Total
6309 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-53140 | 2025-08-13 | 7 High | ||
Use after free in Kernel Transaction Manager allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-53132 | 2025-08-13 | 8 High | ||
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to elevate privileges over a network. | ||||
CVE-2025-53133 | 2025-08-13 | 7.8 High | ||
Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-53151 | 2025-08-13 | 7.8 High | ||
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-49761 | 2025-08-13 | 7.8 High | ||
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-50167 | 2025-08-13 | 7 High | ||
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-53731 | 2025-08-13 | 8.4 High | ||
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. | ||||
CVE-2025-50177 | 2025-08-13 | 8.1 High | ||
Use after free in Windows Message Queuing allows an unauthorized attacker to execute code over a network. | ||||
CVE-2025-53735 | 2025-08-13 | 7.8 High | ||
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | ||||
CVE-2025-53142 | 2025-08-13 | 7 High | ||
Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-8882 | 2025-08-13 | N/A | ||
Use after free in Aura in Google Chrome prior to 139.0.7258.127 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) | ||||
CVE-2013-3893 | 1 Microsoft | 1 Internet Explorer | 2025-08-13 | 8.8 High |
Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll. | ||||
CVE-2025-54232 | 2025-08-12 | 7.8 High | ||
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2025-54231 | 2025-08-12 | 7.8 High | ||
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2025-54230 | 2025-08-12 | 7.8 High | ||
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2025-54229 | 2025-08-12 | 7.8 High | ||
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2025-54226 | 2025-08-12 | 7.8 High | ||
InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2025-54225 | 2025-08-12 | 7.8 High | ||
InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2025-54224 | 2025-08-12 | 7.8 High | ||
InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2025-54223 | 2025-08-12 | 7.8 High | ||
InCopy versions 20.4, 19.5.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |