Latest CVE Feed
-
9.3
HIGHCVE-2016-3333
The Common Log File System (CLFS) driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local... Read more
- Published: Nov. 10, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2016-3318
Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2013 RT SP1 allow remote attackers to execute arbitrary code via a crafted file, aka "Graphics Component Memory Corruption Vulnerability."... Read more
Affected Products : office- Published: Aug. 09, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2016-3317
Microsoft Office 2010 SP2, Word 2007 SP3, Word 2010 SP2, Word for Mac 2011, Word 2016 for Mac, and Word Viewer allow remote attackers to execute arbitrary code via a crafted file, aka "Microsoft Office Memory Corruption Vulnerability."... Read more
- Published: Aug. 09, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2016-3233
Microsoft Excel 2007 SP3, Excel 2010 SP2, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."... Read more
- Published: Jun. 16, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2016-3223
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 mishandle LDAP authentication, which allows man-in-the-middle attackers to gain priv... Read more
Affected Products : windows_10 windows_7 windows_8.1 windows_rt_8.1 windows_server_2008 windows_server_2012 windows_vista- Published: Jun. 16, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2016-3222
Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Edge Memory Corruption Vulnerability."... Read more
Affected Products : edge- Published: Jun. 16, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2016-3214
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability tha... Read more
Affected Products : edge- Published: Jun. 16, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2018-20219
An issue was discovered on Teracue ENC-400 devices with firmware 2.56 and below. After successful authentication, the device sends an authentication cookie to the end user such that they can access the devices web administration panel. This token is hard-... Read more
- Published: Mar. 21, 2019
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2016-1822
IOFireWireFamily in Apple OS X before 10.11.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.... Read more
- Published: May. 20, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2016-1820
Buffer overflow in IOAudioFamily in Apple OS X before 10.11.5 allows attackers to execute arbitrary code in a privileged context via a crafted app.... Read more
- Published: May. 20, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2016-1818
IOAcceleratorFamily in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a differ... Read more
- Published: May. 20, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2016-1800
Captive Network Assistant in Apple OS X before 10.11.5 mishandles a custom URL scheme, which allows user-assisted remote attackers to execute arbitrary code via unspecified vectors.... Read more
- Published: May. 20, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2016-1797
Apple Type Services (ATS) in Apple OS X before 10.11.5 allows attackers to bypass intended FontValidator sandbox-policy restrictions and execute arbitrary code in a privileged context via a crafted app.... Read more
- Published: May. 20, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2016-1794
The AppleGraphicsControlClient::checkArguments method in AppleGraphicsControl in Apple OS X before 10.11.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (NULL pointer dereference) via a crafted app.... Read more
- Published: May. 20, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2016-1792
The AMD subsystem in Apple OS X before 10.11.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.... Read more
- Published: May. 20, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2016-1757
Race condition in the kernel in Apple iOS before 9.3 and OS X before 10.11.4 allows attackers to execute arbitrary code in a privileged context via a crafted app.... Read more
- Published: Mar. 24, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2016-1735
Bluetooth in Apple OS X before 10.11.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2016-1736.... Read more
- Published: Mar. 24, 2016
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2016-10081
/usr/bin/shutter in Shutter through 0.93.1 allows user-assisted remote attackers to execute arbitrary commands via a crafted image name that is mishandled during a "Run a plugin" action.... Read more
Affected Products : shutter- Published: Dec. 29, 2016
- Modified: Apr. 12, 2025
-
9.3
CRITICALCVE-2018-1742
IBM Tivoli Key Lifecycle Manager 2.6, 2.7, and 3.0 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. I... Read more
Affected Products : security_key_lifecycle_manager- Published: Oct. 08, 2018
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2016-0200
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE... Read more
Affected Products : internet_explorer- Published: Jun. 16, 2016
- Modified: Apr. 12, 2025