Latest CVE Feed
-
9.3
HIGHCVE-2021-28565
Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by an Out-of-bounds Read vulnerability in the PDFLibTool component. An unauthenticated attacker could leverage thi... Read more
- Published: Sep. 02, 2021
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2021-28610
Adobe After Effects version 18.2 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the contex... Read more
- Published: Aug. 24, 2021
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2021-28606
Adobe After Effects version 18.2 (and earlier) is affected by a Stack-based Buffer Overflow vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the conte... Read more
- Published: Aug. 24, 2021
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2021-28607
Adobe After Effects version 18.2 (and earlier) is affected by a heap corruption vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the cu... Read more
- Published: Aug. 24, 2021
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2015-3770
IOGraphics in Apple OS X before 10.10.5 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2015-5783.... Read more
- Published: Aug. 16, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-2548
Use-after-free vulnerability in the Tablet Input Band in Windows Shell in Microsoft Windows Vista SP2 and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Microsoft Tablet Input Band Use After Free Vulnerability... Read more
- Published: Oct. 14, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-2448
Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Aug. 14, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-2424
Microsoft PowerPoint 2007 SP3, Word 2007 SP3, PowerPoint 2010 SP2, Word 2010 SP2, PowerPoint 2013 SP1, Word 2013 SP1, and PowerPoint 2013 RT SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafte... Read more
- Actively Exploited
- Published: Jul. 14, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-2422
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE... Read more
Affected Products : internet_explorer- Published: Jul. 14, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-1668
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Apr. 14, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-1650
Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps ... Read more
Affected Products : office word word_viewer sharepoint_server office_web_apps office_compatibility_pack- Published: Apr. 14, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-1623
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0056... Read more
Affected Products : internet_explorer- Published: Mar. 11, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-0068
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-20... Read more
Affected Products : internet_explorer- Published: Feb. 11, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-4877
Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entr... Read more
Affected Products : wget- Published: Oct. 29, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-4141
Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-4110
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE... Read more
Affected Products : internet_explorer- Published: Sep. 10, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-4102
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-20... Read more
Affected Products : internet_explorer- Published: Sep. 10, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-2810
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2811... Read more
Affected Products : internet_explorer- Published: Aug. 12, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-2799
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE... Read more
Affected Products : internet_explorer- Published: Sep. 10, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-2797
Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Jul. 08, 2014
- Modified: Apr. 12, 2025