Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.3

    HIGH
    CVE-2010-3640

    Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) vi... Read more

    • Published: Nov. 07, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3645

    Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) vi... Read more

    • Published: Nov. 07, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3655

    Stack-based buffer overflow in dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code via unspecified vectors.... Read more

    Affected Products : shockwave_player
    • Published: Oct. 29, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3623

    Adobe Reader and Acrobat 8.x before 8.2.5 and 9.x before 9.4 on Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.... Read more

    Affected Products : mac_os_x acrobat acrobat_reader
    • Published: Oct. 06, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3621

    Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-20... Read more

    Affected Products : acrobat acrobat_reader
    • Published: Oct. 06, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3620

    Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3629.... Read more

    Affected Products : acrobat acrobat_reader
    • Published: Oct. 06, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3412

    Race condition in the console implementation in Google Chrome before 6.0.472.59 has unspecified impact and attack vectors.... Read more

    Affected Products : chrome
    • Published: Sep. 16, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3402

    Untrusted search path vulnerability in IDM Computer Solutions UltraEdit 16.20.0.1009, 16.10.0.1036, and probably other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan hor... Read more

    Affected Products : ultraedit ultraedit
    • Published: Sep. 16, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2009-0102

    Microsoft Project 2000 SR1 and 2002 SP1, and Office Project 2003 SP3, does not properly handle memory allocation for Project files, which allows remote attackers to execute arbitrary code via a malformed file, aka "Project Memory Validation Vulnerability.... Read more

    • Published: Dec. 09, 2009
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2010-3333

    Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via craf... Read more

    • Actively Exploited
    • Published: Nov. 10, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3343

    Microsoft Internet Explorer 6 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Objec... Read more

    • Published: Dec. 16, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3337

    Untrusted search path vulnerability in Microsoft Office 2007 SP2 and 2010 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "Insecure Library Loading Vulnerability." NOTE: this might overlap CVE-2010-3141 a... Read more

    Affected Products : office
    • Published: Nov. 10, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    CRITICAL
    CVE-2024-12371

    A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edi... Read more

    Affected Products :
    • Published: Dec. 18, 2024
    • Modified: Dec. 18, 2024
  • 9.3

    HIGH
    CVE-2010-3334

    Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via an Office document containing an Off... Read more

    • Published: Nov. 10, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3397

    Untrusted search path vulnerability in PGP Desktop 9.9.0 Build 397, 9.10.x, 10.0.0 Build 2732, and probably other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse ts... Read more

    Affected Products : desktop
    • Published: Sep. 15, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3249

    Google Chrome before 6.0.472.53 does not properly implement SVG filters, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors, related to a "stale pointer" issue.... Read more

    Affected Products : chrome
    • Published: Sep. 07, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3232

    Microsoft Excel 2003 SP3 and 2007 SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 do not properly validate record information,... Read more

    • Published: Oct. 13, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3228

    The JIT compiler in Microsoft .NET Framework 4.0 on 64-bit platforms does not properly perform optimizations, which allows remote attackers to execute arbitrary code via a crafted .NET application that triggers memory corruption, aka ".NET Framework x64 J... Read more

    • Published: Oct. 13, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    CRITICAL
    CVE-2022-3572

    A cross-site scripting issue has been discovered in GitLab CE/EE affecting all versions from 13.5 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. It was possible to exploit a vulnerability in setting the Jira Connect integration which cou... Read more

    Affected Products : gitlab
    • Published: Jan. 26, 2023
    • Modified: Apr. 02, 2025
  • 9.3

    HIGH
    CVE-2010-3269

    Multiple stack-based buffer overflows in the Cisco WebEx Recording Format (WRF) and Advanced Recording Format (ARF) Players T27LB before SP21 EP3 and T27LC before SP22 allow remote attackers to execute arbitrary code via a crafted (1) .wrf or (2) .arf fil... Read more

    • Published: Feb. 02, 2011
    • Modified: Apr. 11, 2025
Showing 20 of 294420 Results