Latest CVE Feed
-
9.3
HIGHCVE-2020-0892
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0850, CVE-2020-0851, CVE-2020-0852, C... Read more
- Published: Mar. 12, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2020-0852
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0850, CVE-2020-0851, CVE-2020-0855, C... Read more
- Published: Mar. 12, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2020-0883
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0881.... Read more
Affected Products : windows_10 windows_7 windows_8.1 windows_rt_8.1 windows_server_2008 windows_server_2012 windows_server_2016 windows_server_2019 windows_server windows +1 more products- Published: Mar. 12, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2018-8172
A remote code execution vulnerability exists in Visual Studio software when the software does not check the source markup of a file for an unbuilt project, aka "Visual Studio Remote Code Execution Vulnerability." This affects Microsoft Visual Studio, Expr... Read more
- Published: Jul. 11, 2018
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2008-4111
Unspecified vulnerability in Servlet Engine/Web Container in IBM WebSphere Application Server (WAS) 6.0.2 before 6.0.2.31 and 6.1 before 6.1.0.19, when the FileServing feature is enabled, has unknown impact and attack vectors.... Read more
Affected Products : websphere_application_server- Published: Sep. 16, 2008
- Modified: Apr. 09, 2025
-
9.3
HIGHCVE-2020-0759
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'.... Read more
- Published: Feb. 11, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2020-0738
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media Foundation Memory Corruption Vulnerability'.... Read more
Affected Products : windows_10 windows_7 windows_8.1 windows_rt_8.1 windows_server_2008 windows_server_2012 windows_server_2016 windows_server_2019 windows_server windows +1 more products- Published: Feb. 11, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2005-3051
Stack-based buffer overflow in the ARJ plugin (arj.dll) 3.9.2.0 for 7-Zip 3.13, 4.23, and 4.26 BETA, as used in products including Turbo Searcher, allows remote attackers to execute arbitrary code via a large ARJ block.... Read more
Affected Products : 7-zip- Published: Sep. 24, 2005
- Modified: Apr. 03, 2025
-
9.3
HIGHCVE-2015-1626
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0056... Read more
Affected Products : internet_explorer- Published: Mar. 11, 2015
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2020-0650
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0651, CVE-2020-0653.... Read more
- Published: Jan. 14, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2020-0605
A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka '.NET Fram... Read more
- Published: Jan. 14, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2020-0606
A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka '.NET Fram... Read more
- Published: Jan. 14, 2020
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2008-4472
The UpdateEngine class in the LiveUpdate ActiveX control (LiveUpdate16.DLL 17.2.56), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to execute arbitrary programs via the second argument to the ApplyPatch me... Read more
- Published: Oct. 07, 2008
- Modified: Apr. 09, 2025
-
9.3
HIGHCVE-2012-3594
WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-S... Read more
Affected Products : safari- Published: Jul. 25, 2012
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2012-3629
WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-S... Read more
Affected Products : safari- Published: Jul. 25, 2012
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2012-3666
WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-S... Read more
Affected Products : safari- Published: Jul. 25, 2012
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2008-4116
Buffer overflow in Apple QuickTime 7.5.5 and iTunes 8.0 allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a long type attribute in a quicktime tag (1) on a web page or embedded in a (2) .mp4 or (3)... Read more
- Published: Sep. 18, 2008
- Modified: Apr. 09, 2025
-
9.3
HIGHCVE-2008-4101
Vim 3.0 through 7.x before 7.2.010 does not properly escape characters, which allows user-assisted attackers to (1) execute arbitrary shell commands by entering a K keystroke on a line that contains a ";" (semicolon) followed by a command, or execute arbi... Read more
Affected Products : vim- Published: Sep. 18, 2008
- Modified: Apr. 09, 2025
-
9.3
CRITICALCVE-2024-38108
Azure Stack Hub Spoofing Vulnerability... Read more
Affected Products : azure_stack_hub- Published: Aug. 13, 2024
- Modified: Aug. 16, 2024
-
9.3
HIGHCVE-2020-0032
In ih264d_release_display_bufs of ih264d_utils.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.P... Read more
Affected Products : android- Published: Mar. 10, 2020
- Modified: Nov. 21, 2024