Total
5495 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-23135 | 1 Autodesk | 3 Autocad, Autocad Advance Steel, Autocad Civil 3d | 2024-08-01 | 7.5 High |
A maliciously crafted SLDPRT file in ASMkern228A.dll when parsed through Autodesk AutoCAD can be used in user-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process. | ||||
CVE-2024-22956 | 1 Swftools | 1 Swftools | 2024-08-01 | 7.8 High |
swftools 0.9.2 was discovered to contain a heap-use-after-free vulnerability via the function removeFromTo at swftools/src/swfc.c:838 | ||||
CVE-2024-22915 | 1 Swftools | 1 Swftools | 2024-08-01 | 7.8 High |
A heap-use-after-free was found in SWFTools v0.9.2, in the function swf_DeleteTag at rfxswf.c:1193. It allows an attacker to cause code execution. | ||||
CVE-2024-22180 | 2024-08-01 | 3.3 Low | ||
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through use after free. | ||||
CVE-2024-22098 | 2024-08-01 | 6.5 Medium | ||
in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free. | ||||
CVE-2024-21803 | 1 Linux | 1 Linux Kernel | 2024-08-01 | 3.5 Low |
Use After Free vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (bluetooth modules) allows Local Execution of Code. This vulnerability is associated with program files https://gitee.Com/anolis/cloud-kernel/blob/devel-5.10/net/bluetooth/af_bluetooth.C. This issue affects Linux kernel: from v2.6.12-rc2 before v6.8-rc1. | ||||
CVE-2024-21426 | 1 Microsoft | 1 Sharepoint Server | 2024-08-01 | 7.8 High |
Microsoft SharePoint Server Remote Code Execution Vulnerability | ||||
CVE-2024-21437 | 1 Microsoft | 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more | 2024-08-01 | 7.8 High |
Windows Graphics Component Elevation of Privilege Vulnerability | ||||
CVE-2024-21407 | 1 Microsoft | 20 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 17 more | 2024-08-01 | 8.1 High |
Windows Hyper-V Remote Code Execution Vulnerability | ||||
CVE-2024-21443 | 1 Microsoft | 9 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 6 more | 2024-08-01 | 7.3 High |
Windows Kernel Elevation of Privilege Vulnerability | ||||
CVE-2024-21439 | 1 Microsoft | 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more | 2024-08-01 | 7 High |
Windows Telephony Server Elevation of Privilege Vulnerability | ||||
CVE-2024-21334 | 1 Microsoft | 2 Open Management Infrastructure, System Center Operations Manager | 2024-08-01 | 9.8 Critical |
Open Management Infrastructure (OMI) Remote Code Execution Vulnerability | ||||
CVE-2024-20792 | 2024-08-01 | 7.8 High | ||
Illustrator versions 28.4, 27.9.3 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2024-20734 | 3 Adobe, Apple, Microsoft | 6 Acrobat, Acrobat Dc, Acrobat Reader and 3 more | 2024-08-01 | 5.5 Medium |
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2024-20729 | 3 Adobe, Apple, Microsoft | 6 Acrobat, Acrobat Dc, Acrobat Reader and 3 more | 2024-08-01 | 7.8 High |
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2024-20752 | 2024-08-01 | 7.8 High | ||
Bridge versions 13.0.5, 14.0.1 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2024-20731 | 3 Adobe, Apple, Microsoft | 6 Acrobat, Acrobat Dc, Acrobat Reader and 3 more | 2024-08-01 | 7.8 High |
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2024-20765 | 2024-08-01 | 7.8 High | ||
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2024-6776 | 2024-08-01 | 8.8 High | ||
Use after free in Audio in Google Chrome prior to 126.0.6478.182 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | ||||
CVE-2024-6775 | 2024-08-01 | 8.8 High | ||
Use after free in Media Stream in Google Chrome prior to 126.0.6478.182 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |