Latest CVE Feed
-
9.3
HIGHCVE-2015-1759
Microsoft Office Compatibility Pack SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."... Read more
Affected Products : office_compatibility_pack- Published: Jun. 10, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-1747
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1732... Read more
Affected Products : internet_explorer- Published: Jun. 10, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-1744
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE... Read more
Affected Products : internet_explorer- Published: Jun. 10, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-1754
Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Jun. 10, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-1742
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1732... Read more
Affected Products : internet_explorer- Published: Jun. 10, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-1745
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE... Read more
Affected Products : internet_explorer- Published: Jun. 10, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2010-1132
The mlfi_envrcpt function in spamass-milter.cpp in SpamAssassin Milter Plugin 0.3.1, when using the expand option, allows remote attackers to execute arbitrary system commands via shell metacharacters in the RCPT TO field of an email message.... Read more
Affected Products : spamassassin_milter_plugin- Published: Mar. 27, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2015-1770
Microsoft Office 2013 SP1 and 2013 RT SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Uninitialized Memory Use Vulnerability."... Read more
- Actively Exploited
- Published: Jun. 10, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-1730
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Jun. 10, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-1766
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE... Read more
Affected Products : internet_explorer- Published: Jun. 10, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2010-1198
Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to execute arbitrary code via vectors involving multiple plugin instances.... Read more
- Published: Jun. 24, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-1200
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and appli... Read more
- Published: Jun. 24, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-1251
Unspecified vulnerability in Microsoft Office Excel 2002 SP3 and Office 2004 for Mac allows remote attackers to execute arbitrary code via a crafted Excel file, aka "Excel Record Stack Corruption Vulnerability."... Read more
- Published: Jun. 08, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2015-1717
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1658... Read more
Affected Products : internet_explorer- Published: May. 13, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2010-1259
Microsoft Internet Explorer 6 SP1 and SP2, 7, and 8 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulner... Read more
Affected Products : windows_7 windows_server_2008 internet_explorer windows_2000 windows_2003_server windows_vista windows_xp- Published: Jun. 08, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2015-1715
Microsoft Silverlight 5 before 5.1.40416.00 allows remote attackers to bypass intended integrity-level restrictions via a crafted Silverlight application, aka "Microsoft Silverlight Out of Browser Application Vulnerability."... Read more
Affected Products : silverlight- Published: May. 13, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-1712
Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015... Read more
Affected Products : internet_explorer- Published: May. 13, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-1753
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1732... Read more
Affected Products : internet_explorer- Published: Jun. 10, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-1718
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1658... Read more
Affected Products : internet_explorer- Published: May. 13, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-1708
Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: May. 13, 2015
- Modified: Apr. 12, 2025