Search Results (6966 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-47342 1 Qualcomm 17 Qcc5161, Qcc5161 Firmware, Qcc7225 and 14 more 2025-10-21 7.1 High
Transient DOS may occur when multi-profile concurrency arises with QHS enabled.
CVE-2025-46710 1 Imaginationtech 1 Ddk 2025-10-21 5.7 Medium
Possible kernel exceptions caused by reading and writing kernel heap data after free.
CVE-2025-58287 1 Huawei 1 Harmonyos 2025-10-20 7.8 High
Use After Free (UAF) vulnerability in the office service. Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2025-58299 1 Huawei 1 Harmonyos 2025-10-20 8.4 High
Use After Free (UAF) vulnerability in the storage management module. Successful exploitation of this vulnerability may affect availability.
CVE-2025-54281 2 Adobe, Microsoft 2 Framemaker, Windows 2025-10-20 7.8 High
Adobe Framemaker versions 2020.9, 2022.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-61802 3 Adobe, Apple, Microsoft 3 Substance 3d Stager, Macos, Windows 2025-10-20 7.8 High
Substance3D - Stager versions 3.1.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-61801 3 Adobe, Apple, Microsoft 3 Dimension, Macos, Windows 2025-10-20 7.8 High
Dimension versions 4.1.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-54279 3 Adobe, Apple, Microsoft 3 Animate, Macos, Windows 2025-10-20 7.8 High
Animate versions 23.0.13, 24.0.10 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-59734 1 Ffmpeg 1 Ffmpeg 2025-10-19 6.5 Medium
It is possible to cause an use-after-free write in SANM decoding with a carefully crafted animation using subversion <2. When a STOR chunk is present, a subsequent FOBJ chunk will be saved in ctx->stored_frame. Stored frames can later be referenced by FTCH chunks. For files using subversion < 2, the undecoded frame is stored, and decoded again when the FTCH chunks are parsed. However, in process_frame_obj if the frame has an invalid size, there’s an early return, with a value of 0.  This causes the code in decode_frame to still store the raw frame buffer into ctx->stored_frame. Leaving ctx->has_dimensions set to false. A subsequent chunk with type FTCH would call process_ftch and decode that frame obj again, adding to the top/left values and calling process_frame_obj again. Given that we never set ctx->have_dimensions before, this time we set the dimensions, calling init_buffers, which can reallocate the buffer in ctx->stored_frame, freeing the previous one. However, the GetByteContext object gb still holds a reference to the old buffer. Finally, when the code tries to decode the frame, codecs that accept a GetByteContext as a parameter will trigger a use-after-free read when using gb. GetByteContext is only used for reading bytes, so at most one could read invalid data. There are no heap allocations between the free and when the object is accessed. However, upon returning to process_ftch, the code restores the original values for top/left in stored_frame, writing 4 bytes to the freed data at offset 6, potentially corrupting the allocator’s metadata. This issue can be triggered just by probing whether a file has the sanm format. We recommend upgrading to version 8.0 or beyond.
CVE-2025-46709 1 Imaginationtech 2 Ddk, Graphics Ddk 2025-10-17 7.5 High
Possible memory leak or kernel exceptions caused by reading kernel heap data after free or NULL pointer dereference kernel exception.
CVE-2024-54030 2 Openatom, Openharmony 2 Openharmony, Openharmony 2025-10-16 4.4 Medium
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through use after free.
CVE-2023-48184 1 Quickjs Project 1 Quickjs 2025-10-15 3.9 Low
QuickJS before 7414e5f has a quickjs.h JS_FreeValueRT use-after-free because of incorrect garbage collection of async functions with closures.
CVE-2024-36353 2025-10-14 6.5 Medium
Insufficient clearing of GPU global memory could allow a malicious process running on the same GPU to read left over memory values potentially leading to loss of confidentiality.
CVE-2023-36041 1 Microsoft 4 365 Apps, Excel, Office and 1 more 2025-10-08 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2023-36008 1 Microsoft 1 Edge Chromium 2025-10-08 6.6 Medium
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
CVE-2023-36034 1 Microsoft 1 Edge Chromium 2025-10-08 7.3 High
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
CVE-2025-5100 1 Dynamixsoftware 1 Printershare 2025-10-08 8 High
A double-free condition occurs during the cleanup of temporary image files, which can be exploited to achieve memory corruption and potentially arbitrary code execution.
CVE-2024-42326 1 Zabbix 1 Zabbix 2025-10-08 4.4 Medium
There was discovered a use after free bug in browser.c in the es_browser_get_variant function
CVE-2024-42112 1 Linux 1 Linux Kernel 2025-10-07 7.8 High
In the Linux kernel, the following vulnerability has been resolved: net: txgbe: free isb resources at the right time When using MSI/INTx interrupt, the shared interrupts are still being handled in the device remove routine, before free IRQs. So isb memory is still read after it is freed. Thus move wx_free_isb_resources() from txgbe_close() to txgbe_remove(). And fix the improper isb free action in txgbe_open() error handling path.
CVE-2025-61692 1 Keyence 1 Vt Studio 2025-10-07 7.8 High
VT STUDIO versions 8.53 and prior contain a use after free vulnerability. If the product uses a specially crafted file, arbitrary code may be executed on the affected product.