Total
4836 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-42414 | 1 Pdf-xchange | 1 Pdf-xchange Editor | 2024-11-27 | N/A | 5.5 MEDIUM |
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18326. | |||||
CVE-2024-4610 | 1 Arm | 2 Bifrost Gpu Kernel Driver, Valhall Gpu Kernel Driver | 2024-11-27 | N/A | 7.8 HIGH |
Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r34p0 through r40p0; Valhall GPU Kernel Driver: from r34p0 through r40p0. | |||||
CVE-2024-4671 | 2 Fedoraproject, Google | 2 Fedora, Chrome | 2024-11-27 | N/A | 9.6 CRITICAL |
Use after free in Visuals in Google Chrome prior to 124.0.6367.201 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) | |||||
CVE-2024-50274 | 1 Linux | 1 Linux Kernel | 2024-11-27 | N/A | 7.8 HIGH |
In the Linux kernel, the following vulnerability has been resolved: idpf: avoid vport access in idpf_get_link_ksettings When the device control plane is removed or the platform running device control plane is rebooted, a reset is detected on the driver. On driver reset, it releases the resources and waits for the reset to complete. If the reset fails, it takes the error path and releases the vport lock. At this time if the monitoring tools tries to access link settings, it call traces for accessing released vport pointer. To avoid it, move link_speed_mbps to netdev_priv structure which removes the dependency on vport pointer and the vport lock in idpf_get_link_ksettings. Also use netif_carrier_ok() to check the link status and adjust the offsetof to use link_up instead of link_speed_mbps. | |||||
CVE-2024-42331 | 2024-11-27 | N/A | 3.3 LOW | ||
In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file. A use-after-free bug can occur at this stage if the wd->browser heap pointer is freed by garbage collection. | |||||
CVE-2024-42326 | 2024-11-27 | N/A | 4.4 MEDIUM | ||
There was discovered a use after free bug in browser.c in the es_browser_get_variant function | |||||
CVE-2024-50269 | 1 Linux | 1 Linux Kernel | 2024-11-26 | N/A | 7.8 HIGH |
In the Linux kernel, the following vulnerability has been resolved: usb: musb: sunxi: Fix accessing an released usb phy Commit 6ed05c68cbca ("usb: musb: sunxi: Explicitly release USB PHY on exit") will cause that usb phy @glue->xceiv is accessed after released. 1) register platform driver @sunxi_musb_driver // get the usb phy @glue->xceiv sunxi_musb_probe() -> devm_usb_get_phy(). 2) register and unregister platform driver @musb_driver musb_probe() -> sunxi_musb_init() use the phy here //the phy is released here musb_remove() -> sunxi_musb_exit() -> devm_usb_put_phy() 3) register @musb_driver again musb_probe() -> sunxi_musb_init() use the phy here but the phy has been released at 2). ... Fixed by reverting the commit, namely, removing devm_usb_put_phy() from sunxi_musb_exit(). | |||||
CVE-2024-9764 | 1 Tungstenautomation | 1 Power Pdf | 2024-11-26 | N/A | 7.8 HIGH |
Tungsten Automation Power PDF PDF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24480. | |||||
CVE-2024-9680 | 2 Debian, Mozilla | 3 Debian Linux, Firefox, Thunderbird | 2024-11-26 | N/A | 9.8 CRITICAL |
An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0. | |||||
CVE-2024-33010 | 1 Qualcomm | 496 Ar8035, Ar8035 Firmware, Ar9380 and 493 more | 2024-11-26 | N/A | 7.5 HIGH |
Transient DOS while parsing fragments of MBSSID IE from beacon frame. | |||||
CVE-2024-23384 | 1 Qualcomm | 208 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 6700 and 205 more | 2024-11-26 | N/A | 8.4 HIGH |
Memory corruption when the mapped pages in VBO are still mapped after reclaiming by shrinker. | |||||
CVE-2024-23383 | 1 Qualcomm | 142 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 6700 and 139 more | 2024-11-26 | N/A | 8.4 HIGH |
Memory corruption when kernel driver attempts to trigger hardware fences. | |||||
CVE-2024-23382 | 1 Qualcomm | 208 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 6700 and 205 more | 2024-11-26 | N/A | 8.4 HIGH |
Memory corruption while processing graphics kernel driver request to create DMA fence. | |||||
CVE-2024-23381 | 1 Qualcomm | 144 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 6700 and 141 more | 2024-11-26 | N/A | 8.4 HIGH |
Memory corruption when memory mapped in a VBO is not unmapped by the GPU SMMU. | |||||
CVE-2018-11816 | 2024-11-26 | N/A | 7.8 HIGH | ||
Crafted Binder Request Causes Heap UAF in MediaServer | |||||
CVE-2024-11570 | 1 Irfanview | 1 Irfanview | 2024-11-26 | N/A | 7.8 HIGH |
IrfanView DXF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24885. | |||||
CVE-2017-18153 | 2024-11-26 | N/A | 8.4 HIGH | ||
A race condition exists in a driver potentially leading to a use-after-free condition. | |||||
CVE-2024-11521 | 1 Irfanview | 1 Irfanview | 2024-11-25 | N/A | 7.8 HIGH |
IrfanView DJVU File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DJVU files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24578. | |||||
CVE-2024-11525 | 1 Irfanview | 1 Irfanview | 2024-11-25 | N/A | 7.8 HIGH |
IrfanView DXF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24599. | |||||
CVE-2024-11545 | 1 Irfanview | 1 Irfanview | 2024-11-25 | N/A | 7.8 HIGH |
IrfanView DXF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24709. |