Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.3

    HIGH
    CVE-2009-0196

    Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a J... Read more

    Affected Products : ghostscript
    • Published: Apr. 16, 2009
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2008-4266

    Array index vulnerability in Microsoft Office Excel 2000 SP3, 2002 SP3, and 2003 SP3; Excel Viewer 2003 Gold and SP3; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via an Excel sp... Read more

    • Published: Dec. 10, 2008
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2008-4031

    Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Outlook 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; an... Read more

    • Published: Dec. 10, 2008
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2008-4019

    Integer overflow in the REPT function in Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2 and SP3, and 2007 Gold and SP1; Office Excel Viewer 2003 SP3; Office Excel Viewer; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and S... Read more

    • Published: Oct. 15, 2008
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2008-3520

    Multiple integer overflows in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via a crafted image file, related to integer multiplication for memory allocation.... Read more

    Affected Products : jasper
    • Published: Oct. 02, 2008
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2008-1085

    Use-after-free vulnerability in Microsoft Internet Explorer 5.01 SP4, 6 through SP1, and 7 allows remote attackers to execute arbitrary code via a crafted data stream that triggers memory corruption, as demonstrated using an invalid MIME-type that does no... Read more

    Affected Products : internet_explorer ie
    • Published: Apr. 08, 2008
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2008-1083

    Heap-based buffer overflow in the CreateDIBPatternBrushPt function in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF or WMF image file with a malforme... Read more

    • Published: Apr. 08, 2008
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2008-0964

    Multiple stack-based buffer overflows in snoop on Sun Solaris 8 through 10 and OpenSolaris before snv_96, when the -o option is omitted, allow remote attackers to execute arbitrary code via a crafted SMB packet.... Read more

    Affected Products : solaris opensolaris sunos
    • Published: Aug. 08, 2008
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2008-0638

    Heap-based buffer overflow in the Veritas Enterprise Administrator (VEA) service (aka vxsvc.exe) in Symantec Veritas Storage Foundation 5.0 allows remote attackers to execute arbitrary code via a packet with a crafted value of a certain size field, which ... Read more

    Affected Products : veritas_storage_foundation
    • Published: Feb. 21, 2008
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2008-0413

    The JavaScript engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via (1) a large switch statement, (2) cer... Read more

    Affected Products : firefox thunderbird seamonkey
    • Published: Feb. 08, 2008
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2008-0043

    Format string vulnerability in Apple iPhoto before 7.1.2 allows remote attackers to execute arbitrary code via photocast subscriptions.... Read more

    Affected Products : iphoto
    • Published: Feb. 08, 2008
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2007-6429

    Multiple integer overflows in X.Org Xserver before 1.4.1 allow context-dependent attackers to execute arbitrary code via (1) a GetVisualInfo request containing a 32-bit value that is improperly used to calculate an amount of memory for allocation by the E... Read more

    Affected Products : xserver evi mit-shm
    • Published: Jan. 18, 2008
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2007-5853

    Unspecified vulnerability in IO Storage Family in Apple Mac OS X 10.4.11 allows user-assisted attackers to cause a denial of service (system shutdown) or execute arbitrary code via a disk image with crafted GUID partition maps, which triggers memory corru... Read more

    Affected Products : mac_os_x
    • Published: Dec. 19, 2007
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2021-22439

    There is a deserialization vulnerability in Huawei AnyOffice V200R006C10. An attacker can construct a specific request to exploit this vulnerability. Successfully exploiting this vulnerability, the attacker can execute remote malicious code injection and ... Read more

    Affected Products : anyoffice
    • Published: Jun. 29, 2021
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2007-4771

    Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecif... Read more

    • Published: Jan. 29, 2008
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2007-4702

    The Application Firewall in Apple Mac OS X 10.5, when "Block all incoming connections" is enabled, does not prevent root processes or mDNSResponder from accepting connections, which might allow remote attackers or local root processes to bypass intended a... Read more

    Affected Products : mac_os_x mac_os_x_server
    • Published: Nov. 15, 2007
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2007-4619

    Multiple integer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1, as used in Winamp before 5.5 and other products, allow user-assisted remote attackers to execute arbitrary code via a malformed FLAC file that triggers improper memory al... Read more

    Affected Products : winamp libflac
    • Published: Oct. 12, 2007
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2007-4474

    Multiple stack-based buffer overflows in the IBM Lotus Domino Web Access ActiveX control, as provided by inotes6.dll, inotes6w.dll, dwa7.dll, and dwa7w.dll, in Domino 6.x and 7.x allow remote attackers to execute arbitrary code, as demonstrated by an over... Read more

    • Published: Dec. 27, 2007
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2007-3752

    Heap-based buffer overflow in Apple iTunes before 7.4 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via crafted album cover art in the covr atom of an MP4/AAC file.... Read more

    Affected Products : itunes
    • Published: Sep. 06, 2007
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2007-3735

    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 2.0.0.5 and Thunderbird before 2.0.0.5 allow remote attackers to cause a denial of service (crash) via unspecified vectors that trigger memory corruption.... Read more

    Affected Products : firefox thunderbird
    • Published: Jul. 18, 2007
    • Modified: Apr. 09, 2025
Showing 20 of 293437 Results