a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. Th..."> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. Th..."> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. Th...">
Use-after-free vulnerability in Thunderbird and Firefo
Reporter | Title | Published | Views | Family All 137 |
---|---|---|---|---|
![]() | CVE-2022-28282 | 6 Apr 202214:54 | – | redhatcve |
![]() | CVE-2022-28282 | 22 Dec 202200:00 | – | cvelist |
![]() | Code injection | 22 Dec 202220:15 | – | prion |
![]() | CVE-2022-28282 | 6 Apr 202200:00 | – | ubuntucve |
![]() | Use After Free | 9 Apr 202222:44 | – | veracode |
![]() | CVE-2022-28282 | 22 Dec 202220:15 | – | cve |
![]() | Exploit for Use After Free in Mozilla Firefox | 25 Sep 202207:46 | – | githubexploit |
![]() | CVE-2022-28282 | 22 Dec 202220:15 | – | debiancve |
![]() | CVE-2022-28282 | 22 Dec 202220:15 | – | alpinelinux |
![]() | [slackware-security] mozilla-firefox | 5 Apr 202219:19 | – | slackware |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo