Skip to content
Threat Feed

Tag

Use-After-Free

46 briefs RSS
high advisory

Chromium Use-After-Free Vulnerability in ANGLE (CVE-2026-7359)

A use-after-free vulnerability in the ANGLE graphics engine within Chromium (CVE-2026-7359) allows for potential exploitation in Google Chrome and Microsoft Edge.

Chrome +1 use-after-free chromium edge cve-2026-7359
2r 1c
high advisory

Chromium Use-After-Free Vulnerability in Media Component (CVE-2026-7355)

CVE-2026-7355 is a use-after-free vulnerability in the Media component of Chromium, affecting Google Chrome and Microsoft Edge, potentially allowing for arbitrary code execution.

Chrome +1 use-after-free chromium cve-2026-7355 browser
2r 1t 1c
critical advisory

Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7357)

CVE-2026-7357 is a use-after-free vulnerability in the GPU component of Chromium that also affects Microsoft Edge, potentially leading to arbitrary code execution.

Chrome +1 use-after-free chromium edge
2r 1t 1c
critical threat

Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7333)

CVE-2026-7333 is a use-after-free vulnerability in the GPU component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.

Chrome +1 use-after-free chromium gpu cve-2026-7333 remote code execution
2r 1c
critical advisory

Chromium Use-After-Free Vulnerability in Codecs (CVE-2026-7348)

CVE-2026-7348 is a use-after-free vulnerability in the Codecs component of Chromium, affecting Google Chrome and Microsoft Edge.

Chrome +1 use-after-free vulnerability browser
2r 1t 1c
high advisory

Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7349)

CVE-2026-7349 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge.

Chrome +1 use-after-free browser chromium
2r 1t 1c
critical advisory

Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7338)

CVE-2026-7338 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.

Chrome +1 use-after-free edge cve-2026-7338 remote code execution
2r 1c
high advisory

Google Chrome Dawn Use-After-Free Vulnerability (CVE-2026-6310)

A use-after-free vulnerability (CVE-2026-6310) in Google Chrome's Dawn component allows a remote attacker, having compromised the renderer process, to potentially execute a sandbox escape via a specially crafted HTML page.

cve-2026-6310 use-after-free sandbox escape google chrome
2r 2t 1c 1i
high advisory

Google Chrome CSS Use-After-Free Vulnerability (CVE-2026-6300)

A use-after-free vulnerability in Google Chrome's CSS engine (CVE-2026-6300) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page.

cve-2026-6300 use-after-free chrome
1r 1t 1c
high advisory

rsync Use-After-Free Vulnerability in Extended Attribute Handling (CVE-2026-41035)

rsync versions 3.0.1 through 3.4.1 are vulnerable to a use-after-free vulnerability in the receive_xattr function during a qsort call, triggered by an untrusted length value when the -X/--xattrs option is used, potentially leading to code execution.

rsync use-after-free cve-2026-41035 linux
2r 1t 1c
critical advisory

Google Chrome Proxy Use-After-Free Vulnerability (CVE-2026-6297)

CVE-2026-6297 is a critical use-after-free vulnerability in the Proxy component of Google Chrome before version 147.0.7727.101, enabling a privileged network attacker to potentially achieve sandbox escape via a crafted HTML page.

cve use-after-free chrome sandbox escape
2r 1t 1c
high advisory

Windows WalletService Use-After-Free Privilege Escalation (CVE-2026-32080)

CVE-2026-32080 is a use-after-free vulnerability in the Windows WalletService, allowing a locally authorized attacker to elevate privileges.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

Microsoft Word Use-After-Free Vulnerability CVE-2026-23657

CVE-2026-23657 is a use-after-free vulnerability in Microsoft Office Word allowing a local attacker to execute arbitrary code with user privileges.

use-after-free code-execution office cve-2026-23657
2r 1t 1c
high threat

Microsoft Office Word Use-After-Free Vulnerability (CVE-2026-33095)

A use-after-free vulnerability in Microsoft Office Word (CVE-2026-33095) could allow a local attacker to execute arbitrary code by opening a specially crafted document.

exploited cve-2026-33095 use-after-free microsoft-office word code-execution
2r 1t 1c 1i
high advisory

Microsoft Office Excel Use-After-Free Vulnerability (CVE-2026-32198)

CVE-2026-32198 is a use-after-free vulnerability in Microsoft Office Excel that allows an attacker to execute code locally on a vulnerable system.

use-after-free excel code-execution
3r 1t 1c
high advisory

Microsoft Excel Use-After-Free Vulnerability (CVE-2026-32189)

CVE-2026-32189 is a use-after-free vulnerability in Microsoft Excel that allows a local attacker to execute arbitrary code by exploiting memory corruption.

use-after-free code-execution excel cve-2026-32189
2r 1t 1c 1i
high advisory

Libsixel Use-After-Free Vulnerability (CVE-2026-33018)

A use-after-free vulnerability exists in libsixel versions 1.8.7 and prior when processing animated GIFs due to improper frame buffer management, potentially leading to code execution.

libsixel use-after-free CVE-2026-33018 gif
2r 1t 1c
high advisory

CVE-2026-33101 Use-After-Free Vulnerability in Windows Print Spooler

CVE-2026-33101 is a use-after-free vulnerability in the Windows Print Spooler Components that allows an authenticated local attacker to elevate privileges.

use-after-free privilege-escalation windows
2r 1t 1c 2i
high advisory

CVE-2026-33099: Windows WinSock Use-After-Free Privilege Escalation

A use-after-free vulnerability, CVE-2026-33099, in the Windows Ancillary Function Driver for WinSock, enables a locally authenticated attacker to elevate privileges on the system.

cve-2026-33099 use-after-free privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-33098 Use-After-Free in Windows Container Isolation FS Filter Driver

CVE-2026-33098 is a use-after-free vulnerability in the Windows Container Isolation FS Filter Driver that allows a locally authorized attacker to elevate privileges.

use-after-free privilege-escalation windows
2r 1t 1c
critical advisory

CVE-2026-32157 - Remote Desktop Client Use-After-Free Vulnerability

CVE-2026-32157 is a use-after-free vulnerability in the Remote Desktop Client that allows an unauthorized attacker to execute code over a network.

cve-2026-32157 use-after-free remote-desktop execution
2r 2t 1c 1i
high advisory

CVE-2026-32155: Desktop Window Manager Use-After-Free Privilege Escalation

CVE-2026-32155 is a use-after-free vulnerability in the Desktop Window Manager that allows an authorized attacker to escalate privileges locally on a Windows system.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

CVE-2026-32152 Use-After-Free in Desktop Window Manager

CVE-2026-32152 is a use-after-free vulnerability in the Desktop Window Manager (dwm.exe) that allows an authorized local attacker to elevate privileges.

privilege-escalation use-after-free cve-2026-32152
2r 1t 1c 1i
high threat

CVE-2026-27917: Windows WFP NDIS Lightweight Filter Driver Use-After-Free Vulnerability

CVE-2026-27917 is a use-after-free vulnerability in the Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) that allows a locally authorized attacker to elevate privileges.

exploited cve-2026-27917 use-after-free privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-27909 Use-After-Free in Windows Search Component Allows Privilege Escalation

CVE-2026-27909 is a use-after-free vulnerability in the Microsoft Windows Search Component that allows a locally authorized attacker to escalate privileges.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

CVE-2026-27908 Use-After-Free in Windows TDI Translation Driver

A use-after-free vulnerability, CVE-2026-27908, exists in the Windows TDI Translation Driver (tdx.sys), allowing a locally authenticated attacker to elevate privileges.

cve-2026-27908 use-after-free privilege-escalation windows
2r 1t 1c 1i
high advisory

CVE-2026-26182: Windows WinSock Use-After-Free Privilege Escalation

CVE-2026-26182 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a locally authorized attacker to elevate privileges.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

CVE-2026-26181 - Microsoft Brokering File System Use-After-Free Vulnerability

CVE-2026-26181 is a use-after-free vulnerability in the Microsoft Brokering File System that enables a locally authenticated attacker to escalate privileges on the system.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

CVE-2026-32156 Use-After-Free Vulnerability in Windows UPnP Device Host

CVE-2026-32156 is a use-after-free vulnerability in the Windows Universal Plug and Play (UPnP) Device Host service that allows an unauthorized attacker to execute code locally.

use-after-free windows upnp code-execution
2r 2t 1c 1i
high advisory

CVE-2026-33100: Windows WinSock Use-After-Free Privilege Escalation

CVE-2026-33100 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a locally authorized attacker to elevate privileges.

cve-2026-33100 use-after-free privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-32224 Use-After-Free in Windows Server Update Service

CVE-2026-32224 is a use-after-free vulnerability in the Windows Server Update Service that allows a locally authenticated attacker to elevate privileges.

cve-2026-32224 use-after-free privilege-escalation windows
2r 1t 1c
high advisory

Microsoft PowerPoint Use-After-Free Vulnerability (CVE-2026-32200)

CVE-2026-32200 is a use-after-free vulnerability in Microsoft Office PowerPoint that allows an unauthorized attacker to achieve local code execution by enticing a user to open a specially crafted PowerPoint document.

cve-2026-32200 use-after-free powerpoint code-execution
2r 1t 1c 2i
high advisory

CVE-2026-32165 Use-After-Free in Windows User Interface Core

CVE-2026-32165 is a use-after-free vulnerability in Windows User Interface Core that allows a locally authenticated attacker to elevate privileges.

privilege-escalation use-after-free windows
2r 1t 1c
high advisory

CVE-2026-32070: Windows CLFS Driver Use-After-Free Privilege Escalation

A use-after-free vulnerability, CVE-2026-32070, exists in the Windows Common Log File System (CLFS) driver, enabling a locally authenticated attacker to escalate privileges on a vulnerable system.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

Samsung Exynos Wi-Fi Driver Use-After-Free Vulnerability (CVE-2025-54602)

A use-after-free vulnerability exists in the Wi-Fi driver of Samsung Mobile and Wearable Processors Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, 1580, W920, W930, and W1000 due to improper synchronization on a global variable, allowing attackers to trigger a race condition and potentially execute arbitrary code.

cve-2025-54602 use-after-free exynos samsung wifi
2r 1t 1c
high advisory

Memory Corruption Vulnerability in DMABUF IOCTL Calls (CVE-2026-21380)

A use-after-free vulnerability, identified as CVE-2026-21380, exists due to memory corruption when using deprecated DMABUF IOCTL calls for video memory management, potentially leading to arbitrary code execution.

cve-2026-21380 memory-corruption use-after-free
2r 1t 1c
high advisory

Electron Use-After-Free Vulnerability in Offscreen Rendering with Child Windows

A use-after-free vulnerability (CVE-2026-34774) exists in Electron applications using offscreen rendering and allowing child windows, potentially leading to crashes or memory corruption if the parent WebContents is destroyed before the child window.

electron use-after-free vulnerability cve-2026-34774
2r 1i
high advisory

Electron Use-After-Free Vulnerability in PowerMonitor Module

A use-after-free vulnerability exists in the `powerMonitor` module of Electron applications on Windows and macOS. When the native `PowerMonitor` object is garbage-collected, dangling references are retained by OS-level resources. Subsequent session-change events on Windows or system shutdowns on macOS may dereference freed memory, potentially leading to a crash or memory corruption.

electron use-after-free vulnerability powermonitor windows macos
2r 1t 1i
high advisory

Foxit Application Use-After-Free Vulnerability (CVE-2026-3779)

CVE-2026-3779 is a use-after-free vulnerability in a Foxit application where stale references to page/form objects can lead to arbitrary code execution via crafted documents.

cve-2026-3779 use-after-free code-execution foxit
2r 1t 1c
critical advisory

Mozilla Firefox and Thunderbird Use-After-Free Vulnerability (CVE-2026-4723)

A use-after-free vulnerability, CVE-2026-4723, in the JavaScript Engine of Mozilla Firefox and Thunderbird before version 149 could allow arbitrary code execution if successfully exploited by an attacker.

use-after-free firefox thunderbird javascript cve-2026-4723
2r 1t
critical advisory

Mozilla Firefox and Thunderbird Canvas2D Use-After-Free Vulnerability (CVE-2026-4725)

A use-after-free vulnerability in the Canvas2D component of Mozilla Firefox and Thunderbird versions before 149 allows for a potential sandbox escape.

use-after-free sandbox-escape firefox thunderbird
2r 1t 1i
critical advisory

Mozilla Firefox and Thunderbird Use-After-Free Vulnerability (CVE-2026-4688)

A use-after-free vulnerability in the Disability Access APIs component of Mozilla Firefox and Thunderbird (CVE-2026-4688) allows for sandbox escape, potentially leading to arbitrary code execution outside the sandbox.

use-after-free sandbox-escape cve-2026-4688
2r 1t
high advisory

Google Chrome WebGPU Use-After-Free Vulnerability (CVE-2026-4678)

A use-after-free vulnerability in Google Chrome's WebGPU component (CVE-2026-4678) allows a remote attacker to execute arbitrary code within a sandbox by crafting a malicious HTML page, affecting Chrome versions prior to 146.0.7680.165.

cve-2026-4678 use-after-free chrome webgpu
2r 1t
high advisory

Google Chrome Use-After-Free Vulnerability (CVE-2026-4676)

A use-after-free vulnerability (CVE-2026-4676) in Google Chrome before 146.0.7680.165 allows a remote attacker to potentially perform a sandbox escape via a crafted HTML page.

use-after-free sandbox-escape chrome cve-2026-4676
2r 1t
critical advisory

Google Chrome FedCM Use-After-Free Vulnerability (CVE-2026-4680)

A use-after-free vulnerability in Google Chrome's FedCM component (CVE-2026-4680) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page.

CVE-2026-4680 use-after-free chrome fedcm
2r 1t 1i
high advisory

Qualcomm Memory Corruption Vulnerability in Performance Counter Deselect Operation (CVE-2026-24082)

CVE-2026-24082 is a use-after-free vulnerability in Qualcomm products that occurs when copying data from a freed source during a performance counter deselect operation, potentially leading to memory corruption and arbitrary code execution.

cve-2026-24082 use-after-free memory corruption qualcomm
2r 1t 1c