Total
5947 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2024-9243 | 1 Foxit | 2 Pdf Editor, Pdf Reader | 2024-11-29 | N/A | 7.8 HIGH |
| Foxit PDF Reader AcroForm Doc Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23932. | |||||
| CVE-2022-42374 | 1 Pdf-xchange | 1 Pdf-xchange Editor | 2024-11-27 | N/A | 7.8 HIGH |
| This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18403. | |||||
| CVE-2022-42408 | 1 Pdf-xchange | 1 Pdf-xchange Editor | 2024-11-27 | N/A | 5.5 MEDIUM |
| This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of EMF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18543. | |||||
| CVE-2022-37374 | 1 Pdf-xchange | 1 Pdf-xchange Editor | 2024-11-27 | N/A | 7.8 HIGH |
| This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PNG files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18068. | |||||
| CVE-2022-42414 | 1 Pdf-xchange | 1 Pdf-xchange Editor | 2024-11-27 | N/A | 5.5 MEDIUM |
| This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18326. | |||||
| CVE-2024-9764 | 1 Tungstenautomation | 1 Power Pdf | 2024-11-26 | N/A | 7.8 HIGH |
| Tungsten Automation Power PDF PDF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24480. | |||||
| CVE-2024-33010 | 1 Qualcomm | 496 Ar8035, Ar8035 Firmware, Ar9380 and 493 more | 2024-11-26 | N/A | 7.5 HIGH |
| Transient DOS while parsing fragments of MBSSID IE from beacon frame. | |||||
| CVE-2024-23384 | 1 Qualcomm | 208 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 6700 and 205 more | 2024-11-26 | N/A | 8.4 HIGH |
| Memory corruption when the mapped pages in VBO are still mapped after reclaiming by shrinker. | |||||
| CVE-2024-23383 | 1 Qualcomm | 142 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 6700 and 139 more | 2024-11-26 | N/A | 8.4 HIGH |
| Memory corruption when kernel driver attempts to trigger hardware fences. | |||||
| CVE-2024-23382 | 1 Qualcomm | 208 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 6700 and 205 more | 2024-11-26 | N/A | 8.4 HIGH |
| Memory corruption while processing graphics kernel driver request to create DMA fence. | |||||
| CVE-2024-23381 | 1 Qualcomm | 144 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 6700 and 141 more | 2024-11-26 | N/A | 8.4 HIGH |
| Memory corruption when memory mapped in a VBO is not unmapped by the GPU SMMU. | |||||
| CVE-2024-11570 | 1 Irfanview | 1 Irfanview | 2024-11-26 | N/A | 7.8 HIGH |
| IrfanView DXF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24885. | |||||
| CVE-2024-11521 | 1 Irfanview | 1 Irfanview | 2024-11-25 | N/A | 7.8 HIGH |
| IrfanView DJVU File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DJVU files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24578. | |||||
| CVE-2024-11525 | 1 Irfanview | 1 Irfanview | 2024-11-25 | N/A | 7.8 HIGH |
| IrfanView DXF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24599. | |||||
| CVE-2024-11545 | 1 Irfanview | 1 Irfanview | 2024-11-25 | N/A | 7.8 HIGH |
| IrfanView DXF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24709. | |||||
| CVE-2024-9748 | 1 Tungstenautomation | 1 Power Pdf | 2024-11-25 | N/A | 7.8 HIGH |
| Tungsten Automation Power PDF XPS File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XPS files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24464. | |||||
| CVE-2024-9732 | 1 Tungstenautomation | 1 Power Pdf | 2024-11-25 | N/A | 7.8 HIGH |
| Tungsten Automation Power PDF XPS File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XPS files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24385. | |||||
| CVE-2018-9417 | 1 Google | 1 Android | 2024-11-22 | N/A | 7.8 HIGH |
| In f_hidg_read and hidg_disable of f_hid.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | |||||
| CVE-2018-9428 | 1 Google | 1 Android | 2024-11-22 | N/A | 7.8 HIGH |
| In startDevice of AAudioServiceStreamBase.cpp there is a possible out of bounds write due to a use after free. This could lead to local arbitrary code execution with no additional execution privileges needed. User interaction is needed for exploitation. https://source.android.com/security/bulletin/2018-07-01 | |||||
| CVE-2018-9344 | 1 Google | 1 Android | 2024-11-22 | N/A | 7.8 HIGH |
| In several functions of DescramblerImpl.cpp, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | |||||
