Latest CVE Feed
-
9.3
HIGHCVE-2010-3233
Microsoft Excel 2002 SP3 and 2003 SP3 does not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted .wk3 (aka Lotus 1-2-3 workbook) file, aka "Lotus 1-2-3 Workbook Parsing Vulnerability."... Read more
Affected Products : excel- Published: Oct. 13, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3230
Integer overflow in Microsoft Excel 2002 SP3 allows remote attackers to execute arbitrary code via an Excel document with crafted record information, aka "Excel Record Parsing Integer Overflow Vulnerability."... Read more
Affected Products : excel- Published: Oct. 13, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3216
Microsoft Word 2002 SP3 and Office 2004 for Mac allow remote attackers to execute arbitrary code via a crafted Word document containing bookmarks that trigger use of an invalid pointer and memory corruption, aka "Word Bookmarks Vulnerability."... Read more
- Published: Oct. 13, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3217
Double free vulnerability in Microsoft Word 2002 SP3 allows remote attackers to execute arbitrary code via a Word document with crafted List Format Override (LFO) records, aka "Word Pointer Vulnerability."... Read more
Affected Products : word- Published: Oct. 13, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3231
Microsoft Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Excel Record Parsing... Read more
- Published: Oct. 13, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2014-4404
Heap-based buffer overflow in IOHIDFamily in Apple iOS before 8 and Apple TV before 7 allows attackers to execute arbitrary code in a privileged context via an application that provides crafted key-mapping properties.... Read more
- Actively Exploited
- Published: Sep. 18, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2010-3218
Heap-based buffer overflow in Microsoft Word 2002 SP3 allows remote attackers to execute arbitrary code via malformed records in a Word document, aka "Word Heap Overflow Vulnerability."... Read more
Affected Products : word- Published: Oct. 13, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3199
Untrusted search path vulnerability in TortoiseSVN 1.6.10, Build 19898 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same fol... Read more
Affected Products : tortoisesvn- Published: Sep. 10, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3179
Stack-based buffer overflow in the text-rendering functionality in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code or caus... Read more
- Published: Oct. 21, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3234
Microsoft Excel 2002 SP3 does not properly validate formula information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Formula Substream Memory Corruption Vulnerability."... Read more
Affected Products : excel- Published: Oct. 13, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3183
The LookupGetterOrSetter function in js3250.dll in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly support window.__lookupGetter__ function calls that lac... Read more
- Published: Oct. 21, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3166
Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitra... Read more
- Published: Sep. 09, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3190
Untrusted search path vulnerability in the Microsoft Foundation Class (MFC) Library in Microsoft Visual Studio .NET 2003 SP1; Visual Studio 2005 SP1, 2008 SP1, and 2010; Visual C++ 2005 SP1, 2008 SP1, and 2010; and Exchange Server 2010 Service Pack 3, 201... Read more
- Published: Aug. 31, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3149
Untrusted search path vulnerability in Adobe Device Central CS5 3.0.0(376), 3.0.1.0 (3027), and probably other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse qtcf.... Read more
Affected Products : device_central_cs5- Published: Aug. 27, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3168
Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict the role of property changes in triggering XUL tree removal, which allows remote attackers to cause ... Read more
- Published: Sep. 09, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3276
libdirectx_plugin.dll in VideoLAN VLC Media Player before 1.1.8 allows remote attackers to execute arbitrary code via a crafted width in an NSV file.... Read more
Affected Products : vlc_media_player- Published: Mar. 28, 2011
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3146
Multiple untrusted search path vulnerabilities in Microsoft Groove 2007 SP2 allow local users to gain privileges via a Trojan horse (1) mso.dll or (2) GroovePerfmon.dll file in the current working directory, as demonstrated by a directory that contains a ... Read more
Affected Products : groove- Published: Aug. 27, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3151
Untrusted search path vulnerability in Adobe On Location CS4 Build 315 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse ibfs32.dll that is located in the same folder as an OL... Read more
- Published: Aug. 27, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3140
Untrusted search path vulnerability in Microsoft Windows Internet Communication Settings on Windows XP SP3 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse schannel.dll that ... Read more
Affected Products : windows_xp- Published: Aug. 27, 2010
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2010-3148
Untrusted search path vulnerability in Microsoft Visio 2003 SP3 allows local users to gain privileges via a Trojan horse mfc71enu.dll file in the current working directory, as demonstrated by a directory that contains a .vsd, .vdx, .vst, or .vtx file, aka... Read more
Affected Products : visio- Published: Aug. 27, 2010
- Modified: Apr. 11, 2025