CVE-2024-45152 – Substance3D - Stager | Out-of-bounds Write (CWE-787)
https://notcve.org/view.php?id=CVE-2024-45152
Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. • https://helpx.adobe.com/security/products/substance3d_stager/apsb24-81.html • CWE-787: Out-of-bounds Write •
CVE-2024-45139 – Substance3D - Stager | Heap-based Buffer Overflow (CWE-122)
https://notcve.org/view.php?id=CVE-2024-45139
Substance3D - Stager versions 3.0.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. • https://helpx.adobe.com/security/products/substance3d_stager/apsb24-81.html • CWE-122: Heap-based Buffer Overflow •
CVE-2024-45140 – Substance3D - Stager | Out-of-bounds Write (CWE-787)
https://notcve.org/view.php?id=CVE-2024-45140
Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. • https://helpx.adobe.com/security/products/substance3d_stager/apsb24-81.html • CWE-787: Out-of-bounds Write •
CVE-2024-45144 – Substance3D - Stager | Out-of-bounds Write (CWE-787)
https://notcve.org/view.php?id=CVE-2024-45144
Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. • https://helpx.adobe.com/security/products/substance3d_stager/apsb24-81.html • CWE-787: Out-of-bounds Write •
CVE-2024-9680 – Mozilla Firefox Use-After-Free Vulnerability
https://notcve.org/view.php?id=CVE-2024-9680
An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. ... An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. ... A remote code execution vulnerability was found in Firefox and Thunderbird. The Mozilla Foundation Security Advisories state: An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. Mozilla Firefox and Firefox ESR contain a use-after-free vulnerability in Animation timelines that allows for code execution in the content process. • https://github.com/tdonaworth/Firefox-CVE-2024-9680 https://bugzilla.mozilla.org/show_bug.cgi?id=1923344 https://www.mozilla.org/security/advisories/mfsa2024-51 https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49039 https://www.mozilla.org/security/advisories/mfsa2024-52 https://access.redhat.com/security/cve/CVE-2024-9680 https://bugzilla.redhat.com/show_bug.cgi?id=2317442 • CWE-416: Use After Free •