Latest CVE Feed
-
9.3
HIGHCVE-2014-0259
Microsoft Word 2007 SP3 and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Word Memory Corruption Vulnerability."... Read more
- Published: Jan. 15, 2014
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2021-1643
HEVC Video Extensions Remote Code Execution Vulnerability... Read more
Affected Products : hevc_video_extensions- Published: Jan. 12, 2021
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2013-5331
Adobe Flash Player before 11.7.700.257 and 11.8.x and 11.9.x before 11.9.900.170 on Windows and Mac OS X and before 11.2.202.332 on Linux, Adobe AIR before 3.9.0.1380, Adobe AIR SDK before 3.9.0.1380, and Adobe AIR SDK & Compiler before 3.9.0.1380 allow r... Read more
- Published: Dec. 11, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2021-27245
This vulnerability allows a firewall bypass on affected installations of TP-Link Archer A7 prior to Archer C7(US)_V5_210125 and Archer A7(US)_V5_200220 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists ... Read more
- Published: Mar. 29, 2021
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2013-3918
The InformationCardSigninHelper Class ActiveX control in icardie.dll in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R... Read more
- Published: Nov. 12, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3858
Microsoft Word Automation Services in SharePoint Server 2010 SP1, Word Web App 2010 SP1 in Office Web Apps 2010, Word 2003 SP3, Word 2007 SP3, Word 2010 SP1, Office Compatibility Pack SP3, and Word Viewer allow remote attackers to execute arbitrary code o... Read more
- Published: Sep. 11, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3852
Microsoft Word 2003 SP3, 2007 SP3, and 2010 SP1; Office Compatibility Pack SP3; and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Word Memory Corruption Vu... Read more
- Published: Sep. 11, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3187
Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-201... Read more
Affected Products : internet_explorer- Published: Aug. 14, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3147
Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Jul. 10, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3146
Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3152... Read more
Affected Products : internet_explorer- Published: Jul. 10, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3134
The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 on 64-bit platforms does not properly allocate arrays of structures, which allows remote attackers to execute arbitrary code via a crafted .NET Framework applica... Read more
Affected Products : .net_framework- Published: Jul. 10, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGH- Published: Mar. 11, 2021
- Modified: Aug. 20, 2025
-
9.3
HIGHCVE-2013-5832
Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a diffe... Read more
- Published: Oct. 16, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2021-27083
Remote Development Extension for Visual Studio Code Remote Code Execution Vulnerability... Read more
Affected Products : remote_development- Published: Mar. 11, 2021
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2021-27084
Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability... Read more
- Published: Mar. 11, 2021
- Modified: Jul. 30, 2025
-
9.3
CRITICALCVE-2021-27080
Azure Sphere Unsigned Code Execution Vulnerability... Read more
Affected Products : azure_sphere- Published: Mar. 11, 2021
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2013-1684
Use-after-free vulnerability in the mozilla::dom::HTMLMediaElement::LookupMediaElementURITable function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attacke... Read more
- Published: Jun. 26, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2021-27070
Windows 10 Update Assistant Elevation of Privilege Vulnerability... Read more
Affected Products : windows_10 windows_server_2016 windows_10_1809 windows_10_20h2 windows_server_20h2 windows_server_2004- Published: Mar. 11, 2021
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2021-27031
A user may be tricked into opening a malicious FBX file which may exploit a use-after-free vulnerability in FBX's Review causing the application to reference a memory location controlled by an unauthorized third party, thereby running arbitrary code on th... Read more
Affected Products : fbx_review- Published: Apr. 19, 2021
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2013-1311
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."... Read more
Affected Products : internet_explorer- Published: May. 15, 2013
- Modified: Apr. 11, 2025