSS-0.27% / 50.35%
||
7 Day CHG~0.00%
Published-15 Feb, 2024 | 05:09
Updated-04 Jun, 2025 | 21:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AIO credential reference count leak

The aio_aqueue function, used by the lio_listio system call, fails to release a reference to a credential in an error case. An attacker may cause the reference count to overflow, leading to a use after free (UAF).

Action-Not Available
Vendor-FreeBSD Foundation
Product-freebsdFreeBSDfreebsd
CWE ID-CWE-416
Use After Free
CVE-2019-15878
Matching Score-6
Assigner-FreeBSD
ShareView Details
Matching Score-6
Assigner-FreeBSD
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.41%
||
7 Day CHG~0.00%
Published-13 May, 2020 | 15:38
Updated-05 Aug, 2024 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeBSD 12.1-STABLE before r352509, 11.3-STABLE before r352509, and 11.3-RELEASE before p9, an unprivileged local user can trigger a use-after-free situation due to improper checking in SCTP when an application tries to update an SCTP-AUTH shared key.

Action-Not Available
Vendor-n/aFreeBSD Foundation
Product-freebsdFreeBSD
CWE ID-CWE-416
Use After Free
CVE-2024-35869
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-8.4||HIGH
EPSS-0.01% / 3.17%
||
7 Day CHG~0.00%
Published-19 May, 2024 | 08:34
Updated-11 May, 2026 | 20:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
smb: client: guarantee refcounted children from parent session

In the Linux kernel, the following vulnerability has been resolved: smb: client: guarantee refcounted children from parent session Avoid potential use-after-free bugs when walking DFS referrals, mounting and performing DFS failover by ensuring that all children from parent @tcon->ses are also refcounted. They're all needed across the entire DFS mount. Get rid of @tcon->dfs_ses_list while we're at it, too.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinuxlinux_kernel
CWE ID-CWE-416
Use After Free
CVE-2023-6143
Matching Score-4
Assigner-Arm Limited
ShareView Details
Matching Score-4
Assigner-Arm Limited
CVSS Score-8.4||HIGH
EPSS-0.12% / 30.92%
||
7 Day CHG~0.00%
Published-04 Mar, 2024 | 09:54
Updated-28 Aug, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mali GPU Kernel Driver allows improper GPU memory processing operations

Use After Free vulnerability in Arm Ltd Midgard GPU Kernel Driver, Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to exploit a software race condition to perform improper memory processing operations. If the system’s memory is carefully prepared by the user and the system is under heavy load, then this in turn cause a use-after-free.This issue affects Midgard GPU Kernel Driver: from r13p0 through r32p0; Bifrost GPU Kernel Driver: from r1p0 through r18p0; Valhall GPU Kernel Driver: from r37p0 through r46p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r46p0.

Action-Not Available
Vendor-Arm Limited
Product-Bifrost GPU Kernel DriverArm 5th Gen GPU Architecture Kernel DriverValhall GPU Kernel DriverMidgard GPU Kernel Driverbifrost_gpu_kernel_drivervalhall_gpu_kernel_driver5th_gen_gpu_architecture_kernel_drivermidgard_gpu_kernel_driver
CWE ID-CWE-416
Use After Free
CVE-2026-20952
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.4||HIGH
EPSS-0.02% / 6.81%
||
7 Day CHG~0.00%
Published-13 Jan, 2026 | 17:57
Updated-01 Apr, 2026 | 13:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Office Remote Code Execution Vulnerability

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-office_long_term_servicing_channeloffice365_appsMicrosoft Office LTSC for Mac 2024Microsoft Office LTSC 2024Microsoft Office 2019Microsoft Office 2016Microsoft Office LTSC for Mac 2021Microsoft 365 Apps for EnterpriseMicrosoft Office LTSC 2021
CWE ID-CWE-416
Use After Free
CVE-2021-47232
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-8.4||HIGH
EPSS-0.02% / 5.47%
||
7 Day CHG~0.00%
Published-21 May, 2024 | 14:19
Updated-11 May, 2026 | 13:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
can: j1939: fix Use-after-Free, hold skb ref while in use

In the Linux kernel, the following vulnerability has been resolved: can: j1939: fix Use-after-Free, hold skb ref while in use This patch fixes a Use-after-Free found by the syzbot. The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinuxlinux_kernel
CWE ID-CWE-416
Use After Free
CVE-2026-20953
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.4||HIGH
EPSS-0.02% / 6.81%
||
7 Day CHG~0.00%
Published-13 Jan, 2026 | 17:56
Updated-01 Apr, 2026 | 13:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Office Remote Code Execution Vulnerability

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-office_long_term_servicing_channeloffice365_appsMicrosoft Office LTSC for Mac 2024Microsoft Office LTSC 2024Microsoft Office 2019Microsoft Office 2016Microsoft Office LTSC for Mac 2021Microsoft 365 Apps for EnterpriseMicrosoft Office LTSC 2021
CWE ID-CWE-416
Use After Free
CVE-2021-46973
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-8.4||HIGH
EPSS-0.02% / 5.15%
||
7 Day CHG~0.00%
Published-27 Feb, 2024 | 18:47
Updated-11 May, 2026 | 13:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
net: qrtr: Avoid potential use after free in MHI send

In the Linux kernel, the following vulnerability has been resolved: net: qrtr: Avoid potential use after free in MHI send It is possible that the MHI ul_callback will be invoked immediately following the queueing of the skb for transmission, leading to the callback decrementing the refcount of the associated sk and freeing the skb. As such the dereference of skb and the increment of the sk refcount must happen before the skb is queued, to avoid the skb to be used after free and potentially the sk to drop its last refcount..

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinuxlinux_kernel
CWE ID-CWE-416
Use After Free
CVE-2024-33023
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.15% / 35.39%
||
7 Day CHG~0.00%
Published-05 Aug, 2024 | 14:21
Updated-20 Nov, 2024 | 19:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Graphics Linux

Memory corruption while creating a fence to wait on timeline events, and simultaneously signal timeline events.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwareqam8255p_firmwaresnapdragon_8_gen_1_mobile_platformsa6150p_firmwareqcs610qca8337sg8275p_firmwareqam8775psnapdragon_778g\+_5g_mobile_platformqamsrv1msnapdragon_870_5g_mobile_platform_firmwaresnapdragon_888_5g_mobile_platformwsa8840wcn3950_firmwaresa8150p_firmwareqca6595au_firmwarevideo_collaboration_vc3_platformsnapdragon_480_5g_mobile_platformcsra6620_firmwarecsra6640_firmwareqcm5430_firmwareqcs6125_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwareqam8295pwcn3950qcn6024_firmwaremdm9628sd_8_gen1_5g_firmwareqsm8350_firmwaresnapdragon_460_mobile_platformqsm8350snapdragon_660_mobile_platform_firmwaresm7315_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwareqca8081_firmwarewcd9375_firmwaresnapdragon_782g_mobile_platform_firmwaresnapdragon_auto_5g_modem-rf_firmwareqca6678aq_firmwaresmart_audio_400_platform_firmwareqrb5165m_firmwarewsa8840_firmwareqca6698aqqcs6125sa4155p_firmwaresa7775p_firmwaresnapdragon_8\+_gen_1_mobile_platformsnapdragon_780g_5g_mobile_platformsw5100qca6436sa6155pqca6698aq_firmwaresxr2250pwcd9341qam8775p_firmwaresa8255pqca6696_firmwaresnapdragon_x12_lte_modemqca6797aqsa8150probotics_rb5_platformwsa8830_firmwaresd660sd865_5g_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3988sd660_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresnapdragon_685_4g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwaresa8295p_firmwaresa8770pqca8337_firmwarewcd9380_firmwaresnapdragon_778g_5g_mobile_platform_firmwaressg2125psw5100psnapdragon_w5\+_gen_1_wearable_platformqcm8550qca6564auqca6574snapdragon_7c\+_gen_3_computewcd9380snapdragon_782g_mobile_platformfastconnect_6700qcs410sxr1230pvideo_collaboration_vc3_platform_firmwaresg8275pqcn9012_firmwaresm6370_firmwarewcd9335_firmwarewcn3980wsa8845qcm4325_firmwarewsa8815snapdragon_865\+_5g_mobile_platformsnapdragon_4_gen_1_mobile_platformqcs8250qca6426_firmwaresnapdragon_x62_5g_modem-rf_system_firmwareqcn9024wcn3980_firmwaresa8295pwcn6740_firmwareqcs4490_firmwaresnapdragon_xr2_5g_platformqca6678aqsnapdragon_x65_5g_modem-rf_systemsa8650p_firmwarefastconnect_6900fastconnect_6900_firmwaresnapdragon_660_mobile_platformqca6797aq_firmwaresrv1lqcn9024_firmwareqca6564a_firmwaresa7255p_firmwaresnapdragon_8\+_gen_2_mobile_platformsa8620pwsa8832sw5100p_firmwaresa8540pqcs610_firmwareqamsrv1m_firmwareqcm5430sa6145pqcs4490qca6595_firmwaresa8145pwcd9395qcs5430_firmwaresnapdragon_888\+_5g_mobile_platform_firmwareqca6391_firmwaresa4150p_firmwarewcd9370_firmwaresm8550p_firmwaresd888_firmwaresa8155pcsra6640snapdragon_695_5g_mobile_platformvideo_collaboration_vc1_platformsrv1mssg2115p_firmwareqam8620p_firmwareqam8255psa4155par8035_firmwaresnapdragon_480\+_5g_mobile_platformtalynplus_firmwarewsa8830snapdragon_662_mobile_platform_firmwaresxr2230p_firmwaresa8145p_firmwareqam8650pmdm9628_firmwareflight_rb5_5g_platformsnapdragon_865_5g_mobile_platformcsra6620flight_rb5_5g_platform_firmwaresrv1l_firmwaresnapdragon_888_5g_mobile_platform_firmwarewcd9370ssg2115psnapdragon_480\+_5g_mobile_platform_firmwareqca6426wcn3990_firmwareqrb5165n_firmwaresnapdragon_8_gen_2_mobile_platformqca9377qamsrv1hsa8530pwcd9385_firmwaretalynplusfastconnect_6200qamsrv1h_firmwareqam8295p_firmwareqcn9011_firmwaresa9000p_firmwaresnapdragon_778g_5g_mobile_platformsa7255psnapdragon_4_gen_2_mobile_platformwsa8845h_firmwaresnapdragon_8_gen_3_mobile_platformqca6595auqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwareqrb5165nsnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6564au_firmwaresa8620p_firmwaresa6155p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwaresnapdragon_870_5g_mobile_platformsa8775p_firmwareqcs6490video_collaboration_vc5_platformqcs8550_firmwarewcn3988_firmwaresrv1hsa6145p_firmwarefastconnect_6700_firmwaresa8195pwsa8810_firmwarevision_intelligence_400_platformwsa8845hsnapdragon_x62_5g_modem-rf_systemwcd9395_firmwarewcd9335snapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwaresg4150pqcs7230qca8081qcm4490snapdragon_888\+_5g_mobile_platformsa7775pqam8620pqca6174a_firmwareqcs5430sa8770p_firmwarewcd9385qcs6490_firmwaresnapdragon_x12_lte_modem_firmwarear8035wcd9375wcd9390vision_intelligence_400_platform_firmwaresnapdragon_662_mobile_platformsnapdragon_685_4g_mobile_platformwsa8815_firmwareqcm6490wsa8835_firmwarevideo_collaboration_vc5_platform_firmwaresxr2250p_firmwareqca6564asa4150psnapdragon_8_gen_2_mobile_platform_firmwaresg4150p_firmwareqcm6125_firmwareqcm4325robotics_rb5_platform_firmwarewcn3990sd865_5gfastconnect_6800qca6595qcs7230_firmwareqcn9012sd888sa8530p_firmwarewsa8835sxr1230p_firmwaresa8540p_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwaresnapdragon_auto_5g_modem-rfsd_8_gen1_5gsnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaressg2125p_firmwareqca6574asmart_audio_400_platformqca6174asm7325psa8650psa9000pqca6574_firmwaresm7325p_firmwaresxr2230pwsa8845_firmwaresnapdragon_xr2_5g_platform_firmwareqca6574a_firmwaresa8775pfastconnect_6200_firmwareqrb5165msm7315qca6391fastconnect_7800snapdragon_865\+_5g_mobile_platform_firmwareqcm4490_firmwareqcm6490_firmwarewsa8832_firmwaresrv1h_firmwareqcn9011video_collaboration_vc1_platform_firmwareqca6574ausa8155p_firmwareqcs8250_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm6125wsa8810sm8550psnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_680_4g_mobile_platformsm6370srv1m_firmwaresnapdragon_ar2_gen_1_platformqam8650p_firmwarewcn6740qca6696qcs8550sa6150psnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwareqcn6024snapdragon_8\+_gen_1_mobile_platform_firmwaresw5100_firmwareqcs410_firmwareSnapdragonqam8255p_firmwareqca9377_firmwaretalynplus_firmwaresnapdragon_662_mobile_platform_firmwaresa6150p_firmwaresa8145p_firmwaresxr2230p_firmwaresg8275p_firmwaremdm9628_firmwareflight_rb5_5g_platform_firmwarewcn3950_firmwaresrv1l_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa8150p_firmwareqca6595au_firmwarecsra6620_firmwarecsra6640_firmwareqcm5430_firmwareqcs6125_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn3990_firmwareqrb5165n_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9385_firmwareqcn6024_firmwareqamsrv1h_firmwaresd_8_gen1_5g_firmwareqsm8350_firmwaresnapdragon_660_mobile_platform_firmwareqam8295p_firmwareqcn9011_firmwaresa9000p_firmwaresm7315_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwarewcd9375_firmwareqca8081_firmwarewsa8845h_firmwareqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6564au_firmwaresa8620p_firmwaresa6155p_firmwaresnapdragon_auto_5g_modem-rf_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwareqca6678aq_firmwaresmart_audio_400_platform_firmwaresa8775p_firmwareqrb5165m_firmwarewsa8840_firmwaresa4155p_firmwareqcs8550_firmwarewcn3988_firmwaresa6145p_firmwaresa7775p_firmwarefastconnect_6700_firmwarewsa8810_firmwaresnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwarewcd9395_firmwareqca6698aq_firmwareqca6174a_firmwaresa8770p_firmwareqam8775p_firmwareqca6696_firmwareqcs6490_firmwaresnapdragon_x12_lte_modem_firmwarevision_intelligence_400_platform_firmwarewsa8830_firmwaresd865_5g_firmwarewsa8815_firmwarewsa8835_firmwaresd660_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwaresa8295p_firmwaresxr2250p_firmwaresg4150p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqcm6125_firmwarequalcomm_video_collaboration_vc1_platform_firmwarerobotics_rb5_platform_firmwareqca8337_firmwarewcd9380_firmwaresnapdragon_778g_5g_mobile_platform_firmwareqcs7230_firmwaresa8530p_firmwaresxr1230p_firmwaresa8540p_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaressg2125p_firmwareqcn9012_firmwaresm6370_firmwarewcd9335_firmwareqcm4325_firmwareqca6574_firmwaresm7325p_firmwarewsa8845_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwareqca6574a_firmwarefastconnect_6200_firmwaresnapdragon_x62_5g_modem-rf_system_firmwarewcn3980_firmwarewcn6740_firmwareqcm4490_firmwareqcs4490_firmwareqcm6490_firmwaresa8650p_firmwarewsa8832_firmwarefastconnect_6900_firmwaresrv1h_firmwareqca6797aq_firmwaresa8155p_firmwareqca6564a_firmwareqcn9024_firmwaresa7255p_firmwareqcs8250_firmwarewcd9341_firmwarefastconnect_7800_firmwaresw5100p_firmwareqcs610_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqamsrv1m_firmwaresrv1m_firmwareqam8650p_firmwareqca6595_firmwareqcs5430_firmwareqca6391_firmwaresa4150p_firmwarewcd9370_firmwaresm8550p_firmwarequalcomm_video_collaboration_vc5_platform_firmwaresd888_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwaressg2115p_firmwaresw5100_firmwareqam8620p_firmwareqcs410_firmwarear8035_firmware
CWE ID-CWE-416
Use After Free
CVE-2023-52629
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-8.4||HIGH
EPSS-0.02% / 3.81%
||
7 Day CHG~0.00%
Published-29 Mar, 2024 | 09:13
Updated-11 May, 2026 | 19:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
sh: push-switch: Reorder cleanup operations to avoid use-after-free bug

In the Linux kernel, the following vulnerability has been resolved: sh: push-switch: Reorder cleanup operations to avoid use-after-free bug The original code puts flush_work() before timer_shutdown_sync() in switch_drv_remove(). Although we use flush_work() to stop the worker, it could be rescheduled in switch_timer(). As a result, a use-after-free bug can occur. The details are shown below: (cpu 0) | (cpu 1) switch_drv_remove() | flush_work() | ... | switch_timer // timer | schedule_work(&psw->work) timer_shutdown_sync() | ... | switch_work_handler // worker kfree(psw) // free | | psw->state = 0 // use This patch puts timer_shutdown_sync() before flush_work() to mitigate the bugs. As a result, the worker and timer will be stopped safely before the deallocate operations.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linuxlinux_kernel
CWE ID-CWE-416
Use After Free
CVE-2020-11234
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.04% / 10.98%
||
7 Day CHG~0.00%
Published-07 Apr, 2021 | 07:55
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When sending a socket event message to a user application, invalid information will be passed if socket is freed by other thread resulting in a Use After Free condition in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfe3100qfe2080fc_firmwareqca9377_firmwareqfs2580qpm5679_firmwaremdm9640_firmwarepmd9607_firmwareqfe4455fc_firmwareqca8337qfs2530qln1030pm6125qat5522_firmwarewcn3950_firmwarepm8150aqdm5670qca6595au_firmwareqpm5541_firmwaresa6155pm7150lqcc1110_firmwarepm8998_firmwareqpa8821wtr5975_firmwareqpa5580_firmwaremsm8108wcn3998wcd9371_firmwaremsm8108_firmwarewcn3950mdm9206_firmwareqsw8573_firmwarewcn3660bsd450_firmwareqfe4320qsw8574_firmwaresmb2351_firmwarepm8953_firmwareqpa4360_firmwarewcn3998_firmwareqfe2520_firmwareapq8009w_firmwarepm855papq8053_firmwareqca6420wtr4605_firmwareqca9367_firmwarepm660_firmwarepm8150bsa8155_firmwareqfe2101qca6430qat3522qfe4455fcwcd9340sdm830_firmwaresd765gsdr660msm8209_firmwaresdr865mdm9250_firmwareqdm5620_firmwaresmb1358qca6696_firmwareqln5020wcd9371sd870_firmwaresmb1350pmm855au_firmwarewtr3950qfe3340qdm5621qtc800sqat3514_firmwaresd660sd712pm640p_firmwaresd660_firmwareqcn7606_firmwareqat5516_firmwaresd450pm855l_firmwareqtc410swcn3991qpa8801sdm429wpm8150l_firmwareqat5533_firmwaresdx55m_firmwaresdxr25gqpa8673_firmwarepm6150sd670_firmwareqca6574sd632_firmwareqpa8842sdr052_firmwarepmm8996auwcd9380qualcomm215qpm5579_firmwaresmb1380_firmwareqfe4309_firmwaresmb1381pm855p_firmwareqfe3100_firmwarepm7250qca9379_firmwarewtr4905qpa8803sdx24_firmwaresd439_firmwaresdxr25g_firmwarepmd9645qdm2301wcd9340_firmwarewsa8815qfe2101_firmwareqca6584_firmwareqdm2301_firmwareqdm5621_firmwareqpm6375sd835wcn3980_firmwaresd730qfe3320_firmwarepm660l_firmwarepm8008qtm525_firmwarepme605_firmwarepme605sd678_firmwareapq8064au_firmwareqpm5621_firmwareqln1021aq_firmwareqcs603rsw8577qpa6560_firmwareqpa8802_firmwareqfe4308_firmwareqpm5621qpm6582sd670pm8009_firmwareapq8009wqfe4303qfs2580_firmwareqcn7605_firmwarepm8150lpmi8998_firmwarepm660a_firmwarepm215ar8031qpm5577wtr2965sdm630_firmwaresa2150pqca6391_firmwaresd820_firmwarepmx20_firmwarepm8150pmi8937_firmwarewcd9370_firmwareqat3516_firmwaresdx55apq8053csra6640qat3555_firmwarepmi8994qpa8803_firmwarewcn3660qca9379pm855bsmb2351qln1031qcn7606pm8909pm660qet6110_firmwareqpm6325pm6125_firmwareqbt1500mdm9628_firmwaremdm9650pmx24_firmwareqbt1500_firmwarepmk8001pmm855aumdm9250qca6420_firmwareapq8009_firmwarepm7150asd675_firmwareqpa4361_firmwareqca6426wcn3990_firmwareqca9377qpa5373_firmwaresdw2500_firmwarewcd9385_firmwareqdm5650_firmwareqpa4340_firmwarewcd9326_firmwarewhs9410wcn3615_firmwarewtr2955rgr7640au_firmwarepm7250_firmwaresdr845_firmwareqdm5620qln1021aqsmb1380pmk8002_firmwareqsw6310_firmwaresa8155qca6584qln1031_firmwaresdx55_firmwareqat5533wcn3615sm7250p_firmwarewcn3610_firmwareqsm7250_firmwarepm7150l_firmwareqca6584aumsm8208qat5515_firmwarepm855qpm8830_firmwaresd429pm8250qca9367qfe2082fc_firmwaresdm630mdm9607_firmwaremdm9655_firmwareqfs2530_firmwarepmx55sd205sd429_firmwarepm8150c_firmwareqca6421qdm3301qpa8842_firmwareqat3519_firmwarepm8953qat5515qpm5677qat3514wcd9326wcd9335pm8004_firmwaresdr8150_firmwarepm439qtc800h_firmwareqca6390wcd9375aqt1000qln4642msm8917_firmwareqpm5677_firmwaresdx20_firmwarewsa8815_firmwarewtr3925_firmwarepmi8937pm8998sdw3100smr525_firmwareqfe4301_firmwareapq8017qln1020_firmwarepm670a_firmwarepmx55_firmwarewtr2955_firmwareqbt1000_firmwareqfe4373fc_firmwareqca6595pm8150_firmwareqpm8830pmm8996au_firmwareqat5522pm8150csd665_firmwareqpa4360qpa4361mdm9206qpm5577_firmwareqdm5679_firmwaresmr525qca6310_firmwareqfe4305_firmwarepmr525pm8150a_firmwareqca6574_firmwarewtr3950_firmwareqln1036aq_firmwaresd665pm6150_firmwareqca6175asd765pmx20pmd9607qca6574a_firmwareqat3555apq8009qfe2082fcsd8c_firmwarewtr2965_firmwarepm670_firmwareqln1036aqqtc801sqfe3320sd710mdm9607pm8008_firmwareqln1035bd_firmwaresdx20m_firmwarepmw3100pmx50sdr8250sd768gqln1030_firmwaresmb1350_firmwarepmw3100_firmwarepm8004pm640lpmk8002sdw2500apq8096au_firmwaresd845sdm830smb1357qca6175a_firmwareqpa5580qpm5579qfe2550pmi8996qca6431_firmwareqpa8802wcd9360_firmwareqpm6585_firmwareqat3519qbt2000_firmwarepm855a_firmwareqtc800hsdr8250_firmwareqca6335msm8917csra6620_firmwareqcs605_firmwareqln1020wtr3905qdm5671csra6640_firmwarepmc1000hqpm4650_firmwareqat3518sd8csd632smr526_firmwaremdm9628pm640a_firmwareqpa5460wgr7640_firmwareqdm2305_firmwareqpm5670_firmwaresd710_firmwareqca4020qdm5652qca6574au_firmwarewcd9375_firmwareqpm5679qbt2000sa6155_firmwaremsm8909wwcd9360sdx20mpmx50_firmwarewhs9410_firmwareqpa5460_firmwarewcn3999qdm3301_firmwarepm8996qsm7250qcc1110qcs405smb1360qualcomm215_firmwareqfe3440fcrsw8577_firmwarepm439_firmwareqca4020_firmwareqca6436sa6155pqcs603_firmwareqpa6560wcn3660_firmwarewcd9341pmi8952mdm9655pm8937_firmwareqca6431qet4100_firmwareqfe4320_firmwaresd855_firmwareqdm5650wtr3925qfe2080fcsdr052smb1390sdw3100_firmwaremsm8208_firmwareqet4100wcn3610msm8608mdm9640qpa8686_firmwareqpm6585qca8337_firmwarewcd9380_firmwaresmb1355qln4650qtc800t_firmwarewcd9330msm8996au_firmwarewgr7640csr6030qet5100qdm5671_firmwareqpa8801_firmwareqca6564ausd636pm8005_firmwareqet4101_firmwarepm7250bqln4642_firmwarepmk8001_firmwaresmb1355_firmwarepm7250b_firmwarepmd9655_firmwaresmb1351_firmwarepm8996_firmwareqet4200aq_firmwaresdx50m_firmwaresmb1395smb358spm660lsmb358s_firmwarear8151smr526wtr5975qca6174qca6430_firmwareqtc801s_firmwarewcd9335_firmwareqat3522_firmwarewcn3980qca6335_firmwareqsw8573qcs605qbt1000qca6320mdm9650_firmwareqca6426_firmwarewcn3660b_firmwarewcn3680qfe4309pm8009sdr051_firmwarewcd9330_firmwaresdx55mpm670aqca6421_firmwarewtr3905_firmwareqfe4373fcmsm8953qat3518_firmwarepmi8998qfe2520qsw8574sd821_firmwarear8031_firmwarewcn3680_firmwarepm855lqdm5670_firmwaresd8655gpm7150a_firmwarepm8150b_firmwareqfe4302pmc1000h_firmwareqca6564a_firmwarepmd9645_firmwaresd870pm670sd210_firmwareqdm5677pm8005pm855_firmwareqdm2302sdxr1pm855b_firmwareapq8096auqca6595_firmwareqcs405_firmwareqpm6582_firmwareqpm6375_firmwarepm640l_firmwarepmi8996_firmwareqln4650_firmwareqet5100msa8155psd675wtr4605sd439qet4101qat3516pm670lqpm5658ar8035_firmwareqpm5658_firmwarewcn3991_firmwareqdm5652_firmwareqfe4465fcsd678sdr051qln5030pmi632qpa2625_firmwareqfe2081fc_firmwaresmb1360_firmwarecsra6620qet5100_firmwareqpa5373pm670l_firmwaresdr660gsd765g_firmwareqpa8686smb1358_firmwareqca6390_firmwareqca6174_firmwaresd730_firmwarewcd9370pmr525_firmwareqca6584au_firmwareqfe3340_firmwarear8151_firmwarepmi632_firmwareqcn7605qpm5541qat5516qpa8821_firmwareqfe4308sdr660g_firmwarepm3003aqca6320_firmwarewcn3680b_firmwareqca6595auwcn3999_firmwareqca6436_firmwareqtc800tqca6564au_firmwareqdm2305sa6155p_firmwareqca6310pm8937qfe2081fcqln5020_firmwaresa515m_firmwaresd821sd712_firmwareapq8017_firmwarewsa8810_firmwaresmb231sd765_firmwareqdm5677_firmwareqet4200aqqca6174a_firmwarewcd9385qpm6325_firmwareqdm2302_firmwareqat3550_firmwareqln5040_firmwarear8035apq8064auqpa8673qfe2550_firmwareqln5030_firmwaremsm8953_firmwaresd210wcn3620_firmwareqfe4302_firmwaresd820wcn3620csr6030_firmwareqca6564apmx24qet6110pmi8952_firmwareqln5040qpm8895sdr845qpm5670wcn3990qfe3440fc_firmwaresdx24pmi8994_firmwaremsm8909w_firmwaremsm8996ausdm429w_firmwarergr7640auqln1035bdpm855asdr660_firmwarepm8909_firmwareqca6574apm8916_firmwaresmb1390_firmwareqca6174aqfe4303_firmwareqet5100m_firmwareqpm4650qtm525sa515msa2150p_firmwaresd855sd8cxqfe4305pm640psd768g_firmwaresdr865_firmwaremsm8209qfe4465fc_firmwarepm8250_firmwaresmb1351qca6391sd8cx_firmwaresdxr1_firmwaresmb1357_firmwareaqt1000_firmwarepm215_firmwareqpm8895_firmwarepm660aqpa4340sdx50mpm640asdr8150sdx20pm8916smb1395_firmwarepmd9655qca6574ausa8155p_firmwaresd205_firmwareqsw6310sd8655g_firmwarewcd9341_firmwarewsa8810qtc410s_firmwaresmb231_firmwarewtr4905_firmwareqat3550qdm5679wcn3680bsd835_firmwarepm3003a_firmwareqca6696qfe4301qtc800s_firmwaresmb1381_firmwaresd845_firmwaremsm8608_firmwareqpa2625sm7250psd636_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-416
Use After Free
CVE-2013-1340
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.4||HIGH
EPSS-0.96% / 76.59%
||
7 Day CHG~0.00%
Published-10 Jul, 2013 | 01:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Dereference Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_rtwindows_7windows_server_2008windows_vistawindows_xpwindows_8windows_server_2012windows_server_2003n/a
CWE ID-CWE-416
Use After Free
CVE-2026-7111
Matching Score-4
Assigner-CPAN Security Group
ShareView Details
Matching Score-4
Assigner-CPAN Security Group
CVSS Score-8.4||HIGH
EPSS-0.02% / 5.08%
||
7 Day CHG~0.00%
Published-29 Apr, 2026 | 14:22
Updated-06 May, 2026 | 16:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Text::CSV_XS versions before 1.62 for Perl have a use-after-free when registered callbacks extend the Perl argument stack, which may enable type confusion or memory corruption

Text::CSV_XS versions before 1.62 for Perl have a use-after-free when registered callbacks extend the Perl argument stack, which may enable type confusion or memory corruption. The Parse, print, getline, and getline_all methods invoke registered callbacks (for example after_parse, before_print, or on_error) and cache the Perl argument stack pointer across the call. If a callback extends the argument stack enough to trigger a reallocation, the return value is written through the stale pointer into the freed buffer, and the caller reads the original $self argument as the return value instead. Calling code that expects parsed data from getline_all receives the Text::CSV_XS object in its place, leading to logic errors or crashes. Text::CSV_XS objects used without any registered callbacks are not affected.

Action-Not Available
Vendor-hmbrandHMBRAND
Product-text\Text::CSV_XS
CWE ID-CWE-416
Use After Free
CWE ID-CWE-825
Expired Pointer Dereference
CVE-2025-62557
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.4||HIGH
EPSS-0.05% / 15.29%
||
7 Day CHG-0.06%
Published-09 Dec, 2025 | 17:55
Updated-16 Apr, 2026 | 14:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Office Remote Code Execution Vulnerability

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-office365_appsoffice_long_term_servicing_channelMicrosoft Office LTSC for Mac 2024Microsoft Office LTSC 2024Microsoft Office 2019Microsoft Office for AndroidMicrosoft Office 2016Microsoft Office LTSC for Mac 2021Microsoft 365 Apps for EnterpriseMicrosoft Office LTSC 2021
CWE ID-CWE-416
Use After Free
CVE-2023-43546
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.10% / 26.07%
||
7 Day CHG~0.00%
Published-04 Mar, 2024 | 10:48
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Automotive Multimedia

Memory corruption while invoking HGSL IOCTL context create.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwareqca6678aq_firmwareqcm8550_firmwareqcs410_firmwaresa6150p_firmwaresw5100pwsa8845_firmwaresnapdragon_480_5g_mobileqca6595qcs610_firmwarewcd9335srv1mqca6678aqqca8081_firmwarewcd9370snapdragon_x35_5g_modem-rfar8035_firmwareqca6696wsa8830_firmwarewcd9340_firmwareqrb5165mwcd9341_firmwaresa4150p_firmwarewcd9395_firmwareqcc710_firmwarefastconnect_6700qca6564auqcs6125_firmwaresnapdragon_685_4g_mobilesa4150pwsa8815_firmwaresa8195p_firmwareqca8337_firmwareqca8337qdu1110wcd9395sg8275p_firmwareqca6574au_firmwareqam8295pwcd9341qca6574auqru1032wcd9390wcn3950wsa8810_firmwarewsa8845h_firmwarecsra6640qcs6125flight_rb5_5gsa9000p_firmwaresrv1hqca6797aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwarewsa8815sa8295p_firmwaresmart_audio_400_firmwaresa4155p_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psa8770pqcm6125_firmwareqca6584auqcn6274_firmwareqcn9011_firmwareqcc710qru1062_firmwaresw5100_firmwareqru1062qfw7114_firmwareqca6595_firmwareqcs7230fastconnect_7800_firmwarefastconnect_6900snapdragon_w5\+_gen_1_wearable_firmwarevideo_collaboration_vc1_platformqru1032_firmwareqep8111sa7255pqfw7114wcd9385_firmwarefastconnect_6900_firmwareqam8255p_firmwarerobotics_rb5_firmwarewcd9380sa6145p_firmwareqam8255psa8150psnapdragon_680_4g_mobilewsa8845sa6155pqcm6125snapdragon_auto_5g_modem-rf_firmwareqca6564au_firmwarewsa8810qam8650pqdu1000_firmwarevideo_collaboration_vc5_platform_firmwaresa9000psrv1h_firmwaresw5100qca6595auvideo_collaboration_vc3_platformsnapdragon_4_gen_1_mobile_firmwareqdu1010sa6155p_firmwaresnapdragon_685_4g_mobile_firmwarewsa8840qam8295p_firmwaresrv1m_firmwareqcs8550_firmwaresnapdragon_x35_5g_modem-rf_firmwareqdu1210_firmwaresnapdragon_8_gen_2_mobile_firmwareqfw7124_firmwareqca6564a_firmwareqca6698aq_firmwarewcd9385qcn9012snapdragon_695_5g_mobile_firmwaresnapdragon_680_4g_mobile_firmwaresa8255pqcs7230_firmwarewcd9390_firmwaresnapdragon_8_gen_2_mobileqep8111_firmwaresg8275pwcd9370_firmwareqdx1011_firmwaresnapdragon_auto_5g_modem-rfqdu1110_firmwareflight_rb5_5g_firmwareqdu1000sa7255p_firmwareqca6574asnapdragon_8\+_gen_2_mobileqru1052qca6174asa8195pwcd9340csra6640_firmwareqcs8250_firmwareqdu1210qamsrv1mrobotics_rb5snapdragon_480\+_5g_mobile_firmwareqca6174a_firmwaresnapdragon_auto_5g_modem-rf_gen_2qam8650p_firmwarevideo_collaboration_vc5_platformsm8550p_firmwareqcm8550wcn3988qcs6490_firmwareqca6584au_firmwarewcd9335_firmwareqcn6274qca6574qfw7124qrb5165n_firmwaresa8775pqca6595au_firmwareqca6391_firmwaresnapdragon_w5\+_gen_1_wearablewsa8835wsa8840_firmwareqdu1010_firmwaresw5100p_firmwareqcn9011sa8775p_firmwareqamsrv1hqca6696_firmwaresmart_audio_400wsa8845hwcd9380_firmwaresa6150pqca6574_firmwareqcs410sa8155p_firmwarecsra6620qca6564aqca8081mdm9628sa8155psg4150pqam8775pqca6797aqmdm9628_firmwaresm8550pwcn3980_firmwaresa6145psnapdragon_x75_5g_modem-rfwsa8830qcm4325_firmwaresa8255p_firmwarear8035qca6574a_firmwareqamsrv1m_firmwaresnapdragon_4_gen_1_mobileqrb5165m_firmwaresa8650p_firmwareqcm4325wcd9375_firmwareqca6391qcn6224qcn9012_firmwareqca6698aqsg4150p_firmwarewcn3950_firmwareqru1052_firmwareqrb5165ncsra6620_firmwaresa8295psa8770p_firmwareqcs8550snapdragon_480\+_5g_mobilefastconnect_6200fastconnect_7800sa8145p_firmwaresa8650pqam8775p_firmwaresnapdragon_480_5g_mobile_firmwaresnapdragon_8\+_gen_2_mobile_firmwareqdx1011wcd9375sa8150p_firmwarewcn3988_firmwarefastconnect_6700_firmwareqamsrv1h_firmwarevideo_collaboration_vc3_platform_firmwaresa8145psnapdragon_x75_5g_modem-rf_firmwarewsa8835_firmwareqcs6490qcs8250snapdragon_695_5g_mobilewcn3980fastconnect_6200_firmwareqdx1010qcn6224_firmwareqcs610Snapdragonqca6574a_firmwaresnapdragon_4_gen_1_mobile_platform_firmwareqca6564au_firmwarewcn3980_firmwarequalcomm_video_collaboration_vc1_platform_firmwaremdm9628_firmwareqcm6125_firmwareqep8111_firmwaresnapdragon_x35_5g_modem-rf_system_firmwareflight_rb5_5g_platform_firmwareqca6696_firmwaresa8150p_firmwaresa8775p_firmwareqcs7230_firmwaresrv1h_firmwarewsa8835_firmwareqca8337_firmwaresa8255p_firmwarewcn3988_firmwarequalcomm_video_collaboration_vc5_platform_firmwarefastconnect_6700_firmwareqca6595au_firmwarewcd9390_firmwareqamsrv1h_firmwaresm8550p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqcs6490_firmwaresa8155p_firmwarefastconnect_6200_firmwaresa4155p_firmwarewcd9395_firmwaresa6145p_firmwareqcn6224_firmwareqdu1010_firmwaresa8295p_firmwaresa4150p_firmwaresg4150p_firmwaresa6150p_firmwareqca6174a_firmwarewcd9375_firmwareqfw7124_firmwareqca6391_firmwareqca6698aq_firmwareqca8081_firmwaresnapdragon_680_4g_mobile_platform_firmwarefastconnect_6900_firmwareqdu1000_firmwaresa8770p_firmwarewcd9385_firmwarewcd9370_firmwarewsa8840_firmwarewcd9380_firmwareqca6584au_firmwareqam8775p_firmwarewsa8810_firmwarefastconnect_7800_firmwarecsra6640_firmwaresw5100p_firmwarewcd9341_firmwarewsa8845h_firmwareqcm4325_firmwareqfw7114_firmwarewsa8830_firmwareqcm8550_firmwareqdu1110_firmwareqam8295p_firmwarecsra6620_firmwareqca6574_firmwarewcd9335_firmwaresg8275p_firmwareqamsrv1m_firmwareqca6595_firmwareqcn6274_firmwaresa7255p_firmwaresa8145p_firmwareqam8650p_firmwareqcn9011_firmwareqru1052_firmwarequalcomm_video_collaboration_vc3_platform_firmwarerobotics_rb5_platform_firmwarewcn3950_firmwareqdu1210_firmwaresnapdragon_480_5g_mobile_platform_firmwareqdx1010_firmwareqcs610_firmwareqca6564a_firmwaresrv1m_firmwareqru1062_firmwarewsa8815_firmwareqrb5165n_firmwareqca6797aq_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresa8195p_firmwareqcn9012_firmwareqdx1011_firmwaresw5100_firmwareqrb5165m_firmwaresa9000p_firmwarewcd9340_firmwarear8035_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewsa8845_firmwareqcs6125_firmwareqcc710_firmwaresmart_audio_400_platform_firmwareqru1032_firmwareqca6574au_firmwaresnapdragon_auto_5g_modem-rf_firmwareqcs410_firmwareqam8255p_firmwaresa6155p_firmwaresa8650p_firmwareqcs8250_firmwareqca6678aq_firmwareqcs8550_firmware
CWE ID-CWE-416
Use After Free
CVE-2023-43547
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.10% / 26.07%
||
7 Day CHG~0.00%
Published-04 Mar, 2024 | 10:48
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Automotive Multimedia

Memory corruption while invoking IOCTLs calls in Automotive Multimedia.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwareqca6678aq_firmwareqcm8550_firmwareqcs410_firmwaresa6150p_firmwaresw5100pwsa8845_firmwaresnapdragon_480_5g_mobileqca6595qcs610_firmwarewcd9335srv1mqca6678aqqca8081_firmwarewcd9370snapdragon_x35_5g_modem-rfar8035_firmwareqca6696wsa8830_firmwarewcd9340_firmwareqrb5165mwcd9341_firmwaresa4150p_firmwarewcd9395_firmwareqcc710_firmwarefastconnect_6700qca6564auqcs6125_firmwaresnapdragon_685_4g_mobilesa4150pwsa8815_firmwaresa8195p_firmwareqca8337_firmwareqca8337qdu1110wcd9395sg8275p_firmwareqca6574au_firmwareqam8295pwcd9341qca6574auqru1032wcd9390wcn3950wsa8810_firmwarewsa8845h_firmwarecsra6640qcs6125flight_rb5_5gsa9000p_firmwaresrv1hqca6797aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwarewsa8815sa8295p_firmwaresmart_audio_400_firmwaresa4155p_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psa8770pqcm6125_firmwareqca6584auqcn6274_firmwareqcn9011_firmwareqcc710qru1062_firmwaresw5100_firmwareqru1062qfw7114_firmwareqca6595_firmwareqcs7230fastconnect_7800_firmwarefastconnect_6900snapdragon_w5\+_gen_1_wearable_firmwarevideo_collaboration_vc1_platformqru1032_firmwareqep8111sa7255pqfw7114wcd9385_firmwarefastconnect_6900_firmwareqam8255p_firmwarerobotics_rb5_firmwarewcd9380sa6145p_firmwareqam8255psa8150psnapdragon_680_4g_mobilewsa8845sa6155pqcm6125snapdragon_auto_5g_modem-rf_firmwareqca6564au_firmwarewsa8810qam8650pqdu1000_firmwarevideo_collaboration_vc5_platform_firmwaresa9000psrv1h_firmwaresw5100qca6595auvideo_collaboration_vc3_platformsnapdragon_4_gen_1_mobile_firmwareqdu1010sa6155p_firmwaresnapdragon_685_4g_mobile_firmwarewsa8840qam8295p_firmwaresrv1m_firmwareqcs8550_firmwaresnapdragon_x35_5g_modem-rf_firmwareqdu1210_firmwaresnapdragon_8_gen_2_mobile_firmwareqfw7124_firmwareqca6564a_firmwareqca6698aq_firmwarewcd9385qcn9012snapdragon_695_5g_mobile_firmwaresnapdragon_680_4g_mobile_firmwaresa8255pqcs7230_firmwarewcd9390_firmwaresnapdragon_8_gen_2_mobileqep8111_firmwaresg8275pwcd9370_firmwareqdx1011_firmwaresnapdragon_auto_5g_modem-rfqdu1110_firmwareflight_rb5_5g_firmwareqdu1000sa7255p_firmwareqca6574asnapdragon_8\+_gen_2_mobileqru1052qca6174asa8195pwcd9340csra6640_firmwareqcs8250_firmwareqdu1210qamsrv1mrobotics_rb5snapdragon_480\+_5g_mobile_firmwareqca6174a_firmwaresnapdragon_auto_5g_modem-rf_gen_2qam8650p_firmwarevideo_collaboration_vc5_platformsm8550p_firmwareqcm8550wcn3988qcs6490_firmwareqca6584au_firmwarewcd9335_firmwareqcn6274qca6574qfw7124qrb5165n_firmwaresa8775pqca6595au_firmwareqca6391_firmwaresnapdragon_w5\+_gen_1_wearablewsa8835wsa8840_firmwareqdu1010_firmwaresw5100p_firmwareqcn9011sa8775p_firmwareqamsrv1hqca6696_firmwaresmart_audio_400wsa8845hwcd9380_firmwaresa6150pqca6574_firmwareqcs410sa8155p_firmwarecsra6620qca6564aqca8081mdm9628sa8155psg4150pqam8775pqca6797aqmdm9628_firmwaresm8550pwcn3980_firmwaresa6145psnapdragon_x75_5g_modem-rfwsa8830qcm4325_firmwaresa8255p_firmwarear8035qca6574a_firmwareqamsrv1m_firmwaresnapdragon_4_gen_1_mobileqrb5165m_firmwaresa8650p_firmwareqcm4325wcd9375_firmwareqca6391qcn6224qcn9012_firmwareqca6698aqsg4150p_firmwarewcn3950_firmwareqru1052_firmwareqrb5165ncsra6620_firmwaresa8295psa8770p_firmwareqcs8550snapdragon_480\+_5g_mobilefastconnect_6200fastconnect_7800sa8145p_firmwaresa8650pqam8775p_firmwaresnapdragon_480_5g_mobile_firmwaresnapdragon_8\+_gen_2_mobile_firmwareqdx1011wcd9375sa8150p_firmwarewcn3988_firmwarefastconnect_6700_firmwareqamsrv1h_firmwarevideo_collaboration_vc3_platform_firmwaresa8145psnapdragon_x75_5g_modem-rf_firmwarewsa8835_firmwareqcs6490qcs8250snapdragon_695_5g_mobilewcn3980fastconnect_6200_firmwareqdx1010qcn6224_firmwareqcs610Snapdragonqca6574a_firmwaresnapdragon_4_gen_1_mobile_platform_firmwareqca6564au_firmwarewcn3980_firmwarequalcomm_video_collaboration_vc1_platform_firmwaremdm9628_firmwareqcm6125_firmwareqep8111_firmwaresnapdragon_x35_5g_modem-rf_system_firmwareflight_rb5_5g_platform_firmwareqca6696_firmwaresa8150p_firmwaresa8775p_firmwareqcs7230_firmwaresrv1h_firmwarewsa8835_firmwareqca8337_firmwaresa8255p_firmwarewcn3988_firmwarequalcomm_video_collaboration_vc5_platform_firmwarefastconnect_6700_firmwareqca6595au_firmwarewcd9390_firmwareqamsrv1h_firmwaresm8550p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqcs6490_firmwaresa8155p_firmwarefastconnect_6200_firmwaresa4155p_firmwarewcd9395_firmwaresa6145p_firmwareqcn6224_firmwareqdu1010_firmwaresa8295p_firmwaresa4150p_firmwaresg4150p_firmwaresa6150p_firmwareqca6174a_firmwarewcd9375_firmwareqfw7124_firmwareqca6391_firmwareqca6698aq_firmwareqca8081_firmwaresnapdragon_680_4g_mobile_platform_firmwarefastconnect_6900_firmwareqdu1000_firmwaresa8770p_firmwarewcd9385_firmwarewcd9370_firmwarewsa8840_firmwarewcd9380_firmwareqca6584au_firmwareqam8775p_firmwarewsa8810_firmwarefastconnect_7800_firmwarecsra6640_firmwaresw5100p_firmwarewcd9341_firmwarewsa8845h_firmwareqcm4325_firmwareqfw7114_firmwarewsa8830_firmwareqcm8550_firmwareqdu1110_firmwareqam8295p_firmwarecsra6620_firmwareqca6574_firmwarewcd9335_firmwaresg8275p_firmwareqamsrv1m_firmwareqca6595_firmwareqcn6274_firmwaresa7255p_firmwaresa8145p_firmwareqam8650p_firmwareqcn9011_firmwareqru1052_firmwarequalcomm_video_collaboration_vc3_platform_firmwarerobotics_rb5_platform_firmwarewcn3950_firmwareqdu1210_firmwaresnapdragon_480_5g_mobile_platform_firmwareqdx1010_firmwareqcs610_firmwareqca6564a_firmwaresrv1m_firmwareqru1062_firmwarewsa8815_firmwareqrb5165n_firmwareqca6797aq_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresa8195p_firmwareqcn9012_firmwareqdx1011_firmwaresw5100_firmwareqrb5165m_firmwaresa9000p_firmwarewcd9340_firmwarear8035_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewsa8845_firmwareqcs6125_firmwareqcc710_firmwaresmart_audio_400_platform_firmwareqru1032_firmwareqca6574au_firmwaresnapdragon_auto_5g_modem-rf_firmwareqcs410_firmwareqam8255p_firmwaresa6155p_firmwaresa8650p_firmwareqcs8250_firmwareqca6678aq_firmwareqcs8550_firmware
CWE ID-CWE-416
Use After Free
CVE-2023-43514
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.11% / 29.21%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in DSP Services

Memory corruption while invoking IOCTLs calls from user space for internal mem MAP and internal mem UNMAP.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwareqcm8550_firmwaresw5100pwsa8845_firmwareqca6595wcd9370qca8081_firmwarear8035_firmwareqca6696wsa8830_firmwarewcd9340_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwarewcd9395_firmwareqcc710_firmwarefastconnect_6700wsa8815_firmwaresa8195p_firmwareqca8337_firmwareqca8337qdu1110wcd9395snapdragon_680_4g_mobile_platformsg8275p_firmwareqcm6490_firmwareqca6574au_firmwareqam8295pqca6574auqru1032wcd9390flight_rb5_5g_platformwcn3950wsa8810_firmwarewsa8845h_firmwareqca6797aq_firmwaresa8295p_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwareqcn6274_firmwareqcc710qru1062_firmwaresw5100_firmwaresnapdragon_480\+_5g_mobile_platform_firmwareqru1062snapdragon_695_5g_mobile_platform_firmwareqfw7114_firmwareqca6595_firmwareqcs7230fastconnect_7800_firmwarefastconnect_6900snapdragon_685_4g_mobile_platform_firmwareqru1032_firmwareqfw7114wcd9385_firmwarefastconnect_6900_firmwareqam8255p_firmwarewcd9380qam8255psnapdragon_4_gen_1_mobile_platformsnapdragon_685_4g_mobile_platformsnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845sa6155pwsa8810qam8650pqdu1000_firmwarevideo_collaboration_vc5_platform_firmwaresnapdragon_8\+_gen_2_mobile_platformsw5100qca6595auvideo_collaboration_vc3_platformqdu1010sa6155p_firmwarewsa8840qam8295p_firmwareqcs8550_firmwareqdu1210_firmwareqfw7124_firmwareqca6698aq_firmwarewcd9385snapdragon_8_gen_2_mobile_platformsa8255pqcs7230_firmwarewcd9390_firmwaresg8275pwcd9370_firmwareqdx1011_firmwareqdu1110_firmwareqdu1000qca6574aqru1052sa8195pwcd9340qcs8250_firmwareqdu1210qcm6490qam8650p_firmwarevideo_collaboration_vc5_platformsm8550p_firmwareqcm8550wcn3988qcs6490_firmwarewcn3980_firmwareqcn6274qca6574qfw7124qrb5165n_firmwaresnapdragon_480_5g_mobile_platform_firmwareqca6595au_firmwareqca6391_firmwaresnapdragon_x75_5g_modem-rf_systemwsa8835wsa8840_firmwareqdu1010_firmwaresw5100p_firmwareqca6696_firmwarewsa8845hwcd9380_firmwareqca6574_firmwaresa8155p_firmwareqca8081wsa8815sg4150psa8155pwsa8830qam8775pqca6797aqsm8550pqcm4325_firmwaresa8255p_firmwareflight_rb5_5g_platform_firmwarear8035qca6574a_firmwaresnapdragon_480\+_5g_mobile_platformqcm4325wcd9375_firmwarerobotics_rb5_platformqca6391qcn6224qca6698aqsg4150p_firmwaresnapdragon_480_5g_mobile_platformqru1052_firmwareqrb5165nsa8295psnapdragon_8_gen_2_mobile_platform_firmwarewcn3950_firmwarerobotics_rb5_platform_firmwareqcs8550fastconnect_6200fastconnect_7800qam8775p_firmwareqdx1011wcd9375snapdragon_w5\+_gen_1_wearable_platformwcn3988_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwarewsa8835_firmwaresnapdragon_680_4g_mobile_platform_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqcs6490qcs8250wcn3980fastconnect_6200_firmwareqdx1010qcn6224_firmwareSnapdragonsnapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-59236
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.4||HIGH
EPSS-0.06% / 19.81%
||
7 Day CHG+0.01%
Published-14 Oct, 2025 | 17:00
Updated-26 Feb, 2026 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Excel Remote Code Execution Vulnerability

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-office_online_server365_appsoffice_long_term_servicing_channelofficeMicrosoft 365 Apps for EnterpriseMicrosoft Office 2019Microsoft Office LTSC for Mac 2021Microsoft Office LTSC 2024Microsoft Office LTSC for Mac 2024Microsoft Office LTSC 2021Office Online Server
CWE ID-CWE-416
Use After Free
CVE-2023-40100
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-8.4||HIGH
EPSS-0.02% / 5.57%
||
7 Day CHG~0.00%
Published-15 Feb, 2024 | 22:31
Updated-16 Dec, 2024 | 19:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In discovery_thread of Dns64Configuration.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-416
Use After Free
CVE-2023-40114
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-8.4||HIGH
EPSS-0.02% / 5.66%
||
7 Day CHG~0.00%
Published-15 Feb, 2024 | 22:31
Updated-13 Dec, 2024 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple functions of MtpFfsHandle.cpp , there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-416
Use After Free
CVE-2025-58303
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-8.4||HIGH
EPSS-0.01% / 0.75%
||
7 Day CHG~0.00%
Published-28 Nov, 2025 | 02:28
Updated-02 Dec, 2025 | 02:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

UAF vulnerability in the screen recording framework module. Impact: Successful exploitation of this vulnerability may affect availability.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE ID-CWE-416
Use After Free
CVE-2025-58299
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-8.4||HIGH
EPSS-0.01% / 1.53%
||
7 Day CHG~0.00%
Published-11 Oct, 2025 | 09:07
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use After Free (UAF) vulnerability in the storage management module. Successful exploitation of this vulnerability may affect availability.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-HarmonyOS
CWE ID-CWE-416
Use After Free
CVE-2024-48423
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.06% / 19.03%
||
7 Day CHG~0.00%
Published-24 Oct, 2024 | 00:00
Updated-05 Nov, 2024 | 17:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in assimp v.5.4.3 allows a local attacker to execute arbitrary code via the CallbackToLogRedirector function within the Assimp library.

Action-Not Available
Vendor-assimpn/aassimp
Product-assimpn/aassimp
CWE ID-CWE-416
Use After Free
CVE-2024-44285
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-8.4||HIGH
EPSS-1.37% / 80.36%
||
7 Day CHG~0.00%
Published-28 Oct, 2024 | 21:08
Updated-02 Apr, 2026 | 19:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 18.1 and iPadOS 18.1, macOS Sequoia 15.1, tvOS 18.1, visionOS 2.1, watchOS 11.1. An app may be able to cause unexpected system termination or corrupt kernel memory.

Action-Not Available
Vendor-Apple Inc.
Product-tvosvisionoswatchosiphone_osipadosvisionOSmacOStvOSiOS and iPadOSwatchOStvosvisionoswatchosiphone_osipados
CWE ID-CWE-416
Use After Free
CVE-2018-9428
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-8.4||HIGH
EPSS-0.05% / 14.14%
||
7 Day CHG~0.00%
Published-19 Nov, 2024 | 21:25
Updated-22 Nov, 2024 | 22:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In startDevice of AAudioServiceStreamBase.cpp there is a possible out of bounds write due to a use after free. This could lead to local arbitrary code execution with no additional execution privileges needed. User interaction is needed for exploitation. https://source.android.com/security/bulletin/2018-07-01

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-416
Use After Free
CVE-2023-33094
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.08% / 23.09%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Linux Graphics

Memory corruption while running VK synchronization with KASAN enabled.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwareqcs410_firmwaresa6150p_firmwaresd660_firmwaresd865_5gsw5100pwsa8845_firmwareqca6595qcs610_firmwarewcd9335sxr2130_firmwarewcd9370qca8081_firmwarear8035_firmwareqca6696qrb5165msnapdragon_888_5g_mobile_platformwcd9341_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwaresa4150p_firmwarewcd9395_firmwareqcn6024sd888_firmwareqca6426wcn6740_firmwarefastconnect_6700snapdragon_768g_5g_mobile_platform_firmwaresa4150pwsa8815_firmwaresa8195p_firmwareqca8337_firmwareqca8337qca6426_firmwaresnapdragon_680_4g_mobile_platformwcd9395sg8275p_firmwareqcm6490_firmwareqca6574au_firmwaresm7250p_firmwareqam8295pwcd9341qca6574auwcd9390flight_rb5_5g_platformwcn3950wsa8810_firmwaresnapdragon_xr2_5g_platformwsa8845h_firmwarecsra6640snapdragon_x65_5g_modem-rf_system_firmwareqca6797aq_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_765g_5g_mobile_platform_firmwaresnapdragon_xr2\+_gen_1_platform_firmwarewcn3660b_firmwaresnapdragon_780g_5g_mobile_platformfastconnect_6800_firmwaresa8295p_firmwareqcn6024_firmwaresa4155p_firmwaresm7250psnapdragon_695_5g_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psnapdragon_778g\+_5g_mobile_platformsnapdragon_780g_5g_mobile_platform_firmwaresd888qcn9011_firmwaresw5100_firmwaresnapdragon_765_5g_mobile_platform_firmwarewcn6740snapdragon_480\+_5g_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwarefastconnect_6800qca6595_firmwareqcs7230fastconnect_7800_firmwarefastconnect_6900snapdragon_685_4g_mobile_platform_firmwaresnapdragon_765g_5g_mobile_platformvideo_collaboration_vc1_platformsnapdragon_782g_mobile_platform_firmwarewcd9385_firmwaresnapdragon_x55_5g_modem-rf_systemfastconnect_6900_firmwareqam8255p_firmwarewcd9380sa6145p_firmwareqam8255psnapdragon_888_5g_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_4_gen_1_mobile_platformsa8150psnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platformsnapdragon_685_4g_mobile_platformsnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845sa6155psnapdragon_auto_5g_modem-rf_firmwaresnapdragon_768g_5g_mobile_platformwsa8810qam8650pvideo_collaboration_vc5_platform_firmwaresnapdragon_865\+_5g_mobile_platformsnapdragon_8\+_gen_2_mobile_platformwcn3950_firmwaresw5100qca6595auvideo_collaboration_vc3_platformsm7315_firmwaresnapdragon_865_5g_mobile_platform_firmwaresa6155p_firmwarewcd9326_firmwarewsa8840qam8295p_firmwareqcs8550_firmwarewcn3990_firmwaresm7315snapdragon_870_5g_mobile_platform_firmwareqca6698aq_firmwareqca6436_firmwarewcd9385qcn9012wcn3615snapdragon_8_gen_2_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwaresa8255pqcs7230_firmwarewcd9390_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresnapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platformsg8275pwcd9370_firmwaresnapdragon_auto_5g_modem-rfsnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3615_firmwaresnapdragon_660_mobile_platformwcn3660bqca6574asxr2130sa8195pcsra6640_firmwareqcs8250_firmwaresnapdragon_xr2\+_gen_1_platformsm7325pqcm6490qam8650p_firmwarevideo_collaboration_vc5_platformsm8550p_firmwareqcm8550wcn3988qcs6490_firmwaresnapdragon_x65_5g_modem-rf_systemqcn9024wcd9335_firmwarewcn3980_firmwareqrb5165n_firmwareqca6436qca6574snapdragon_480_5g_mobile_platform_firmwarewsa8835qca6595au_firmwareqca6391_firmwarewsa8840_firmwaresnapdragon_870_5g_mobile_platformqcn9011sw5100p_firmwaresnapdragon_782g_mobile_platformqca6696_firmwareqcn9024_firmwaresnapdragon_865_5g_mobile_platformwsa8845hwcd9380_firmwaresa6150pqca6574_firmwarewcd9326qcs410sa8155p_firmwarecsra6620qca8081sd660sa8155psg4150pwsa8815qam8775pqca6797aqwsa8830sm8550psa6145pqcm4325_firmwaresnapdragon_765_5g_mobile_platformsa8255p_firmwareflight_rb5_5g_platform_firmwarear8035qca6574a_firmwaresnapdragon_750g_5g_mobile_platformsnapdragon_480\+_5g_mobile_platformqrb5165m_firmwareqcm4325wcd9375_firmwarerobotics_rb5_platformqca6391qualcomm_215_mobile_platformqcn9012_firmwaresmart_audio_400_platform_firmwareqca6698aqsg4150p_firmwaresnapdragon_480_5g_mobile_platformsnapdragon_778g_5g_mobile_platform_firmwareqrb5165ncsra6620_firmwaresa8295psnapdragon_8_gen_1_mobile_platformrobotics_rb5_platform_firmwareqcs8550snapdragon_8_gen_2_mobile_platform_firmwarefastconnect_6200fastconnect_7800sa8145p_firmwaresm7325p_firmwareqam8775p_firmwaresd865_5g_firmwarewcn3680bsnapdragon_888\+_5g_mobile_platformqualcomm_215_mobile_platform_firmwarewcd9375sa8150p_firmwaresmart_audio_400_platformsnapdragon_w5\+_gen_1_wearable_platformwcn3988_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwaresa8145pwcn3990snapdragon_888\+_5g_mobile_platform_firmwarewsa8835_firmwaresnapdragon_680_4g_mobile_platform_firmwaresnapdragon_660_mobile_platform_firmwareqcs6490qcs8250wcn3980snapdragon_690_5g_mobile_platform_firmwarefastconnect_6200_firmwarewsa8830_firmwarewcn3680b_firmwareqcs610Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2023-33114
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.11% / 29.21%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use after free in Neural Processing Unit

Memory corruption while running NPU, when NETWORK_UNLOAD and (NETWORK_UNLOAD or NETWORK_EXECUTE_V2) commands are submitted at the same time.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6431sw5100pqcs410_firmwaresa6150p_firmwaresd660_firmwaresd865_5gqca6595qcs610_firmwarewcd9335sxr2130_firmwarewcd9370snapdragon_675_mobile_platform_firmwarear8035_firmwareqca6696snapdragon_730_mobile_platform_firmwaresnapdragon_x50_5g_modem-rf_systemqrb5165mwcd9341_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwaresa4150p_firmwaresnapdragon_730_mobile_platformqca6426snapdragon_662_mobile_platform_firmwarefastconnect_6700qcs6125_firmwarewcn3610snapdragon_768g_5g_mobile_platform_firmwaresa4150pwsa8815_firmwaresa8195p_firmwareqca8337_firmwareqca8337qca6426_firmwaresnapdragon_680_4g_mobile_platformsnapdragon_460_mobile_platformar8031qca6574au_firmwaresm7250p_firmwareqam8295psm4125wcd9341qca6574ausnapdragon_855_mobile_platformflight_rb5_5g_platformwcn3950wsa8810_firmwaresd730_firmwaresnapdragon_xr2_5g_platformcsra6640qcs6125wcn3660b_firmwaresnapdragon_765g_5g_mobile_platform_firmwaresd730snapdragon_xr2\+_gen_1_platform_firmwaresnapdragon_730g_mobile_platform_firmwarefastconnect_6800_firmwaresa8295p_firmwaresa4155p_firmwaresnapdragon_720g_mobile_platformsm6250_firmwaresm7250pvideo_collaboration_vc1_platform_firmwaresa4155pqcm6125_firmwarec-v2x_9150qcn9011_firmwaresw5100_firmwaresnapdragon_765_5g_mobile_platform_firmwarefastconnect_6800315_5g_iot_modem_firmwareqca6595_firmwaresnapdragon_685_4g_mobile_platform_firmwarefastconnect_6900snapdragon_765g_5g_mobile_platformvideo_collaboration_vc1_platformwcd9385_firmware315_5g_iot_modemqca6421fastconnect_6900_firmwaresnapdragon_x55_5g_modem-rf_systemwcd9380sa6145p_firmwaresnapdragon_732g_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwaresa8150psnapdragon_665_mobile_platform_firmwaresnapdragon_685_4g_mobile_platformsa6155pqca6421_firmwareqcm6125snapdragon_auto_5g_modem-rf_firmwaresnapdragon_768g_5g_mobile_platformwsa8810video_collaboration_vc5_platform_firmwaresnapdragon_865\+_5g_mobile_platformsw5100qca6595auaqt1000video_collaboration_vc3_platformsnapdragon_865_5g_mobile_platform_firmwarec-v2x_9150_firmwaresa6155p_firmwarewcd9326_firmwareqam8295p_firmwaresd855qca6431_firmwarewcn3990_firmwaresnapdragon_870_5g_mobile_platform_firmwareqca6698aq_firmwareqca6436_firmwaresnapdragon_wear_4100\+_platform_firmwareqcn9012wcd9385wcn3910_firmwarewcn3610_firmwaresnapdragon_678_mobile_platformsm4125_firmwaresnapdragon_720g_mobile_platform_firmwaresnapdragon_855\+\/860_mobile_platform_firmwareqca6420snapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platformwcn3910qca6430wcd9370_firmwaresdx55_firmwaresnapdragon_auto_5g_modem-rfsnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_660_mobile_platformwcn3660bqca6574asxr2130sa8195pcsra6640_firmwareqcs8250_firmwaresnapdragon_xr2\+_gen_1_platformvideo_collaboration_vc5_platformsnapdragon_855_mobile_platform_firmwareqca6420_firmwareaqt1000_firmwarewcn3988qcs6490_firmwaresd855_firmwarewcd9335_firmwareqrb5165n_firmwareqca6436qca6574snapdragon_460_mobile_platform_firmwarewcn3980_firmwareqca6595au_firmwareqca6391_firmwarewsa8835qca6430_firmwaresnapdragon_870_5g_mobile_platformqcn9011sw5100p_firmwaresnapdragon_732g_mobile_platformqca6696_firmwaresnapdragon_865_5g_mobile_platformwcd9380_firmwaresa6150pqca6574_firmwarewcd9326qcs410sa8155p_firmwarecsra6620sd660wsa8815sa8155psnapdragon_675_mobile_platformwsa8830snapdragon_662_mobile_platformsa6145psnapdragon_765_5g_mobile_platformflight_rb5_5g_platform_firmwaresnapdragon_665_mobile_platformar8035qca6574a_firmwaresdx55snapdragon_750g_5g_mobile_platformqrb5165m_firmwaresnapdragon_678_mobile_platform_firmwarewcd9375_firmwarerobotics_rb5_platformqca6391qcn9012_firmwaresmart_audio_400_platform_firmwareqca6698aqwcn3950_firmwaresm6250qrb5165ncsra6620_firmwaresa8295probotics_rb5_platform_firmwaresnapdragon_x50_5g_modem-rf_system_firmwarefastconnect_6200wcn3680bsa8145p_firmwaresd865_5g_firmwaresnapdragon_730g_mobile_platformwcd9375sa8150p_firmwaresmart_audio_400_platformsnapdragon_855\+\/860_mobile_platformsnapdragon_w5\+_gen_1_wearable_platformwcn3988_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwaresa8145pwcn3990snapdragon_wear_4100\+_platformwsa8835_firmwaresnapdragon_680_4g_mobile_platform_firmwaresnapdragon_660_mobile_platform_firmwareqcs6490qcs8250wcn3980snapdragon_690_5g_mobile_platform_firmwarefastconnect_6200_firmwarear8031_firmwarewsa8830_firmwarewcn3680b_firmwareqcs610Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2023-33074
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 8.68%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-16 Dec, 2025 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Audio

Memory corruption in Audio when SSR event is triggered after music playback is stopped.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwarewsa8830wcd9380_firmwaresa6150p_firmwaressg2125psa8145p_firmwaresxr2230p_firmwaresw5100pqam8650psd865_5gsg8275p_firmwaresnapdragon_w5\+_gen_1_wearable_platformwcn785x-5qca6595qam8775pwsa8840wsa8835qca6574sxr1230p_firmwarewcn3950_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewcd9380sa8150p_firmwareqca6595au_firmwaressg2125p_firmwareqca6574assg2115pwcn685x-5_firmwaresxr1230pwcn685x-1sg8275psnapdragon_8_gen_2_mobile_platformwcn6750wcn3980wcd9385_firmwareqam8295pwcn3950wsa8845qcm4325_firmwareqca6574_firmwarewsa8815sxr2230pwsa8845_firmwareqam8295p_firmwaresnapdragon_xr2_5g_platform_firmwareqca6574a_firmwareqca6574au_firmwareqca6595ausm6225-adwsa8845h_firmwarewcn785x-5_firmwarewcn3980_firmwaresa8295psnapdragon_w5\+_gen_1_wearable_platform_firmwaresm8475_firmwaresa6155p_firmwaresm6225snapdragon_xr2_5g_platformsm6225-ad_firmwarewsa8840_firmwareqca6698aqsa4155p_firmwarewsa8832_firmwarewcn685x-5sm6225_firmwarewcn3988_firmwareqca6797aq_firmwarewcn785x-1_firmwareqca6574ausa6145p_firmwaresa8155p_firmwaresa8195pwsa8810_firmwaresnapdragon_8\+_gen_2_mobile_platformsw5100wsa8810wsa8845hwsa8832wcd9395_firmwaresa8255p_firmwaresa6155psw5100p_firmwaresm8550pqca6698aq_firmwaresa6145pwcn685x-1_firmwarewcd9385qam8650p_firmwareqam8775p_firmwaresa8255pqca6696_firmwareqca6595_firmwaresa8145pwcd9395qca6696qca6797aqsa4150p_firmwarewcn6750_firmwaresa8150psm8550p_firmwaresa6150pwcd9390wcd9390_firmwaresa8155pwsa8830_firmwaresd865_5g_firmwarewcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwaressg2115p_firmwaresw5100_firmwaresm8475sa8295p_firmwareqam8255psa4155psa4150psnapdragon_8_gen_2_mobile_platform_firmwarewcn785x-1qcm4325Snapdragon
CWE ID-CWE-416
Use After Free
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33029
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.06% / 18.68%
||
7 Day CHG~0.00%
Published-03 Oct, 2023 | 05:00
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in DSP Service

Memory corruption in DSP Service during a remote call from HLOS to DSP.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwaresw5100pqcs410_firmwaresa6150p_firmwareqca6595qcs610_firmwarewcd9335wcd9370qca8081_firmwareqca6696wcd9340_firmwarewcd9341_firmwarewcd9395_firmwareqcn6024qcc710_firmwarewcn6740_firmwaresa4150psm7325-ae_firmwarewsa8832_firmwareqca8337qdu1110wcd9395qca6574au_firmwarewcn785x-5qam8295pwcd9341qca6574auwcd9390snapdragon_x12_lte_modemwsa8810_firmwarewsa8845h_firmwarecsra6640sm6375_firmwareqcn6024_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psm8350ssg2115pqcc710sm6375sm8450_firmwarevideo_collaboration_vc1_platformqru1032_firmwareqfw7114wcd9385_firmwareqam8255p_firmwaresnapdragon_ar2_gen_1_platform_firmwareqcs4490snapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845sa6155pwsa8810qam8650pqdu1000_firmwarevideo_collaboration_vc5_platform_firmwaresnapdragon_8\+_gen_2_mobile_platformsm8350-acqca6595ausm7315_firmwareqdu1010sm7325_firmwaresa6155p_firmwarewsa8840qcs8550_firmwareqdu1210_firmwareqfw7124_firmwareqcn9012qcs4490_firmwaresnapdragon_8_gen_2_mobile_platformsm4450snapdragon_7c\+_gen_3_compute_firmwareapq8009wcd9370_firmwareqdu1110_firmwareqdu1000qca6574asm7325-aeqca6174asa8195pwcd9340qcs8250_firmwareqdu1210sm6225qcm6490sm8550p_firmwarewcn3998_firmwarewcn3988qcn9024qca6574sm7325-afsnapdragon_x75_5g_modem-rf_systemsxr2230p_firmwareqcn9011qcn9024_firmwarewsa8845hsa6150pqcs410sa8155p_firmwaresa8155pwsa8830sm8550psa6145psa8255p_firmwareflight_rb5_5g_platform_firmwarewcn785x-1_firmwarear8035qrb5165m_firmwareqcm4325robotics_rb5_platformqcn6224sm8475_firmwareqca6698aqssg2125p_firmwarewcn3950_firmwareqrb5165nwcn685x-1sa8145p_firmwaresm7325p_firmwareqdx1011sa8150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformvideo_collaboration_vc3_platform_firmwareqcs6490qcs8250wsa8830_firmwareqcn6224_firmwarewsa8845_firmwarewsa8832ar8035_firmwaresm8475apq8009_firmwareqrb5165msnapdragon_w5\+_gen_1_wearable_platform_firmwaresa4150p_firmwaresd888_firmwaresm6225_firmwaresm7325-af_firmwarewsa8815_firmwaresa8195p_firmwareqca8337_firmwaresnapdragon_x12_lte_modem_firmwaresm7325sg8275p_firmwareqca9377_firmwareqcm6490_firmwaresm8350-ac_firmwareqcm4490_firmwareqru1032wcn785x-5_firmwareflight_rb5_5g_platformwcn3950snapdragon_x65_5g_modem-rf_system_firmwareqca6797aq_firmwaresnapdragon_7c\+_gen_3_computesm4350_firmwaresm7350-ab_firmwarewcn3991sa8295p_firmwaresa4155p_firmwareqcn6274_firmwaresd888qcn9011_firmwareqru1062_firmwaresw5100_firmwarewcn685x-5wcn6740qru1062sm6225-ad_firmwareqfw7114_firmwareqca6595_firmwareqcs7230wcd9380sa6145p_firmwareqam8255psxr2230psa8150psm7350-absnapdragon_auto_5g_modem-rf_firmwaresm8350_firmwaresxr1230psm6225-adsm4350-acsw5100video_collaboration_vc3_platformwcn3991_firmwareqam8295p_firmwaresm7315qca6698aq_firmwarewcd9385sa8255pqcs7230_firmwaresxr1230p_firmwarewcd9390_firmwarewcn6750sg8275pwcn6750_firmwareqdx1011_firmwaresnapdragon_auto_5g_modem-rfssg2125pqru1052qcm4490csra6640_firmwaresm4350qca6174a_firmwaresm7325pqam8650p_firmwarewcn3998video_collaboration_vc5_platformqcs6490_firmwaresm8450snapdragon_x65_5g_modem-rf_systemwcd9335_firmwarewcn3980_firmwareqcn6274qrb5165n_firmwareqfw7124wsa8835qca6595au_firmwareqca6391_firmwarewsa8840_firmwareqdu1010_firmwaresw5100p_firmwaresm4450_firmwaresnapdragon_ar2_gen_1_platformqca6696_firmwarewcd9380_firmwareqca6574_firmwarewsa8815csra6620qca8081sg4150psd_8_gen1_5gsm4375qam8775pqca6797aqqca9377sm4375_firmwareqcm4325_firmwareqca6574a_firmwaresd_8_gen1_5g_firmwarewcd9375_firmwareqca6391wcn785x-1qcn9012_firmwaresg4150p_firmwareqru1052_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarecsra6620_firmwaresa8295probotics_rb5_platform_firmwareqcs8550qam8775p_firmwarewcd9375wcn685x-5_firmwarewcn3988_firmwaresa8145psm4350-ac_firmwarewsa8835_firmwaressg2115p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3980qdx1010wcn685x-1_firmwareqcs610Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2011-0671
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.4||HIGH
EPSS-1.08% / 78.00%
||
7 Day CHG~0.00%
Published-13 Apr, 2011 | 20:07
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_7windows_server_2008windows_vistawindows_xpwindows_2003_serverwindows_server_2003n/a
CWE ID-CWE-416
Use After Free
CVE-2022-25723
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.11% / 29.34%
||
7 Day CHG~0.00%
Published-17 Oct, 2022 | 00:00
Updated-13 May, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in multimedia due to use after free during callback registration failure in Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn6855wsa8830wcn6855_firmwaresm8475wcn7851_firmwarewcn6856wsa8830_firmwarewcn7850_firmwarewcn7850wcn6856_firmwarewsa8835sd_8_gen1_5g_firmwarewcd9380wcn7851wsa8835_firmwarewcd9380_firmwareSnapdragon Mobile
CWE ID-CWE-416
Use After Free
CVE-2023-21165
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-8.4||HIGH
EPSS-0.02% / 5.07%
||
7 Day CHG~0.00%
Published-16 Feb, 2024 | 18:33
Updated-16 Dec, 2024 | 14:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In DevmemIntUnmapPMR of devicemem_server.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Imagination Technologies LimitedGoogle LLC
Product-androidAndroidpowervr-gpu
CWE ID-CWE-416
Use After Free
CVE-2023-21672
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.05% / 16.68%
||
7 Day CHG~0.00%
Published-04 Jul, 2023 | 04:46
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Audio

Memory corruption in Audio while running concurrent tunnel playback or during concurrent audio tunnel recording sessions.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwarewsa8830wcd9380_firmwaresa6150p_firmwaressg2125psa8145p_firmwaresxr2230p_firmwaresw5100pqam8650psd865_5gqca6595snapdragon_8_gen_1_firmwareqam8775psnapdragon_ar2_gen_1snapdragon_685_4g_firmwarewsa8835qca6574sxr1230p_firmwarewcn3950_firmwaresnapdragon_8_gen_1sd_8_gen1_5gwcd9380sa8150p_firmwareqca6595au_firmwarefastconnect_6700wcd9370ssg2125p_firmwareqca6574assg2115psxr1230pwcn3980snapdragon_8\+_gen_1wcd9385_firmwareqam8295pwcn3950qcm4325_firmwareqca6574_firmwaresd_8_gen1_5g_firmwaresnapdragon_680_4g_firmwarewsa8815sxr2230pqam8295p_firmwaresnapdragon_4_gen_2qca6574a_firmwareqca6574au_firmwareqca6595auwcd9375_firmwarewcn3980_firmwaresnapdragon_w5\+_gen_1_firmwaresnapdragon_xr2_5gsa8295psnapdragon_w5\+_gen_1fastconnect_7800wcn6740_firmwaresa6155p_firmwaresnapdragon_685_4gsnapdragon_ar2_gen_1_firmwaresnapdragon_4_gen_2_firmwarewsa8832_firmwareqca6698aqsa4155p_firmwarefastconnect_6900fastconnect_6900_firmwaresa4150pwcn3988_firmwareqca6797aq_firmwareqca6574ausa6145p_firmwaresa8155p_firmwaresnapdragon_680_4gfastconnect_6700_firmwaresa8195pwsa8810_firmwaresnapdragon_8\+_gen_1_firmwarefastconnect_7800_firmwaresw5100wsa8810wsa8832sa8255p_firmwaresa6155psg4150psw5100p_firmwareqca6698aq_firmwaresa6145pqam8650p_firmwarewcd9385qam8775p_firmwaresa8255pqca6696_firmwareqca6595_firmwaresa8145pwcn6740qca6696qca6797aqsnapdragon_xr2_5g_firmwaresa4150p_firmwarewcd9375wcd9370_firmwaresa8150psa6150psa8155pwsa8830_firmwaresd865_5g_firmwarewcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwaressg2115p_firmwaresw5100_firmwaresa8295p_firmwareqam8255psa4155psg4150p_firmwareqcm4325Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2022-48754
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-8.4||HIGH
EPSS-0.03% / 8.43%
||
7 Day CHG~0.00%
Published-20 Jun, 2024 | 11:13
Updated-11 May, 2026 | 18:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
phylib: fix potential use-after-free

In the Linux kernel, the following vulnerability has been resolved: phylib: fix potential use-after-free Commit bafbdd527d56 ("phylib: Add device reset GPIO support") added call to phy_device_reset(phydev) after the put_device() call in phy_detach(). The comment before the put_device() call says that the phydev might go away with put_device(). Fix potential use-after-free by calling phy_device_reset() before put_device().

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinuxlinux_kernel
CWE ID-CWE-416
Use After Free
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found