Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.3

    HIGH
    CVE-2013-0024

    Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer pasteHTML Use After Free Vulnerability."... Read more

    • Published: Feb. 13, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    CRITICAL
    CVE-2024-23346

    Pymatgen (Python Materials Genomics) is an open-source Python library for materials analysis. A critical security vulnerability exists in the `JonesFaithfulTransformation.from_transformation_str()` method within the `pymatgen` library prior to version 202... Read more

    Affected Products : pymatgen pymatgen
    • Published: Feb. 21, 2024
    • Modified: Feb. 05, 2025
  • 9.3

    HIGH
    CVE-2013-0026

    Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer InsertElement Use After Free Vulnerability."... Read more

    • Published: Feb. 13, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2013-0022

    Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer LsGetTrailInfo Use After Free Vulnerability."... Read more

    • Published: Feb. 13, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2013-0006

    Microsoft XML Core Services (aka MSXML) 3.0, 5.0, and 6.0 does not properly parse XML content, which allows remote attackers to execute arbitrary code via a crafted web page, aka "MSXML Integer Truncation Vulnerability."... Read more

    • Published: Jan. 09, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2013-0007

    Microsoft XML Core Services (aka MSXML) 4.0, 5.0, and 6.0 does not properly parse XML content, which allows remote attackers to execute arbitrary code via a crafted web page, aka "MSXML XSLT Vulnerability."... Read more

    • Published: Jan. 09, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2013-0003

    Buffer overflow in a System.DirectoryServices.Protocols (S.DS.P) namespace method in Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5 allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (... Read more

    • Published: Jan. 09, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2012-5975

    The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass a... Read more

    Affected Products : linux_kernel tectia_server
    • Published: Dec. 04, 2012
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2013-0029

    Use-after-free vulnerability in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CHTML Use After Free Vulnerability."... Read more

    • Published: Feb. 13, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2009-0188

    Apple QuickTime before 7.6.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie composed of a Sorenson 3 video file.... Read more

    Affected Products : quicktime
    • Published: Jun. 02, 2009
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2009-0223

    Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allows remote attackers to execute arbitrary code via crafted sound data in a file that uses a PowerPoint 4.0 native file format, leading to memory corruption, aka "Legacy File Format Vulnerabil... Read more

    Affected Products : powerpoint office_powerpoint
    • Published: May. 12, 2009
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2019-0728

    A remote code execution vulnerability exists in Visual Studio Code when it process environment variables after opening a project, aka 'Visual Studio Code Remote Code Execution Vulnerability'.... Read more

    Affected Products : visual_studio_code
    • Published: Mar. 05, 2019
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2019-0905

    A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit th... Read more

    • Published: Jun. 12, 2019
    • Modified: May. 20, 2025
  • 9.3

    HIGH
    CVE-2013-0018

    Use-after-free vulnerability in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer SetCapture Use After Free Vulnerability."... Read more

    Affected Products : internet_explorer
    • Published: Feb. 13, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2019-0947

    A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2... Read more

    Affected Products : office
    • Published: May. 16, 2019
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2012-6569

    Stack-based buffer overflow in the HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches allows remote attackers to... Read more

    • Published: Jun. 20, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2009-2983

    Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.... Read more

    Affected Products : acrobat acrobat_reader
    • Published: Oct. 19, 2009
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2009-0888

    Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code via unspecified ve... Read more

    Affected Products : acrobat acrobat_reader
    • Published: Jun. 11, 2009
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2010-1410

    WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via an SVG document with... Read more

    • Published: Jun. 11, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2012-6558

    Heap-based buffer overflow in HeavenTools PE Explorer 1.99 R6 allows remote attackers to execute arbitrary code via the size value for a string in the resource section of a Portable Executable (PE) file.... Read more

    Affected Products : pe_explorer
    • Published: May. 23, 2013
    • Modified: Apr. 11, 2025
Showing 20 of 293946 Results