Filtered by CWE-416
Total 5984 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-36895 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2025-02-27 7.8 High
Microsoft Outlook Remote Code Execution Vulnerability
CVE-2023-38211 3 Adobe, Apple, Microsoft 3 Dimension, Macos, Windows 2025-02-27 7.8 High
Adobe Dimension version 3.4.9 is affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-38243 3 Adobe, Apple, Microsoft 6 Acrobat, Acrobat Dc, Acrobat Reader and 3 more 2025-02-27 5.5 Medium
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-38224 3 Adobe, Apple, Microsoft 6 Acrobat, Acrobat Dc, Acrobat Reader and 3 more 2025-02-27 7.8 High
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-38230 3 Adobe, Apple, Microsoft 6 Acrobat, Acrobat Dc, Acrobat Reader and 3 more 2025-02-27 5.5 Medium
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-4394 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-02-27 6.7 Medium
A use-after-free flaw was found in btrfs_get_dev_args_from_path in fs/btrfs/volumes.c in btrfs file-system in the Linux Kernel. This flaw allows a local attacker with special privileges to cause a system crash or leak internal kernel information
CVE-2023-36741 1 Microsoft 1 Edge Chromium 2025-02-27 8.3 High
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
CVE-2023-4611 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-02-27 7 High
A use-after-free flaw was found in mm/mempolicy.c in the memory management subsystem in the Linux Kernel. This issue is caused by a race between mbind() and VMA-locked page fault, and may allow a local attacker to crash the system or lead to a kernel information leak.
CVE-2021-43753 2 Adobe, Microsoft 2 Lightroom, Windows 2025-02-27 7.8 High
Adobe Lightroom versions 4.4 (and earlier) are affected by a use-after-free vulnerability in the processing of parsing TIF files that could result in privilege escalation. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2021-40790 3 Adobe, Apple, Microsoft 3 Premiere Pro, Macos, Windows 2025-02-27 5.5 Medium
Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2021-44189 3 Adobe, Apple, Microsoft 3 After Effects, Macos, Windows 2025-02-27 3.3 Low
Adobe After Effects versions 22.0 (and earlier) and 18.4.2 (and earlier) are affected by an Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-30644 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-02-27 7.8 High
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by a Use-After-Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-28835 3 Adobe, Apple, Microsoft 3 Incopy, Macos, Windows 2025-02-27 7.8 High
Adobe InCopy versions 17.1 (and earlier) and 16.4.1 (and earlier) are affected by an Use-After-Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-36735 1 Microsoft 1 Edge Chromium 2025-02-27 9.6 Critical
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
CVE-2023-36562 1 Microsoft 1 Edge Chromium 2025-02-27 7.1 High
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
CVE-2023-33029 1 Qualcomm 264 Apq8009, Apq8009 Firmware, Ar8035 and 261 more 2025-02-27 8.4 High
Memory corruption in DSP Service during a remote call from HLOS to DSP.
CVE-2023-33039 1 Qualcomm 42 Qam8295p, Qam8295p Firmware, Qam8650p and 39 more 2025-02-27 8.4 High
Memory corruption in Automotive Display while destroying the image handle created using connected display driver.
CVE-2023-36583 1 Microsoft 12 Windows 10, Windows 10 1607, Windows 10 1809 and 9 more 2025-02-27 7.3 High
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2023-36565 1 Microsoft 2 Office, Office Long Term Servicing Channel 2025-02-27 7 High
Microsoft Office Graphics Elevation of Privilege Vulnerability
CVE-2023-38216 3 Adobe, Apple, Microsoft 3 Bridge, Macos, Windows 2025-02-27 5.5 Medium
Adobe Bridge versions 12.0.4 (and earlier) and 13.0.3 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.