Latest CVE Feed
-
9.3
HIGHCVE-2013-0090
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability."... Read more
- Published: Mar. 13, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-0088
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer saveHistory Use After Free Vulnerability."... Read more
- Published: Mar. 13, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-0079
Microsoft Visio Viewer 2010 SP1 allows remote attackers to execute arbitrary code via a crafted Visio file that triggers incorrect memory allocation, aka "Visio Viewer Tree Object Type Confusion Vulnerability."... Read more
- Published: Mar. 13, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-0094
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer removeChild Use After Free Vulnerability."... Read more
- Published: Mar. 13, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-0093
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer onBeforeCopy Use After Free Vulnerability."... Read more
- Published: Mar. 13, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-0082
Microsoft Office 2003 SP3 and 2007 SP3 allows remote attackers to execute arbitrary code via a crafted WordPerfect document (.wpd) file, aka "WPD File Format Memory Corruption Vulnerability."... Read more
Affected Products : office- Published: Nov. 13, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-0023
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CDispNode Use After Free Vulnerability."... Read more
Affected Products : windows_7 windows_server_2008 windows_server_2012 internet_explorer windows_vista windows_8 windows_rt- Published: Feb. 13, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-0024
Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer pasteHTML Use After Free Vulnerability."... Read more
Affected Products : windows_7 windows_server_2008 internet_explorer windows_server_2003 windows_vista windows_xp- Published: Feb. 13, 2013
- Modified: Apr. 11, 2025
-
9.3
CRITICALCVE-2024-23346
Pymatgen (Python Materials Genomics) is an open-source Python library for materials analysis. A critical security vulnerability exists in the `JonesFaithfulTransformation.from_transformation_str()` method within the `pymatgen` library prior to version 202... Read more
- Published: Feb. 21, 2024
- Modified: Feb. 05, 2025
-
9.3
HIGHCVE-2013-0026
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer InsertElement Use After Free Vulnerability."... Read more
- Published: Feb. 13, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-0022
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer LsGetTrailInfo Use After Free Vulnerability."... Read more
- Published: Feb. 13, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-0006
Microsoft XML Core Services (aka MSXML) 3.0, 5.0, and 6.0 does not properly parse XML content, which allows remote attackers to execute arbitrary code via a crafted web page, aka "MSXML Integer Truncation Vulnerability."... Read more
Affected Products : windows_7 windows_server_2008 windows_server_2012 office word_viewer sharepoint_server windows_server_2003 windows_vista windows_xp office_compatibility_pack +5 more products- Published: Jan. 09, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-0007
Microsoft XML Core Services (aka MSXML) 4.0, 5.0, and 6.0 does not properly parse XML content, which allows remote attackers to execute arbitrary code via a crafted web page, aka "MSXML XSLT Vulnerability."... Read more
Affected Products : windows_7 windows_server_2008 windows_server_2012 office word_viewer sharepoint_server windows_server_2003 windows_vista windows_xp office_compatibility_pack +5 more products- Published: Jan. 09, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-0003
Buffer overflow in a System.DirectoryServices.Protocols (S.DS.P) namespace method in Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5 allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (... Read more
- Published: Jan. 09, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2012-5975
The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass a... Read more
- Published: Dec. 04, 2012
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-0029
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CHTML Use After Free Vulnerability."... Read more
Affected Products : windows_7 windows_server_2008 internet_explorer windows_server_2003 windows_vista windows_xp- Published: Feb. 13, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2009-0188
Apple QuickTime before 7.6.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie composed of a Sorenson 3 video file.... Read more
Affected Products : quicktime- Published: Jun. 02, 2009
- Modified: Apr. 09, 2025
-
9.3
HIGHCVE-2009-0223
Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allows remote attackers to execute arbitrary code via crafted sound data in a file that uses a PowerPoint 4.0 native file format, leading to memory corruption, aka "Legacy File Format Vulnerabil... Read more
- Published: May. 12, 2009
- Modified: Apr. 09, 2025
-
9.3
HIGHCVE-2019-0728
A remote code execution vulnerability exists in Visual Studio Code when it process environment variables after opening a project, aka 'Visual Studio Code Remote Code Execution Vulnerability'.... Read more
Affected Products : visual_studio_code- Published: Mar. 05, 2019
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2019-0905
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit th... Read more
Affected Products : windows_10 windows_7 windows_8.1 windows_rt_8.1 windows_server_2008 windows_server_2012 windows_server_2016 windows_server_2019 windows_server windows_10_1607 +8 more products- Published: Jun. 12, 2019
- Modified: May. 20, 2025