Latest CVE Feed
-
9.3
HIGHCVE-2013-3846
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted CSpliceTreeEngine::InsertSplice object in an HTML document, aka "Internet... Read more
Affected Products : internet_explorer- Published: Dec. 29, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3202
Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Sep. 11, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3190
Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Aug. 14, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3188
Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013... Read more
Affected Products : internet_explorer- Published: Aug. 14, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3181
usp10.dll in the Unicode Scripts Processor in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted OpenType font, aka "Uniscribe Font Parsing Engine Memory Corruption Vulnerability."... Read more
- Published: Aug. 14, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3171
The serialization functionality in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5 SP1, 3.5.1, 4, and 4.5 does not properly check the permissions of delegate objects, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser applic... Read more
Affected Products : .net_framework- Published: Jul. 10, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3155
Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka "Access Memory Corruption Vulnerability," a differe... Read more
Affected Products : access- Published: Sep. 11, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3152
Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3146... Read more
Affected Products : internet_explorer- Published: Jul. 10, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3151
Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE... Read more
Affected Products : internet_explorer- Published: Jul. 10, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3145
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3150.... Read more
Affected Products : internet_explorer- Published: Jul. 10, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3144
Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE... Read more
Affected Products : internet_explorer- Published: Jul. 10, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3133
Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly check the permissions of objects that use reflection, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NE... Read more
Affected Products : .net_framework- Published: Jul. 10, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3124
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3117 ... Read more
Affected Products : internet_explorer- Published: Jun. 12, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3121
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE... Read more
Affected Products : internet_explorer- Published: Jun. 12, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3114
Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-201... Read more
Affected Products : internet_explorer- Published: Jun. 12, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3112
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE... Read more
Affected Products : internet_explorer- Published: Jun. 12, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-3026
Buffer overflow in the Lotus Quickr for Domino ActiveX control in qp2.cab in IBM Lotus Quickr 8.1 before FP 8.1.0.32-001a, 8.2 before FP 8.2.0.28-001a, and 8.5.1 before FP 8.5.1.39-002a for Domino allows remote attackers to execute arbitrary code via a cr... Read more
Affected Products : lotus_quickr_for_domino- Published: Jun. 17, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2013-2551
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest... Read more
- Actively Exploited
- Published: Mar. 11, 2013
- Modified: Apr. 11, 2025
-
9.3
HIGHCVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript docume... Read more
- Published: Dec. 03, 2018
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2013-2100
The urlopen function in pym/portage/util/_urlopen.py in Gentoo Portage 2.1.12, when using HTTPS, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and modify binary package lists via a crafted c... Read more
Affected Products : portage- Published: Sep. 29, 2014
- Modified: Apr. 12, 2025