Latest CVE Feed
-
9.3
HIGHCVE-2010-3343
Microsoft Internet Explorer 6 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Objec... Read more
- Published: Dec. 16, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3337
Untrusted search path vulnerability in Microsoft Office 2007 SP2 and 2010 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "Insecure Library Loading Vulnerability." NOTE: this might overlap CVE-2010-3141 a... Read more
Affected Products : office- Published: Nov. 10, 2010
- Modified: Apr. 11, 2025
-
9.3
CRITICALCVE-2024-12371
A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edi... Read more
Affected Products :- Published: Dec. 18, 2024
- Modified: Dec. 18, 2024
-
9.3
HIGHCVE-2010-3334
Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via an Office document containing an Off... Read more
- Published: Nov. 10, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3397
Untrusted search path vulnerability in PGP Desktop 9.9.0 Build 397, 9.10.x, 10.0.0 Build 2732, and probably other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse ts... Read more
Affected Products : desktop- Published: Sep. 15, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3249
Google Chrome before 6.0.472.53 does not properly implement SVG filters, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors, related to a "stale pointer" issue.... Read more
Affected Products : chrome- Published: Sep. 07, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3232
Microsoft Excel 2003 SP3 and 2007 SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 do not properly validate record information,... Read more
Affected Products : office excel_viewer excel open_xml_file_format_converter office_compatibility_pack- Published: Oct. 13, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3228
The JIT compiler in Microsoft .NET Framework 4.0 on 64-bit platforms does not properly perform optimizations, which allows remote attackers to execute arbitrary code via a crafted .NET application that triggers memory corruption, aka ".NET Framework x64 J... Read more
Affected Products : windows_7 windows_server_2008 .net_framework windows_server_2003 windows_vista windows_xp- Published: Oct. 13, 2010
- Modified: Apr. 11, 2025
-
9.3
CRITICALCVE-2022-3572
A cross-site scripting issue has been discovered in GitLab CE/EE affecting all versions from 13.5 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. It was possible to exploit a vulnerability in setting the Jira Connect integration which cou... Read more
Affected Products : gitlab- Published: Jan. 26, 2023
- Modified: Apr. 02, 2025
-
9.3
HIGHCVE-2010-3269
Multiple stack-based buffer overflows in the Cisco WebEx Recording Format (WRF) and Advanced Recording Format (ARF) Players T27LB before SP21 EP3 and T27LC before SP22 allow remote attackers to execute arbitrary code via a crafted (1) .wrf or (2) .arf fil... Read more
- Published: Feb. 02, 2011
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3233
Microsoft Excel 2002 SP3 and 2003 SP3 does not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted .wk3 (aka Lotus 1-2-3 workbook) file, aka "Lotus 1-2-3 Workbook Parsing Vulnerability."... Read more
Affected Products : excel- Published: Oct. 13, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3230
Integer overflow in Microsoft Excel 2002 SP3 allows remote attackers to execute arbitrary code via an Excel document with crafted record information, aka "Excel Record Parsing Integer Overflow Vulnerability."... Read more
Affected Products : excel- Published: Oct. 13, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3216
Microsoft Word 2002 SP3 and Office 2004 for Mac allow remote attackers to execute arbitrary code via a crafted Word document containing bookmarks that trigger use of an invalid pointer and memory corruption, aka "Word Bookmarks Vulnerability."... Read more
- Published: Oct. 13, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3217
Double free vulnerability in Microsoft Word 2002 SP3 allows remote attackers to execute arbitrary code via a Word document with crafted List Format Override (LFO) records, aka "Word Pointer Vulnerability."... Read more
Affected Products : word- Published: Oct. 13, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3231
Microsoft Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Excel Record Parsing... Read more
- Published: Oct. 13, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2014-4404
Heap-based buffer overflow in IOHIDFamily in Apple iOS before 8 and Apple TV before 7 allows attackers to execute arbitrary code in a privileged context via an application that provides crafted key-mapping properties.... Read more
- Actively Exploited
- Published: Sep. 18, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2010-3218
Heap-based buffer overflow in Microsoft Word 2002 SP3 allows remote attackers to execute arbitrary code via malformed records in a Word document, aka "Word Heap Overflow Vulnerability."... Read more
Affected Products : word- Published: Oct. 13, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3199
Untrusted search path vulnerability in TortoiseSVN 1.6.10, Build 19898 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same fol... Read more
Affected Products : tortoisesvn- Published: Sep. 10, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3179
Stack-based buffer overflow in the text-rendering functionality in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code or caus... Read more
- Published: Oct. 21, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3234
Microsoft Excel 2002 SP3 does not properly validate formula information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Formula Substream Memory Corruption Vulnerability."... Read more
Affected Products : excel- Published: Oct. 13, 2010
- Modified: Apr. 11, 2025