Latest CVE Feed
-
9.3
HIGHCVE-2016-7602
An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "Intel Graphics Driver" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corru... Read more
- Published: Feb. 20, 2017
- Modified: Apr. 20, 2025
-
9.3
HIGHCVE-2014-2133
Buffer overflow in Cisco Advanced Recording Format (ARF) player T27 LD before SP32 EP16, T28 before T28.12, and T29 before T29.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a... Read more
- Published: May. 08, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-1791
Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Jun. 11, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-1567
Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to execute arbitrary code via text tha... Read more
- Published: Sep. 03, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-1555
Use-after-free vulnerability in the nsDocLoader::OnProgress function in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allows remote attackers to execute arbitrary code via vectors that trigger a FireOnStateChange e... Read more
- Published: Jul. 23, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-1549
The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a d... Read more
- Published: Jul. 23, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-0507
Buffer overflow in Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and OS X and before 11.2.202.350 on Linux, Adobe AIR before 13.0.0.83 on Android, Adobe AIR SDK before 13.0.0.83, and Adobe AIR SDK & Compiler... Read more
- Published: Apr. 08, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-0275
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE... Read more
Affected Products : internet_explorer- Published: Feb. 12, 2014
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-6877
Heap-based buffer overflow in RealNetworks RealPlayer before 17.0.4.61 on Windows, and Mac RealPlayer before 12.0.1.1738, allows remote attackers to execute arbitrary code via a long string in the TRACKID element of an RMP file, a different vulnerability ... Read more
Affected Products : realplayer- Published: Dec. 19, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-5604
The txXPathNodeUtils::getBaseURI function in the XSLT processor in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly... Read more
- Published: Oct. 30, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-5047
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE... Read more
Affected Products : internet_explorer- Published: Dec. 11, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3940
Integer overflow in the Graphics Device Interface (GDI) in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Window... Read more
- Published: Nov. 13, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3912
Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE... Read more
Affected Products : internet_explorer- Published: Nov. 13, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3191
Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-201... Read more
Affected Products : internet_explorer- Published: Aug. 14, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3149
Microsoft Internet Explorer 7 and 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Jul. 10, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3118
Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3120... Read more
Affected Products : internet_explorer- Published: Jun. 12, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3009
The com.ibm.CORBA.iiop.ClientDelegate class in IBM Java 1.4.2 before 1.4.2 SR13-FP18, 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 improperly exposes the invoke method of the java.lang.reflect.Method class, which al... Read more
Affected Products : java- Published: Jul. 23, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-1347
Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013.... Read more
Affected Products : windows_7 windows_server_2008 internet_explorer windows_server_2003 windows_vista windows_xp- Actively Exploited
- Published: May. 05, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-1308
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different v... Read more
Affected Products : internet_explorer- Published: May. 15, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-0765
Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 do not prevent multiple wrapping of WebIDL objects, which allows remote attackers to bypass intended access restrictions via unspecified vectors.... Read more
- Published: Feb. 19, 2013
- Modified: Apr. 11, 2025