Vulnerabilities (CVE)

Filtered by CWE-416
Total 5766 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-23158 1 Autodesk 9 Advance Steel, Autocad, Autocad Architecture and 6 more 2025-08-26 N/A 7.8 HIGH
A maliciously crafted IGES file, when parsed in ASMImport229A.dll through Autodesk applications, can be used to cause a use-after-free vulnerability. A malicious actor can leverage this vulnerability to cause a crash or execute arbitrary code in the context of the current process.
CVE-2024-23142 1 Autodesk 9 Advance Steel, Autocad, Autocad Architecture and 6 more 2025-08-26 N/A 7.8 HIGH
A maliciously crafted CATPART, STP, and MODEL file, when parsed in atf_dwg_consumer.dll, rose_x64_vc15.dll and libodxdll through Autodesk applications, can cause a use-after-free vulnerability. This vulnerability, along with other vulnerabilities, can lead to code execution in the current process.
CVE-2024-2312 2 Gnu, Netapp 3 Grub2, Bootstrap Os, Hci Compute Node 2025-08-26 N/A 6.7 MEDIUM
GRUB2 does not call the module fini functions on exit, leading to Debian/Ubuntu's peimage GRUB2 module leaving UEFI system table hooks after exit. This lead to a use-after-free condition, and could possibly lead to secure boot bypass.
CVE-2025-9386 2025-08-25 4.3 MEDIUM 5.3 MEDIUM
A vulnerability has been found in appneta tcpreplay up to 4.5.1. The impacted element is the function get_l2len_protocol of the file get.c of the component tcprewrite. Such manipulation leads to use after free. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. Upgrading to version 4.5.2-beta3 is sufficient to resolve this issue. You should upgrade the affected component.
CVE-2025-9385 2025-08-25 4.3 MEDIUM 5.3 MEDIUM
A flaw has been found in appneta tcpreplay up to 4.5.1. The affected element is the function fix_ipv6_checksums of the file edit_packet.c of the component tcprewrite. This manipulation causes use after free. The attack is restricted to local execution. The exploit has been published and may be used. Upgrading to version 4.5.2-beta3 is sufficient to fix this issue. It is advisable to upgrade the affected component.
CVE-2025-1048 1 Sonos 3 Era 300, S1, S2 2025-08-25 N/A 8.8 HIGH
Sonos Era 300 Speaker libsmb2 Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of SMB data. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the anacapa user. Was ZDI-CAN-25535.
CVE-2024-43374 2 Netapp, Vim 3 Bootstrap Os, Hci Compute Node, Vim 2025-08-25 N/A 4.5 MEDIUM
The UNIX editor Vim prior to version 9.1.0678 has a use-after-free error in argument list handling. When adding a new file to the argument list, this triggers `Buf*` autocommands. If in such an autocommand the buffer that was just opened is closed (including the window where it is shown), this causes the window structure to be freed which contains a reference to the argument list that we are actually modifying. Once the autocommands are completed, the references to the window and argument list are no longer valid and as such cause an use-after-free. Impact is low since the user must either intentionally add some unusual autocommands that wipe a buffer during creation (either manually or by sourcing a malicious plugin), but it will crash Vim. The issue has been fixed as of Vim patch v9.1.0678.
CVE-2024-25648 3 Apple, Foxit, Microsoft 4 Macos, Pdf Editor, Pdf Reader and 1 more 2025-08-22 N/A 8.8 HIGH
A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a ComboBox widget. A specially crafted JavaScript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
CVE-2024-25938 3 Apple, Foxit, Microsoft 4 Macos, Pdf Editor, Pdf Reader and 1 more 2025-08-22 N/A 8.8 HIGH
A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a Barcode widget. A specially crafted JavaScript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
CVE-2023-49606 1 Tinyproxy Project 1 Tinyproxy 2025-08-22 N/A 9.8 CRITICAL
A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.
CVE-2025-31239 1 Apple 6 Ipados, Iphone Os, Macos and 3 more 2025-08-21 N/A 4.3 MEDIUM
A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 11.5, macOS Sonoma 14.7.6, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, macOS Ventura 13.7.6. Parsing a file may lead to an unexpected app termination.
CVE-2025-21436 1 Qualcomm 50 Fastconnect 7800, Fastconnect 7800 Firmware, Qmp1000 and 47 more 2025-08-20 N/A 7.8 HIGH
Memory corruption may occur while initiating two IOCTL calls simultaneously to create processes from two different threads.
CVE-2025-21437 1 Qualcomm 62 Qam8255p, Qam8255p Firmware, Qam8295p and 59 more 2025-08-20 N/A 7.8 HIGH
Memory corruption while processing memory map or unmap IOCTL operations simultaneously.
CVE-2025-27031 1 Qualcomm 42 Fastconnect 6700, Fastconnect 6700 Firmware, Fastconnect 6900 and 39 more 2025-08-20 N/A 7.8 HIGH
memory corruption while processing IOCTL commands, when the buffer in write loopback mode is accessed after being freed.
CVE-2025-21456 1 Qualcomm 128 Ar8035, Ar8035 Firmware, C-v2x 9150 and 125 more 2025-08-20 N/A 7.8 HIGH
Memory corruption while processing IOCTL command when multiple threads are called to map/unmap buffer concurrently.
CVE-2024-27246 1 Zoom 5 Meeting Software Development Kit, Rooms, Workplace and 2 more 2025-08-20 N/A 4.3 MEDIUM
Use after free in some Zoom Workplace Apps and SDKs may allow an authenticated user to conduct a denial of service via network access.
CVE-2025-9157 2025-08-20 4.3 MEDIUM 5.3 MEDIUM
A vulnerability was determined in appneta tcpreplay up to 4.5.2-beta2. The impacted element is the function untrunc_packet of the file src/tcpedit/edit_packet.c of the component tcprewrite. Executing manipulation can lead to use after free. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. This patch is called 73008f261f1cdf7a1087dc8759115242696d35da. Applying a patch is advised to resolve this issue.
CVE-2025-1432 1 Autodesk 9 Advance Steel, Autocad, Autocad Architecture and 6 more 2025-08-19 N/A 7.8 HIGH
A maliciously crafted 3DM file, when parsed through Autodesk AutoCAD, can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
CVE-2025-49761 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-08-19 N/A 7.8 HIGH
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
CVE-2025-21915 1 Linux 1 Linux Kernel 2025-08-19 N/A 7.8 HIGH
In the Linux kernel, the following vulnerability has been resolved: cdx: Fix possible UAF error in driver_override_show() Fixed a possible UAF problem in driver_override_show() in drivers/cdx/cdx.c This function driver_override_show() is part of DEVICE_ATTR_RW, which includes both driver_override_show() and driver_override_store(). These functions can be executed concurrently in sysfs. The driver_override_store() function uses driver_set_override() to update the driver_override value, and driver_set_override() internally locks the device (device_lock(dev)). If driver_override_show() reads cdx_dev->driver_override without locking, it could potentially access a freed pointer if driver_override_store() frees the string concurrently. This could lead to printing a kernel address, which is a security risk since DEVICE_ATTR can be read by all users. Additionally, a similar pattern is used in drivers/amba/bus.c, as well as many other bus drivers, where device_lock() is taken in the show function, and it has been working without issues. This potential bug was detected by our experimental static analysis tool, which analyzes locking APIs and paired functions to identify data races and atomicity violations.