Latest CVE Feed
-
9.3
HIGHCVE-2018-13806
A vulnerability has been identified in SIEMENS TD Keypad Designer (All versions). A DLL hijacking vulnerability exists in all versions of SIEMENS TD Keypad Designer which could allow an attacker to execute code with the permission of the user running TD D... Read more
Affected Products : td_keypad_designer- Published: Sep. 12, 2018
- Modified: Nov. 21, 2024
-
9.3
CRITICALCVE-2024-9166
The device enables an unauthorized attacker to execute system commands with elevated privileges. This exploit is facilitated through the use of the 'getcommand' query within the application, allowing the attacker to gain root access.... Read more
Affected Products :- Published: Sep. 26, 2024
- Modified: Sep. 30, 2024
-
9.3
HIGHCVE-2019-1641
A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected softwa... Read more
- Published: Jan. 23, 2019
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2010-2348
Stack-based buffer overflow in Batch Audio Converter Lite Edition 1.0.0.0 and earlier allows remote attackers to execute arbitrary code via a long line in a .WAV file.... Read more
Affected Products : batch_audio_converter- Published: Jun. 21, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2009-5109
Stack-based buffer overflow in Mini-Stream Ripper 3.0.1.1 allows remote attackers to execute arbitrary code via a long entry in a .pls file.... Read more
Affected Products : ripper- Published: Dec. 25, 2011
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2009-1260
Multiple stack-based buffer overflows in UltraISO 9.3.3.2685 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted (1) CCD or (2) IMG file.... Read more
Affected Products : ultraiso- Published: Apr. 07, 2009
- Modified: Apr. 09, 2025
-
9.3
HIGHCVE-2007-0509
Multiple unspecified vulnerabilities in MaklerPlus before 1.2 have unknown impact and attack vectors, possibly relating to cross-site scripting (XSS) in the slogan parameter in main.tpl, or information leaks in error messages.... Read more
Affected Products : maklerplus- Published: Jan. 26, 2007
- Modified: Apr. 09, 2025
-
9.3
HIGHCVE-2010-2434
Buffer overflow in Arcext.dll 2.16.1 and earlier in pon software Explzh 5.62 and earlier allows remote attackers to execute arbitrary code via an LZH LHA file with a crafted header that is not properly handled during expansion.... Read more
Affected Products : explzh- Published: Jun. 25, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-2590
Heap-based buffer overflow in the CrystalReports12.CrystalPrintControl.1 ActiveX control in PrintControl.dll 12.3.2.753 in SAP Crystal Reports 2008 SP3 Fix Pack 3.2 allows remote attackers to execute arbitrary code via a long ServerResourceVersion propert... Read more
Affected Products : crystal_reports- Published: Dec. 22, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2007-3210
Stack-based buffer overflow in nptoken.mox in the Cellosoft Tokens Object 2.0.0.6 extension for Vitalize! allows remote attackers to execute arbitrary code via a long string argument to the RemoveChr method. NOTE: the provenance of this information is un... Read more
Affected Products : cellosoft_tokens_object- Published: Jun. 14, 2007
- Modified: Apr. 09, 2025
-
9.3
HIGHCVE-2007-2864
Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote attackers to execute arbitrary code via a large invalid value of the coffFiles field in a .CAB file.... Read more
- Published: Jun. 06, 2007
- Modified: Apr. 09, 2025
-
9.3
HIGHCVE-2016-1894
NetApp OnCommand Workflow Automation before 3.1P2 allows remote attackers to bypass authentication via unspecified vectors.... Read more
Affected Products : oncommand_workflow_automation- Published: Feb. 07, 2017
- Modified: Apr. 20, 2025
-
9.3
HIGHCVE-2010-2974
Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated D... Read more
- Published: Aug. 05, 2010
- Modified: Apr. 11, 2025
-
9.3
CRITICALCVE-2024-49305
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPFactory Email Verification for WooCommerce allows SQL Injection.This issue affects Email Verification for WooCommerce: from n/a through 2.8.10.... Read more
Affected Products : customer_email_verification_for_woocommerce- Published: Oct. 17, 2024
- Modified: Oct. 18, 2024
-
9.3
HIGHCVE-2020-1458
A remote code execution vulnerability exists when Microsoft Office improperly validates input before loading dynamic link library (DLL) files, aka 'Microsoft Office Remote Code Execution Vulnerability'.... Read more
Affected Products : 365_apps- Published: Jul. 14, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2017-13162
An elevation of privilege vulnerability in the kernel binder. Product: Android. Versions: Android kernel. Android ID A-64216036.... Read more
Affected Products : android- Published: Dec. 06, 2017
- Modified: Apr. 20, 2025
-
9.3
HIGHCVE-2013-5021
Multiple absolute path traversal vulnerabilities in National Instruments cwui.ocx, as used in National Instruments LabWindows/CVI 2012 SP1 and earlier, National Instruments LabVIEW 2012 SP1 and earlier, the Data Analysis component in ABB DataManager 1 thr... Read more
- Published: Aug. 06, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3975
Untrusted search path vulnerability in Adobe Flash Player 9 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse schannel.dll that is located in the same folder as a file that is... Read more
Affected Products : flash_player- Published: Oct. 19, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2014-6261
Zenoss Core through 5 Beta 3 does not properly implement the Check For Updates feature, which allows remote attackers to execute arbitrary code by (1) spoofing the callhome server or (2) deploying a crafted web site that is visited during a login session,... Read more
Affected Products : zenoss_core- Published: Dec. 15, 2014
- Modified: Apr. 12, 2025
-
9.3
CRITICALCVE-2022-31513
The BolunHan/Krypton repository through 2021-06-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.... Read more
Affected Products : krypton- Published: Jul. 11, 2022
- Modified: Nov. 21, 2024