Vulnerabilities (CVE)

Filtered by CWE-416
Total 5616 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-33028 1 Qualcomm 276 Ar8035, Ar8035 Firmware, Csra6620 and 273 more 2024-11-20 N/A 7.8 HIGH
Memory corruption as fence object may still be accessed in timeline destruct after isync fence is released.
CVE-2024-33034 1 Qualcomm 210 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 6700 and 207 more 2024-11-20 N/A 7.8 HIGH
Memory corruption can occur if VBOs hold outdated or invalid GPU SMMU mappings, especially when the binding and reclaiming of memory buffers are performed at the same time.
CVE-2024-43459 1 Microsoft 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 2024-11-19 N/A 8.8 HIGH
SQL Server Native Client Remote Code Execution Vulnerability
CVE-2023-4679 1 Gpac 1 Gpac 2024-11-19 N/A 5.5 MEDIUM
A use after free vulnerability exists in GPAC version 2.3-DEV-revrelease, specifically in the gf_filterpacket_del function in filter_core/filter.c at line 38. This vulnerability can lead to a double-free condition, which may cause the application to crash.
CVE-2024-43642 1 Microsoft 6 Windows 11 22h2, Windows 11 23h2, Windows 11 24h2 and 3 more 2024-11-18 N/A 7.5 HIGH
Windows SMB Denial of Service Vulnerability
CVE-2023-4134 2 Fedoraproject, Linux 2 Fedora, Linux Kernel 2024-11-18 N/A 5.5 MEDIUM
A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.
CVE-2024-49032 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2024-11-18 N/A 7.8 HIGH
Microsoft Office Graphics Remote Code Execution Vulnerability
CVE-2024-49526 3 Adobe, Apple, Microsoft 3 Animate, Macos, Windows 2024-11-18 N/A 7.8 HIGH
Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-49991 1 Linux 1 Linux Kernel 2024-11-17 N/A 7.8 HIGH
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer Pass pointer reference to amdgpu_bo_unref to clear the correct pointer, otherwise amdgpu_bo_unref clear the local variable, the original pointer not set to NULL, this could cause use-after-free bug.
CVE-2024-49986 1 Linux 1 Linux Kernel 2024-11-17 N/A 7.8 HIGH
In the Linux kernel, the following vulnerability has been resolved: platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors x86_android_tablet_remove() frees the pdevs[] array, so it should not be used after calling x86_android_tablet_remove(). When platform_device_register() fails, store the pdevs[x] PTR_ERR() value into the local ret variable before calling x86_android_tablet_remove() to avoid using pdevs[] after it has been freed.
CVE-2024-49027 1 Microsoft 4 365 Apps, Excel, Office and 1 more 2024-11-16 N/A 7.8 HIGH
Microsoft Excel Remote Code Execution Vulnerability
CVE-2024-43625 1 Microsoft 6 Windows 11 22h2, Windows 11 23h2, Windows 11 24h2 and 3 more 2024-11-15 N/A 8.1 HIGH
Microsoft Windows VMSwitch Elevation of Privilege Vulnerability
CVE-2024-8376 1 Eclipse 1 Mosquitto 2024-11-15 N/A 7.5 HIGH
In Eclipse Mosquitto up to version 2.0.18a, an attacker can achieve memory leaking, segmentation fault or heap-use-after-free by sending specific sequences of "CONNECT", "DISCONNECT", "SUBSCRIBE", "UNSUBSCRIBE" and "PUBLISH" packets.
CVE-2024-49016 1 Microsoft 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 2024-11-15 N/A 8.8 HIGH
SQL Server Native Client Remote Code Execution Vulnerability
CVE-2024-49021 1 Microsoft 4 Sql Server 2016, Sql Server 2017, Sql Server 2019 and 1 more 2024-11-15 N/A 7.8 HIGH
Microsoft SQL Server Remote Code Execution Vulnerability
CVE-2024-49003 1 Microsoft 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 2024-11-15 N/A 8.8 HIGH
SQL Server Native Client Remote Code Execution Vulnerability
CVE-2024-40885 2024-11-15 N/A 6.4 MEDIUM
Use after free in the UEFI firmware of some Intel(R) Server M20NTP BIOS may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2024-4741 2024-11-13 N/A 7.5 HIGH
Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications. The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use. The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arrived. In this case calling SSL_free_buffers will succeed even though a record has only been partially processed and the buffer is still in use. The second scenario occurs where a full record containing application data has been received and processed by OpenSSL but the application has only read part of this data. Again a call to SSL_free_buffers will succeed even though the buffer is still in use. While these scenarios could occur accidentally during normal operation a malicious attacker could attempt to engineer a stituation where this occurs. We are not aware of this issue being actively exploited. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
CVE-2024-50059 1 Linux 1 Linux Kernel 2024-11-08 N/A 7.0 HIGH
In the Linux kernel, the following vulnerability has been resolved: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition In the switchtec_ntb_add function, it can call switchtec_ntb_init_sndev function, then &sndev->check_link_status_work is bound with check_link_status_work. switchtec_ntb_link_notification may be called to start the work. If we remove the module which will call switchtec_ntb_remove to make cleanup, it will free sndev through kfree(sndev), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows: CPU0 CPU1 | check_link_status_work switchtec_ntb_remove | kfree(sndev); | | if (sndev->link_force_down) | // use sndev Fix it by ensuring that the work is canceled before proceeding with the cleanup in switchtec_ntb_remove.
CVE-2024-50027 1 Linux 1 Linux Kernel 2024-11-08 N/A 5.5 MEDIUM
In the Linux kernel, the following vulnerability has been resolved: thermal: core: Free tzp copy along with the thermal zone The object pointed to by tz->tzp may still be accessed after being freed in thermal_zone_device_unregister(), so move the freeing of it to the point after the removal completion has been completed at which it cannot be accessed any more.