Total
6052 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2025-59226 | 1 Microsoft | 2 365 Apps, Office Long Term Servicing Channel | 2025-10-16 | N/A | 7.8 HIGH |
| Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-59227 | 1 Microsoft | 3 365 Apps, Office, Office Long Term Servicing Channel | 2025-10-16 | N/A | 7.8 HIGH |
| Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58736 | 1 Microsoft | 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58735 | 1 Microsoft | 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58734 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58733 | 1 Microsoft | 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58732 | 1 Microsoft | 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58731 | 1 Microsoft | 7 Windows 11 22h2, Windows 11 23h2, Windows 11 24h2 and 4 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58730 | 1 Microsoft | 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58738 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1809, Windows 10 21h2 and 9 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58737 | 1 Microsoft | 6 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 3 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Windows Remote Desktop allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-61801 | 3 Adobe, Apple, Microsoft | 3 Dimension, Macos, Windows | 2025-10-16 | N/A | 7.8 HIGH |
| Dimension versions 4.1.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |||||
| CVE-2025-61802 | 3 Adobe, Apple, Microsoft | 3 Substance 3d Stager, Macos, Windows | 2025-10-16 | N/A | 7.8 HIGH |
| Substance3D - Stager versions 3.1.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |||||
| CVE-2025-58287 | 1 Huawei | 1 Harmonyos | 2025-10-16 | N/A | 7.8 HIGH |
| Use After Free (UAF) vulnerability in the office service. Successful exploitation of this vulnerability may affect service confidentiality. | |||||
| CVE-2025-58299 | 1 Huawei | 1 Harmonyos | 2025-10-16 | N/A | 8.4 HIGH |
| Use After Free (UAF) vulnerability in the storage management module. Successful exploitation of this vulnerability may affect availability. | |||||
| CVE-2024-54030 | 1 Openatom | 1 Openharmony | 2025-10-16 | N/A | 4.4 MEDIUM |
| in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through use after free. | |||||
| CVE-2025-11719 | 2 Microsoft, Mozilla | 3 Windows, Firefox, Thunderbird | 2025-10-15 | N/A | 9.8 CRITICAL |
| Starting in Firefox 143, the use of the native messaging API by web extensions on Windows could lead to crashes caused by use-after-free memory corruption. This vulnerability affects Firefox < 144 and Thunderbird < 144. | |||||
| CVE-2025-53132 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-10-15 | N/A | 7.8 HIGH |
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. | |||||
| CVE-2023-48184 | 1 Quickjs Project | 1 Quickjs | 2025-10-15 | N/A | 3.9 LOW |
| QuickJS before 7414e5f has a quickjs.h JS_FreeValueRT use-after-free because of incorrect garbage collection of async functions with closures. | |||||
| CVE-2025-23280 | 2025-10-14 | N/A | 7.0 HIGH | ||
| NVIDIA Display Driver for Linux contains a vulnerability where an attacker could cause a use-after-free. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure. | |||||
