Vulnerabilities (CVE)

Filtered by CWE-416
Total 6711 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2026-21242 1 Microsoft 8 Windows 10 21h2, Windows 10 22h2, Windows 11 23h2 and 5 more 2026-02-11 N/A 7.0 HIGH
Use after free in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.
CVE-2026-21251 1 Microsoft 5 Windows Server 2016, Windows Server 2019, Windows Server 2022 and 2 more 2026-02-11 N/A 7.8 HIGH
Use after free in Windows Cluster Client Failover allows an authorized attacker to elevate privileges locally.
CVE-2025-47398 1 Qualcomm 306 Ar8031, Ar8031 Firmware, Csra6620 and 303 more 2026-02-11 N/A 7.8 HIGH
Memory Corruption while deallocating graphics processing unit memory buffers due to improper handling of memory pointers.
CVE-2025-47358 1 Qualcomm 42 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 39 more 2026-02-11 N/A 7.8 HIGH
Memory Corruption when user space address is modified and passed to mem_free API, causing kernel memory to be freed inadvertently.
CVE-2025-47359 1 Qualcomm 74 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 71 more 2026-02-11 N/A 7.8 HIGH
Memory Corruption when multiple threads simultaneously access a memory free API.
CVE-2026-21329 3 Adobe, Apple, Microsoft 3 After Effects, Macos, Windows 2026-02-11 N/A 7.8 HIGH
After Effects versions 25.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-21320 3 Adobe, Apple, Microsoft 3 After Effects, Macos, Windows 2026-02-11 N/A 7.8 HIGH
After Effects versions 25.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-21323 3 Adobe, Apple, Microsoft 3 After Effects, Macos, Windows 2026-02-11 N/A 7.8 HIGH
After Effects versions 25.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-21326 3 Adobe, Apple, Microsoft 3 After Effects, Macos, Windows 2026-02-11 N/A 7.8 HIGH
After Effects versions 25.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-21351 3 Adobe, Apple, Microsoft 3 After Effects, Macos, Windows 2026-02-11 N/A 7.8 HIGH
After Effects versions 25.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-59282 1 Microsoft 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more 2026-02-10 N/A 7.0 HIGH
Concurrent execution using shared resource with improper synchronization ('race condition') in Inbox COM Objects allows an unauthorized attacker to execute code locally.
CVE-2026-24917 1 Huawei 2 Emui, Harmonyos 2026-02-10 N/A 6.5 MEDIUM
UAF vulnerability in the security module. Impact: Successful exploitation of this vulnerability may affect availability.
CVE-2026-24914 1 Huawei 1 Harmonyos 2026-02-10 N/A 4.0 MEDIUM
Type confusion vulnerability in the camera module. Impact: Successful exploitation of this vulnerability may affect availability.
CVE-2025-15538 1 Assimp 1 Assimp 2026-02-10 4.3 MEDIUM 5.3 MEDIUM
A security vulnerability has been detected in Open Asset Import Library Assimp up to 6.0.2. Affected by this vulnerability is the function Assimp::LWOImporter::FindUVChannels of the file /src/assimp/code/AssetLib/LWO/LWOMaterial.cpp. Such manipulation leads to use after free. The attack needs to be performed locally. The exploit has been disclosed publicly and may be used. This and similar defects are tracked and handled via issue #6128.
CVE-2026-24677 1 Freerdp 1 Freerdp 2026-02-10 N/A 9.1 CRITICAL
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, ecam_encoder_compress_h264 trusts server-controlled dimensions and does not validate the source buffer size, leading to an out-of-bounds read in sws_scale. This vulnerability is fixed in 3.22.0.
CVE-2026-24678 1 Freerdp 1 Freerdp 2026-02-10 N/A 7.5 HIGH
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, A capture thread sends sample responses using a freed channel callback after a device channel close, leading to a use after free in ecam_channel_write. This vulnerability is fixed in 3.22.0.
CVE-2026-24680 1 Freerdp 1 Freerdp 2026-02-10 N/A 7.5 HIGH
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, sdl_Pointer_New frees data on failure, then pointer_free calls sdl_Pointer_Free and frees it again, triggering ASan UAF. This vulnerability is fixed in 3.22.0.
CVE-2026-24491 1 Freerdp 1 Freerdp 2026-02-10 N/A 7.5 HIGH
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, video_timer can send client notifications after the control channel is closed, dereferencing a freed callback and triggering a use after free. This vulnerability is fixed in 3.22.0.
CVE-2026-24681 1 Freerdp 1 Freerdp 2026-02-10 N/A 7.5 HIGH
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, aAsynchronous bulk transfer completions can use a freed channel callback after URBDRC channel close, leading to a use after free in urb_write_completion. This vulnerability is fixed in 3.22.0.
CVE-2026-24675 1 Freerdp 1 Freerdp 2026-02-10 N/A 7.5 HIGH
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, urb_select_interface can free the device's MS config on error but later code still dereferences it, leading to a use after free in libusb_udev_select_interface. This vulnerability is fixed in 3.22.0.