CVE-2024-43556 – Windows Graphics Component Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-43556
An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43556 • CWE-416: Use After Free •
CVE-2024-45138 – Substance3D - Stager | Use After Free (CWE-416)
https://notcve.org/view.php?id=CVE-2024-45138
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Substance 3D Stager. • https://helpx.adobe.com/security/products/substance3d_stager/apsb24-81.html • CWE-416: Use After Free •
CVE-2024-45146 – Dimension | Use After Free (CWE-416)
https://notcve.org/view.php?id=CVE-2024-45146
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Dimension. • https://helpx.adobe.com/security/products/dimension/apsb24-74.html • CWE-416: Use After Free •
CVE-2024-43363 – Remote code execution via Log Poisoning in Cacti
https://notcve.org/view.php?id=CVE-2024-43363
After having the malicious hostname end up in the logs (log poisoning), one can simply go to the log file url to execute commands to achieve RCE. • https://github.com/Cacti/cacti/security/advisories/GHSA-gxq4-mv8h-6qj4 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2024-45291 – Path traversal and Server-Side Request Forgery in HTML writer when embedding images is enabled in PHPSpreadsheet
https://notcve.org/view.php?id=CVE-2024-45291
Note that any PHP protocol wrappers can be used, meaning that if for example the `expect://` wrapper is enabled, also remote code execution is possible. • https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-w9xv-qf98-ccq4 • CWE-36: Absolute Path Traversal CWE-918: Server-Side Request Forgery (SSRF) •