Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.3

    HIGH
    CVE-2010-3233

    Microsoft Excel 2002 SP3 and 2003 SP3 does not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted .wk3 (aka Lotus 1-2-3 workbook) file, aka "Lotus 1-2-3 Workbook Parsing Vulnerability."... Read more

    Affected Products : excel
    • Published: Oct. 13, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3230

    Integer overflow in Microsoft Excel 2002 SP3 allows remote attackers to execute arbitrary code via an Excel document with crafted record information, aka "Excel Record Parsing Integer Overflow Vulnerability."... Read more

    Affected Products : excel
    • Published: Oct. 13, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3216

    Microsoft Word 2002 SP3 and Office 2004 for Mac allow remote attackers to execute arbitrary code via a crafted Word document containing bookmarks that trigger use of an invalid pointer and memory corruption, aka "Word Bookmarks Vulnerability."... Read more

    Affected Products : office word
    • Published: Oct. 13, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3217

    Double free vulnerability in Microsoft Word 2002 SP3 allows remote attackers to execute arbitrary code via a Word document with crafted List Format Override (LFO) records, aka "Word Pointer Vulnerability."... Read more

    Affected Products : word
    • Published: Oct. 13, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3231

    Microsoft Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Excel Record Parsing... Read more

    • Published: Oct. 13, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2014-4404

    Heap-based buffer overflow in IOHIDFamily in Apple iOS before 8 and Apple TV before 7 allows attackers to execute arbitrary code in a privileged context via an application that provides crafted key-mapping properties.... Read more

    Affected Products : mac_os_x iphone_os tvos
    • Actively Exploited
    • Published: Sep. 18, 2014
    • Modified: Apr. 12, 2025
  • 9.3

    HIGH
    CVE-2010-3218

    Heap-based buffer overflow in Microsoft Word 2002 SP3 allows remote attackers to execute arbitrary code via malformed records in a Word document, aka "Word Heap Overflow Vulnerability."... Read more

    Affected Products : word
    • Published: Oct. 13, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3199

    Untrusted search path vulnerability in TortoiseSVN 1.6.10, Build 19898 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same fol... Read more

    Affected Products : tortoisesvn
    • Published: Sep. 10, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3179

    Stack-based buffer overflow in the text-rendering functionality in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code or caus... Read more

    Affected Products : firefox thunderbird seamonkey
    • Published: Oct. 21, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3234

    Microsoft Excel 2002 SP3 does not properly validate formula information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Formula Substream Memory Corruption Vulnerability."... Read more

    Affected Products : excel
    • Published: Oct. 13, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3183

    The LookupGetterOrSetter function in js3250.dll in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly support window.__lookupGetter__ function calls that lac... Read more

    Affected Products : firefox thunderbird seamonkey
    • Published: Oct. 21, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3166

    Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitra... Read more

    Affected Products : firefox thunderbird seamonkey
    • Published: Sep. 09, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3190

    Untrusted search path vulnerability in the Microsoft Foundation Class (MFC) Library in Microsoft Visual Studio .NET 2003 SP1; Visual Studio 2005 SP1, 2008 SP1, and 2010; Visual C++ 2005 SP1, 2008 SP1, and 2010; and Exchange Server 2010 Service Pack 3, 201... Read more

    • Published: Aug. 31, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3149

    Untrusted search path vulnerability in Adobe Device Central CS5 3.0.0(376), 3.0.1.0 (3027), and probably other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse qtcf.... Read more

    Affected Products : device_central_cs5
    • Published: Aug. 27, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3168

    Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict the role of property changes in triggering XUL tree removal, which allows remote attackers to cause ... Read more

    Affected Products : firefox thunderbird seamonkey
    • Published: Sep. 09, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3276

    libdirectx_plugin.dll in VideoLAN VLC Media Player before 1.1.8 allows remote attackers to execute arbitrary code via a crafted width in an NSV file.... Read more

    Affected Products : vlc_media_player
    • Published: Mar. 28, 2011
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3146

    Multiple untrusted search path vulnerabilities in Microsoft Groove 2007 SP2 allow local users to gain privileges via a Trojan horse (1) mso.dll or (2) GroovePerfmon.dll file in the current working directory, as demonstrated by a directory that contains a ... Read more

    Affected Products : groove
    • Published: Aug. 27, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3151

    Untrusted search path vulnerability in Adobe On Location CS4 Build 315 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse ibfs32.dll that is located in the same folder as an OL... Read more

    Affected Products : onlocation_cs4 premiere_pro_cs4
    • Published: Aug. 27, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3140

    Untrusted search path vulnerability in Microsoft Windows Internet Communication Settings on Windows XP SP3 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse schannel.dll that ... Read more

    Affected Products : windows_xp
    • Published: Aug. 27, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3148

    Untrusted search path vulnerability in Microsoft Visio 2003 SP3 allows local users to gain privileges via a Trojan horse mfc71enu.dll file in the current working directory, as demonstrated by a directory that contains a .vsd, .vdx, .vst, or .vtx file, aka... Read more

    Affected Products : visio
    • Published: Aug. 27, 2010
    • Modified: Apr. 11, 2025
Showing 20 of 294420 Results