Latest CVE Feed
-
6.8
MEDIUMCVE-2014-1592
Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a sec... Read more
- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
4.3
MEDIUMCVE-2014-1591
Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in CSP violation reports, which allows remote attackers to obtain sensitive information via a web site that receives a report after a redirect.... Read more
- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
4.3
MEDIUMCVE-2014-1590
The XMLHttpRequest.prototype.send method in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to cause a denial of service (application crash) via a crafted JavaScript obj... Read more
- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
6.8
MEDIUMCVE-2014-1589
Mozilla Firefox before 34.0 and SeaMonkey before 2.31 provide stylesheets with an incorrect primary namespace, which allows remote attackers to bypass intended access restrictions via an XBL binding.... Read more
- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
6.8
MEDIUMCVE-2014-1588
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknow... Read more
- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
6.8
MEDIUMCVE-2014-1587
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and applicat... Read more
- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
5.4
MEDIUMCVE-2014-8680
The GeoIP functionality in ISC BIND 9.10.0 through 9.10.1 allows remote attackers to cause a denial of service (assertion failure and named exit) via vectors related to (1) the lack of GeoIP databases for both IPv4 and IPv6, or (2) IPv6 support with certa... Read more
Affected Products : bind- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
4.3
MEDIUMCVE-2014-8602
iterator.c in NLnet Labs Unbound before 1.5.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a large or infinite number of referrals.... Read more
- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
7.8
HIGHCVE-2014-8500
ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.... Read more
Affected Products : bind- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-8966
Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-6376
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-6327... Read more
Affected Products : internet_explorer- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-6375
Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-6374
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-6373
Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-6369
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
4.3
MEDIUMCVE-2014-6368
Microsoft Internet Explorer 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability."... Read more
Affected Products : internet_explorer- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-6366
Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."... Read more
Affected Products : internet_explorer- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
4.3
MEDIUMCVE-2014-6365
Microsoft Internet Explorer 8 through 11 allows remote attackers to bypass the XSS filter via a crafted attribute of an element in an HTML document, aka "Internet Explorer XSS Filter Bypass Vulnerability," a different vulnerability than CVE-2014-6328.... Read more
Affected Products : internet_explorer- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-6364
Use-after-free vulnerability in Microsoft Office 2007 SP3; 2010 SP2; 2013 Gold, SP1, and SP2; and 2013 RT Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerab... Read more
Affected Products : office- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025
-
9.3
HIGHCVE-2014-6363
vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 6 through 11 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Me... Read more
- Published: Dec. 11, 2014
- Modified: Apr. 12, 2025