Total
6316 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2025-50175 | 1 Microsoft | 11 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 8 more | 2025-10-16 | N/A | 7.8 HIGH |
| Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. | |||||
| CVE-2025-59223 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-10-16 | N/A | 7.8 HIGH |
| Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-59224 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-10-16 | N/A | 7.8 HIGH |
| Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-59225 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-10-16 | N/A | 7.8 HIGH |
| Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-59226 | 1 Microsoft | 2 365 Apps, Office Long Term Servicing Channel | 2025-10-16 | N/A | 7.8 HIGH |
| Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-59227 | 1 Microsoft | 3 365 Apps, Office, Office Long Term Servicing Channel | 2025-10-16 | N/A | 7.8 HIGH |
| Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58736 | 1 Microsoft | 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58735 | 1 Microsoft | 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58734 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58733 | 1 Microsoft | 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58732 | 1 Microsoft | 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58731 | 1 Microsoft | 7 Windows 11 22h2, Windows 11 23h2, Windows 11 24h2 and 4 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58730 | 1 Microsoft | 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58738 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1809, Windows 10 21h2 and 9 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-58737 | 1 Microsoft | 6 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 3 more | 2025-10-16 | N/A | 7.0 HIGH |
| Use after free in Windows Remote Desktop allows an unauthorized attacker to execute code locally. | |||||
| CVE-2025-61801 | 3 Adobe, Apple, Microsoft | 3 Dimension, Macos, Windows | 2025-10-16 | N/A | 7.8 HIGH |
| Dimension versions 4.1.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |||||
| CVE-2025-61802 | 3 Adobe, Apple, Microsoft | 3 Substance 3d Stager, Macos, Windows | 2025-10-16 | N/A | 7.8 HIGH |
| Substance3D - Stager versions 3.1.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |||||
| CVE-2025-58287 | 1 Huawei | 1 Harmonyos | 2025-10-16 | N/A | 7.8 HIGH |
| Use After Free (UAF) vulnerability in the office service. Successful exploitation of this vulnerability may affect service confidentiality. | |||||
| CVE-2025-58299 | 1 Huawei | 1 Harmonyos | 2025-10-16 | N/A | 8.4 HIGH |
| Use After Free (UAF) vulnerability in the storage management module. Successful exploitation of this vulnerability may affect availability. | |||||
| CVE-2024-54030 | 1 Openatom | 1 Openharmony | 2025-10-16 | N/A | 4.4 MEDIUM |
| in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through use after free. | |||||
