Latest CVE Feed
-
9.3
HIGHCVE-2020-4722
IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute a... Read more
Affected Products : i2_analysts_notebook- Published: Oct. 29, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2010-2666
Opera before 10.54 on Windows and Mac OS X does not properly enforce permission requirements for widget filesystem access and directory selection, which allows user-assisted remote attackers to create or modify arbitrary files, and consequently execute ar... Read more
- Published: Jul. 08, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2018-4242
An issue was discovered in certain Apple products. macOS before 10.13.5 is affected. The issue involves the "Hypervisor" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via ... Read more
- Published: Jun. 08, 2018
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2015-1329
Use-after-free vulnerability in oxide::qt::URLRequestDelegatedJob in oxide-qt in Ubuntu 15.04 and 14.04 LTS might allow remote attackers to execute arbitrary code.... Read more
Affected Products : ubuntu_linux- Published: Sep. 20, 2017
- Modified: Apr. 20, 2025
-
9.3
HIGHCVE-2010-2887
Multiple unspecified vulnerabilities in Adobe Reader and Acrobat 9.x before 9.4 on Linux allow attackers to gain privileges via unknown vectors.... Read more
- Published: Oct. 06, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2015-1290
The Google V8 engine, as used in Google Chrome before 44.0.2403.89 and QtWebEngineCore in Qt before 5.5.1, allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted web site.... Read more
- Published: Jan. 09, 2018
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2010-3176
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allow remote attackers to cause a denial of service (mem... Read more
- Published: Oct. 21, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2022-22614
A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Big Sur 11.6.5, Security Update 2022-003 Catalina, watchOS 8.5, macOS Monterey 12.3. An application may be able to exec... Read more
- Published: Mar. 18, 2022
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2014-1243
Apple QuickTime before 7.7.5 does not initialize an unspecified pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted track list in a movie file.... Read more
Affected Products : quicktime- Published: Feb. 27, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2008-4388
The LaunchObj ActiveX control before 5.2.2.865 in launcher.dll in Symantec AppStream Client 5.2.x before 5.2.2 SP3 MP1 does not properly validate downloaded files, which allows remote attackers to execute arbitrary code via the installAppMgr method and un... Read more
Affected Products : appstream_client- Published: Jan. 20, 2009
- Modified: Apr. 09, 2025
-
9.3
HIGHCVE-2020-9637
Adobe After Effects versions 17.1 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution .... Read more
- Published: Jun. 25, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2020-9640
Adobe Illustrator versions 24.1.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution .... Read more
- Published: Jun. 25, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2015-1061
IOSurface in Apple iOS before 8.2, Apple OS X through 10.10.2, and Apple TV before 7.1 allows attackers to execute arbitrary code in a privileged context via a crafted app that leverages "type confusion" during serialized-object handling.... Read more
- Published: Mar. 12, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2020-9639
Adobe Illustrator versions 24.1.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution .... Read more
- Published: Jun. 25, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2014-1519
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknow... Read more
- Published: Apr. 30, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2015-1007
A specially crafted configuration file could be used to cause a stack-based buffer overflow condition in the OPCTest.exe, which may allow remote code execution on Opto 22 PAC Project Professional versions prior to R9.4008, PAC Project Basic versions prior... Read more
- Published: Mar. 25, 2019
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2010-3955
pubconv.dll (aka the Publisher Converter DLL) in Microsoft Publisher 2002 SP3 does not properly perform array indexing, which allows remote attackers to execute arbitrary code via a crafted Publisher file that uses an old file format, aka "Array Indexing ... Read more
Affected Products : publisher- Published: Dec. 16, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2015-7801
Use-after-free vulnerability in OptiPNG 0.6.4 allows remote attackers to execute arbitrary code via a crafted PNG file.... Read more
- Published: Apr. 20, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-1782
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1769... Read more
Affected Products : internet_explorer- Published: Jun. 11, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2020-9620
Adobe DNG Software Development Kit (SDK) 1.5 and earlier versions have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.... Read more
- Published: Jun. 26, 2020
- Modified: Nov. 21, 2024