Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-416 (释放后使用) — Vulnerability Class 2373

2373 vulnerabilities classified as CWE-416 (释放后使用). AI Chinese analysis included.

CVE IDTitleCVSSSeverityPublished
CVE-2023-4132 Kernel: smsusb: use-after-free caused by do_submit_urb() — Red Hat Enterprise Linux 8 5.5 Medium2023-08-03
CVE-2023-4133 Kernel: cxgb4: use-after-free in ch_flower_stats_cb() — Red Hat Enterprise Linux 8 5.5 Medium2023-08-03
CVE-2023-4004 Kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() — Red Hat Enterprise Linux 8 7.8 High2023-07-31
CVE-2023-38669 PaddlePaddle 资源管理错误漏洞 — PaddlePaddle 8.3 High2023-07-26
CVE-2023-35943 Envoy vulnerable to CORS filter segfault when origin header is removed — envoy 6.3 Medium2023-07-25
CVE-2023-35942 Envoy's gRPC access log crash caused by the listener draining — envoy 6.5 Medium2023-07-25
CVE-2023-3567 Kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race — Red Hat Enterprise Linux 8 7.1 High2023-07-24
CVE-2023-3019 Qemu: e1000e: heap use-after-free in e1000e_write_packet_to_guest() — Red Hat Enterprise Linux 8 6.0 Medium2023-07-24
CVE-2023-3863 Use-after-free in nfc_llcp_find_loca in net/nfc/llcp_core.c — Kernel 6.4 Medium2023-07-24
CVE-2023-3776 Use-after-free in Linux kernel's net/sched: cls_fw component — Kernel 7.8 High2023-07-21
CVE-2023-3610 Use-after-free in Linux kernel's netfilter: nf_tables component — Kernel 7.8 High2023-07-21
CVE-2023-3609 Use-after-free in Linux kernel's net/sched: cls_u32 component — Kernel 7.8 High2023-07-21
CVE-2023-28744 Foxit Reader 资源管理错误漏洞 — Foxit Reader 8.8 High2023-07-19
CVE-2023-27379 Foxit Reader 资源管理错误漏洞 — Foxit Reader 8.8 High2023-07-19
CVE-2023-33866 Foxit Reader 资源管理错误漏洞 — Foxit Reader 8.8 High2023-07-19
CVE-2023-33876 Foxit Reader 资源管理错误漏洞 — Foxit Reader 8.8 High2023-07-19
CVE-2023-2912 SiteManager Embedded service disruption — SiteManager Embedded 5.9 Medium2023-07-17
CVE-2023-36833 Junos OS Evolved: PTX10001-36MR, and PTX10004, PTX10008, PTX10016 with LC1201/1202: The aftman-bt process will crash in a MoFRR scenario after multiple link flaps — Junos OS Evolved 6.5 Medium2023-07-14
CVE-2023-2763 Use-After-Free, Out-of-bounds Write and Heap-based Buffer Overflow vulnerabilities exist in the DWG and DXF file reading procedure in SOLIDWORKS Desktop from Release SOLIDWORKS 2021 through Release SOLIDWORKS 2023 — SOLIDWORKS Desktop 7.8 High2023-07-12
CVE-2023-2762 Use-After-Free vulnerability in SLDPRT file reading procedure affecting SOLIDWORKS Desktop from Release SOLIDWORKS 2021 through Release SOLIDWORKS 2023 — SOLIDWORKS Desktop 7.8 High2023-07-12
CVE-2023-35300 Remote Procedure Call Runtime Remote Code Execution Vulnerability — Windows 10 Version 1809 8.8 High2023-07-11
CVE-2023-32055 Active Template Library Elevation of Privilege Vulnerability — Windows 10 Version 1809 6.7 Medium2023-07-11
CVE-2023-35351 Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability — Windows Server 2019 6.6 Medium2023-07-11
CVE-2023-35323 Windows OLE Remote Code Execution Vulnerability — Windows Server 2022 7.8 High2023-07-11
CVE-2023-35313 Windows Online Certificate Status Protocol (OCSP) SnapIn Remote Code Execution Vulnerability — Windows 10 Version 1809 7.8 High2023-07-11
CVE-2023-32038 Microsoft ODBC Driver Remote Code Execution Vulnerability — Windows 10 Version 1809 8.8 High2023-07-11
CVE-2023-32033 Microsoft Failover Cluster Remote Code Execution Vulnerability — Windows Server 2019 6.6 Medium2023-07-11
CVE-2023-33153 Microsoft Outlook Remote Code Execution Vulnerability — Microsoft Office 2019 6.8 Medium2023-07-11
CVE-2023-33149 Microsoft Office Graphics Remote Code Execution Vulnerability — Microsoft Office 2019 7.8 High2023-07-11
CVE-2023-21756 Windows Win32k Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.8 High2023-07-11

Vulnerabilities classified as CWE-416 (释放后使用) represent 2373 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.