Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.3

    HIGH
    CVE-2014-6348

    Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-6342.... Read more

    Affected Products : internet_explorer
    • Published: Nov. 11, 2014
    • Modified: Apr. 12, 2025
  • 9.3

    HIGH
    CVE-2013-5325

    Adobe Reader and Acrobat 11.x before 11.0.05 on Windows allow remote attackers to execute arbitrary JavaScript code in a javascript: URL via a crafted PDF document.... Read more

    Affected Products : acrobat acrobat_reader windows
    • Published: Oct. 09, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2013-3872

    Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3873... Read more

    Affected Products : internet_explorer
    • Published: Oct. 09, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2013-5139

    The IOSerialFamily driver in Apple iOS before 7 allows attackers to execute arbitrary code or cause a denial of service (out-of-bounds array access) via a crafted application.... Read more

    Affected Products : iphone_os
    • Published: Sep. 19, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2013-5051

    Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more

    Affected Products : internet_explorer
    • Published: Dec. 11, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2013-5056

    Use-after-free vulnerability in the Scripting Runtime Object Library in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R... Read more

    • Published: Dec. 11, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2013-5052

    Microsoft Internet Explorer 7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more

    Affected Products : internet_explorer
    • Published: Dec. 11, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2013-5048

    Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE... Read more

    Affected Products : internet_explorer
    • Published: Dec. 11, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2013-5049

    Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more

    Affected Products : internet_explorer
    • Published: Dec. 11, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2006-3650

    Microsoft Office 2000, XP, 2003, 2004 for Mac, and v.X for Mac do not properly parse the length of a chart record, which allows remote user-assisted attackers to execute arbitrary code via a Word document with an embedded malformed chart record that trigg... Read more

    Affected Products : office
    • Published: Oct. 10, 2006
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2013-5026

    An ActiveX control in lookout650.ocx, lookout660.ocx, and lookout670.ocx in National Instruments Lookout 6.5 through 6.7 allows remote attackers to execute arbitrary code by triggering the download of, and calls to, an arbitrary DLL file.... Read more

    Affected Products : lookout
    • Published: Aug. 06, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2013-4978

    Stack-based buffer overflow in AloahaPDFViewer 5.0.0.7 and earlier in Aloaha PDF Suite FREE allows remote attackers to execute arbitrary code via a crafted PDF file.... Read more

    • Published: Feb. 05, 2014
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2009-3866

    The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to ... Read more

    Affected Products : jre jdk
    • Published: Nov. 05, 2009
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2021-30954

    A type confusion issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.... Read more

    • Published: Aug. 24, 2021
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2012-1877

    Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Title Element Change Remote Code Execution Vulnerability."... Read more

    • Published: Jun. 12, 2012
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2013-4848

    TP-Link TL-WDR4300 version 3.13.31 has multiple CSRF vulnerabilities.... Read more

    Affected Products : tl-wdr4300_firmware tl-wdr4300
    • Published: Oct. 25, 2019
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2013-4787

    Android 1.6 Donut through 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows attackers to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cryptogr... Read more

    Affected Products : android
    • Published: Jul. 09, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2020-27275

    Delta Electronics DOPSoft Version 4.0.8.21 and prior is vulnerable to an out-of-bounds write while processing project files, which may allow an attacker to execute arbitrary code.... Read more

    Affected Products : cncsoft-b dopsoft
    • Published: Jan. 11, 2021
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2013-4737

    The CONFIG_STRICT_MEMORY_RWX implementation for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly consider certain memory sections, which makes it easier for atta... Read more

    Affected Products : quic_mobile_station_modem_kernel
    • Published: Feb. 15, 2014
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2013-4710

    Android 3.0 through 4.1.x on Disney Mobile, eAccess, KDDI, NTT DOCOMO, SoftBank, and other devices does not properly implement the WebView class, which allows remote attackers to execute arbitrary methods of Java objects or cause a denial of service (rebo... Read more

    Affected Products : android
    • Published: Mar. 03, 2014
    • Modified: Apr. 12, 2025
Showing 20 of 293643 Results