Latest CVE Feed
-
9.3
CRITICALCVE-2020-15231
In mapfish-print before version 3.24, a user can use the JSONP support to do a Cross-site scripting.... Read more
Affected Products : print- Published: Oct. 02, 2020
- Modified: Nov. 21, 2024
-
9.3
CRITICALCVE-2020-15232
In mapfish-print before version 3.24, a user can do to an XML External Entity (XXE) attack with the provided SDL style.... Read more
Affected Products : print- Published: Oct. 02, 2020
- Modified: Nov. 21, 2024
-
9.3
CRITICALCVE-2020-15229
Singularity (an open source container platform) from version 3.1.1 through 3.6.3 has a vulnerability. Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs`, it is possible to overwrite/create any files on the hos... Read more
- Published: Oct. 14, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2010-5194
Stack-based buffer overflow in the Image2PDF function in the SCRIBBLE.ScribbleCtrl.1 ActiveX control (ImageViewer2.ocx) in Viscom Image Viewer CP Pro 8.0, Gold 5.5, Gold 6.0, and earlier allows remote attackers to execute arbitrary code via a long strPDFF... Read more
- Published: Aug. 31, 2012
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2019-8523
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary c... Read more
- Published: Dec. 18, 2019
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2010-5081
Stack-based buffer overflow in Mini-Stream RM-MP3 Converter 3.1.2.1 allows remote attackers to execute arbitrary code via a long URL in a .pls file.... Read more
Affected Products : rm-mp3_converter- Published: Dec. 25, 2011
- Modified: Apr. 11, 2025
-
9.3
CRITICALCVE-2020-15178
In PrestaShop contactform module (prestashop/contactform) before version 4.3.0, an attacker is able to inject JavaScript while using the contact form. The `message` field was incorrectly unescaped, possibly allowing attackers to execute arbitrary JavaScri... Read more
Affected Products : contactform- Published: Sep. 15, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2010-1262
Microsoft Internet Explorer 6 SP1 and SP2, 7, and 8 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, related to the CStyleSheet object and a fre... Read more
Affected Products : windows_7 windows_server_2008 internet_explorer windows_2000 windows_2003_server windows_vista windows_xp- Published: Jun. 08, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2020-9759
A Vulnerability of LG Electronic web OS TV Emulator could allow an attacker to escalate privileges and overwrite certain files. This vulnerability is due to wrong environment setting. An attacker could exploit this vulnerability through crafted configurat... Read more
Affected Products : webos- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2020-0851
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0850, CVE-2020-0852, CVE-2020-0855, C... Read more
- Published: Mar. 12, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2020-0855
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0850, CVE-2020-0851, CVE-2020-0852, C... Read more
- Published: Mar. 12, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2020-0979
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0906.... Read more
Affected Products : office_365_proplus- Published: Apr. 15, 2020
- Modified: Nov. 21, 2024
-
9.3
CRITICALCVE-2020-15165
Version 1.1.6-free of Chameleon Mini Live Debugger on Google Play Store may have had it's sources or permissions tampered by a malicious actor. The official maintainer of the package is recommending all users upgrade to v1.1.8 as soon as possible. For mor... Read more
Affected Products : chameleon_mini_live_debugger- Published: Aug. 28, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2016-0992
Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allow attackers... Read more
Affected Products : android windows_10 windows_8.1 linux_kernel flash_player_desktop_runtime flash_player mac_os_x iphone_os chrome_os windows +5 more products- Published: Mar. 12, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2010-1792
WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4; and webkitgtk before 1.2.6; allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application... Read more
- Published: Jul. 30, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-1807
WebKit in Apple Safari 4.x before 4.1.2 and 5.x before 5.0.2; Android before 2.2; and webkitgtk before 1.2.6; does not properly validate floating-point data, which allows remote attackers to execute arbitrary code or cause a denial of service (application... Read more
- Published: Sep. 10, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-2168
Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via a PDF file with crafted Flash content, involving the newfunction (0x44) operator and an "invalid pointer vulnerability" ... Read more
- Published: Jun. 30, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-2183
Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2170 and CVE-2010-2181.... Read more
- Published: Jun. 15, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-2212
Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PDF file containing Flash content with a crafted ... Read more
- Published: Jun. 30, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2011-3081
Use-after-free vulnerability in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the floating of elements, a different vulnerability than CVE-2011-3078... Read more
- Published: May. 01, 2012
- Modified: Apr. 11, 2025