Threat Level: green Handler on Duty: Didier Stevens

SANS ISC: Port 25 (tcp/udp) Attack Activity - SANS Internet Storm Center Port 25 (tcp/udp) Attack Activity


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Loading...
[get complete service list]
Port Information
Protocol Service Name
udp smtp Simple Mail Transfer
tcp smtp Simple Mail Transfer
tcp WinPC [trojan] WinPC
tcp MoscowEmailtrojan [trojan] Moscow Email trojan
tcp Naebi [trojan] Naebi
tcp NewAptworm [trojan] NewApt worm
tcp ProMailtrojan [trojan] ProMail trojan
tcp Shtirlitz [trojan] Shtirlitz
tcp WinSpy [trojan] WinSpy
tcp Stealth [trojan] Stealth
tcp Stukach [trojan] Stukach
tcp Tapiras [trojan] Tapiras
tcp Terminator [trojan] Terminator
tcp MBT [trojan] MBT (Mail Bombing Trojan)
tcp MBTMailBombingTrojan [trojan] MBT (Mail Bombing Trojan)
tcp MagicHorse [trojan] Magic Horse
tcp Antigen [trojan] Antigen
tcp Barok [trojan] Barok
tcp BSE [trojan] BSE
tcp EmailPasswordSender [trojan] Email Password Sender - EPS
tcp EPSII [trojan] EPS II
tcp Gip [trojan] Gip
tcp Gris [trojan] Gris
tcp Happy99 [trojan] Happy99
tcp Hpteammail [trojan] Hpteam mail
tcp Hybris [trojan] Hybris
tcp Iloveyou [trojan] I love you
tcp Kuang2 [trojan] Kuang2
tcp Ajan [trojan] Ajan
Top IPs Scanning
TodayYesterday
5.34.207.219 (7856)5.34.207.219 (106298)
5.34.207.225 (1235)5.34.207.225 (15581)
87.246.7.230 (684)87.246.7.230 (6223)
212.193.29.56 (101)106.75.251.195 (1600)
89.185.85.212 (60)2.56.56.24 (888)
43.248.77.132 (54)112.91.146.163 (485)
2.56.56.24 (27)106.75.50.202 (450)
103.151.125.9 (24)139.99.244.150 (444)
36.255.220.192 (20)148.163.145.32 (394)
114.223.183.219 (16)193.233.185.119 (361)
User Comments
Submitted By Date
Comment
Richard Ashford - www.insysnet.com 2004-10-28 05:16:21
There has been a significant rise in SMTP port 25 traffic likely due to the Netsky and Bagle worms (notice the SMTP absolute figures over the past 40 days). Mail servers across the internet appear to be being bombarded. I have also seen an affect on a number of websites - my assumption is that unpatched systems and badly configured firewalls are allowing out internal traffic on port 25 to spread the worm variants - this outgoing traffic is disrupting outgoing web server traffic. I have noticed problems with a number of different ISPs and with some of clients with mail servers directly on the internet. I believe that the Virus vendors have significantly under-estimated the distribution of these mass-email worms. Apart from the obvious patches and up-to-date Virus software, my advice is close down outgoing port 25 to all but internal mail servers and ensure all mail is routed through the internal servers - this will prevent any infected systems from spreading the worm further. Let's hope this settles down over the next few days, otherwise it has the potential to bring the internet to it's knees.
Marcus H. Sachs, SANS Institute 2003-10-10 00:34:57
SANS Top-20 Entry: U6 Sendmail http://isc.sans.org/top20.html#u6 Sendmail is the program that sends, receives, and forwards most electronic mail processed on UNIX and Linux systems. Sendmail is the most popular Mail Transfer Agent (MTA) and its widespread use on the Internet has historically made it a prime target of attackers, resulting in numerous exploits over the years. Most of these exploits are successful only against older or unpatched versions of the software. Despite the fact that the known vulnerabilities are well documented and have been repaired in newer releases, there remain so many outdated or misconfigured versions still in use today that Sendmail remains one of the most frequently attacked services. Among the most recent critical vulnerabilities are: CERT Advisory CA-2003-12 Buffer Overflow in Sendmail CERT Advisory CA-2003-07 Remote Buffer Overflow in Sendmail CERT Advisory CA-2003-25 Buffer Overflow in Sendmail
Add a comment
CVE Links
CVE # Description
CVE-2005-0944 Unknown vulnerability in Microsoft Jet DB engine (msjet40.dll) 4.00.8618.0, related to insufficient data validation, allows remote attackers to execute arbitrary code via a crafted mdb file.
CVE-2005-1208 Integer overflow in Microsoft Windows 98, 2000, XP SP2 and earlier, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer overflow, as demonstrated using a "ms-its:" URL in Internet Explorer.
CVE-2006-0001 Stack-based buffer overflow in Microsoft Publisher 2000 through 2003 allows user-assisted remote attackers to execute arbitrary code via a crafted PUB file, which causes an overflow when parsing fonts.
CVE-2007-6593 Multiple stack-based buffer overflows in l123sr.dll in Autonomy (formerly Verity) KeyView SDK, as used by IBM Lotus Notes 5.x through 8.x, allow user-assisted remote attackers to execute arbitrary code via the (1) Length and (2) Value fields for certain Types in a Lotus 1-2-3 (.123) file in the Worksheet File (WKS) format, as demonstrated by a file with a crafted SRANGE record, a different vulnerability than CVE-2007-5909.
CVE-2008-0112 Unspecified vulnerability in Microsoft Excel 2000 SP3, and Office for Mac 2004 and 2008 allows user-assisted remote attackers to execute arbitrary code via a crafted .SLK file that is not properly handled when importing the file, aka "Excel File Import Vulnerability."
CVE-2008-4265 Microsoft Office Excel 2000 SP3 allows remote attackers to execute arbitrary code via a crafted Excel spreadsheet that contains a malformed object, which triggers memory corruption during the loading of records from this spreadsheet, aka "File Format Parsing Vulnerability."
CVE-2008-4268 The Windows Search component in Microsoft Windows Vista Gold and SP1 and Server 2008 does not properly free memory during a save operation for a Windows Search file, which allows remote attackers to execute arbitrary code via a crafted saved-search file, aka "Windows Saved Search Vulnerability."
CVE-2010-2883 Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.
CVE-2011-0101 Microsoft Excel 2002 SP3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted RealTimeData record, related to a stTopic field, double-byte characters, and an incorrect pointer calculation, aka "Excel Record Parsing WriteAV Vulnerability."
CVE-2011-0257 Integer signedness error in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PnSize opcode in a PICT file that triggers a stack-based buffer overflow.
CVE-2011-0611 Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a "group of included constants," object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011.
CVE-2011-0802 Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0814.
CVE-2011-1336 Buffer overflow in ALZip 8.21 and earlier allows remote attackers to execute arbitrary code via a crafted mim file.
CVE-2011-1591 Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file.
CVE-2012-0158 The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0 Runtime allow remote attackers to execute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers "system state" corruption, as exploited in the wild in April 2012, aka "MSCOMCTL.OCX RCE Vulnerability."
CVE-2012-0184 Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2008 and 2011 for Mac; Excel Viewer; and Office Compatibility Pack SP2 and SP3 do not properly handle memory during the opening of files, which allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Excel SXLI Record Memory Corruption Vulnerability."
CVE-2012-1723 Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
CVE-2012-1889 Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
CVE-2012-4681 Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.
CVE-2012-4792 Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012.
CVE-2012-5076 Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JAX-WS.
CVE-2013-0010 Cross-site scripting (XSS) vulnerability in Microsoft System Center Operations Manager 2007 SP1 and R2 allows remote attackers to inject arbitrary web script or HTML via crafted input, aka "System Center Operations Manager Web Console XSS Vulnerability," a different vulnerability than CVE-2013-0009.
CVE-2013-0019 Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerability."
CVE-2013-0021 Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer vtable Use After Free Vulnerability."
CVE-2013-0022 Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer LsGetTrailInfo Use After Free Vulnerability."
CVE-2013-0026 Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer InsertElement Use After Free Vulnerability."
CVE-2013-0029 Use-after-free vulnerability in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CHTML Use After Free Vulnerability."
CVE-2013-0074 Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference Vulnerability."
CVE-2013-0077 Quartz.dll in DirectShow in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows remote attackers to execute arbitrary code via crafted media content in (1) a media file, (2) a media stream, or (3) a Microsoft Office document, aka "Media Decompression Vulnerability."
CVE-2013-0079 Microsoft Visio Viewer 2010 SP1 allows remote attackers to execute arbitrary code via a crafted Visio file that triggers incorrect memory allocation, aka "Visio Viewer Tree Object Type Confusion Vulnerability."
CVE-2013-0088 Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer saveHistory Use After Free Vulnerability."
CVE-2013-0089 Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkupBehaviorContext Use After Free Vulnerability."
CVE-2013-0092 Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer GetMarkupPtr Use After Free Vulnerability."
CVE-2013-0093 Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer onBeforeCopy Use After Free Vulnerability."
CVE-2013-0094 Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer removeChild Use After Free Vulnerability."
CVE-2013-0422 Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.
CVE-2013-0431 Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors related to JMX, aka "Issue 52," a different vulnerability than CVE-2013-1490.
CVE-2013-0603 Heap-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0604.
CVE-2013-0604 Heap-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0603.
CVE-2013-0622 Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2013-0624.
CVE-2013-0623 Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-1530, CVE-2013-0601, CVE-2013-0605, CVE-2013-0616, CVE-2013-0619, and CVE-2013-0620.
CVE-2013-0624 Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2013-0622.
CVE-2013-0626 Stack-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0610.
CVE-2013-0633 Buffer overflow in Adobe Flash Player before 10.3.183.51 and 11.x before 11.5.502.149 on Windows and Mac OS X, before 10.3.183.51 and 11.x before 11.2.202.262 on Linux, before 11.1.111.32 on Android 2.x and 3.x, and before 11.1.115.37 on Android 4.x allows remote attackers to execute arbitrary code via crafted SWF content, as exploited in the wild in February 2013.
CVE-2013-0634 Adobe Flash Player before 10.3.183.51 and 11.x before 11.5.502.149 on Windows and Mac OS X, before 10.3.183.51 and 11.x before 11.2.202.262 on Linux, before 11.1.111.32 on Android 2.x and 3.x, and before 11.1.115.37 on Android 4.x allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, as exploited in the wild in February 2013.
CVE-2013-0638 Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-0647.
CVE-2013-0641 Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allows remote attackers to execute arbitrary code via a crafted PDF document, as exploited in the wild in February 2013.
CVE-2013-0646 Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
CVE-2013-0648 Unspecified vulnerability in the ExternalInterface ActionScript functionality in Adobe Flash Player before 10.3.183.67 and 11.x before 11.6.602.171 on Windows and Mac OS X, and before 10.3.183.67 and 11.x before 11.2.202.273 on Linux, allows remote attackers to execute arbitrary code via crafted SWF content, as exploited in the wild in February 2013.
CVE-2013-0707 Unspecified vulnerability in JustSystems Ichitaro 2006 and 2007, Ichitaro Government 2006 and 2007, Ichitaro Portable with oreplug, Hanako 2006 through 2013, Hanako Police, Hanako Police 3, and Hanako Police 2010 allows remote attackers to execute arbitrary code via a crafted file.
CVE-2013-0809 Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.
CVE-2013-0986 Buffer overflow in Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted enof atoms in a movie file.
CVE-2013-1085 Stack-based buffer overflow in the nim: protocol handler in Novell GroupWise Messenger 2.04 and earlier, and Novell Messenger 2.1.x and 2.2.x before 2.2.2, allows remote attackers to execute arbitrary code via an import command containing a long string in the filename parameter.
CVE-2013-1307 Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-0811.
CVE-2013-1309 Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-2551.
CVE-2013-1310 Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
CVE-2013-1311 Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
CVE-2013-1312 Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
CVE-2013-1313 Object Linking and Embedding (OLE) Automation in Microsoft Windows XP SP3 does not properly allocate memory, which allows remote attackers to execute arbitrary code via a crafted RTF document, aka "OLE Automation Remote Code Execution Vulnerability."
CVE-2013-1315 Microsoft SharePoint Server 2007 SP3, 2010 SP1 and SP2, and 2013; Office Web Apps 2010; Excel 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office for Mac 2011; Excel Viewer; and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
CVE-2013-1324 Stack-based buffer overflow in Microsoft Office 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT allows remote attackers to execute arbitrary code via a crafted WordPerfect document (.wpd) file, aka "Word Stack Buffer Overwrite Vulnerability."
CVE-2013-1325 Heap-based buffer overflow in Microsoft Office 2003 SP3 and 2007 SP3 allows remote attackers to execute arbitrary code via a crafted WordPerfect document (.wpd) file, aka "Word Heap Overwrite Vulnerability."
CVE-2013-1331 Buffer overflow in Microsoft Office 2003 SP3 and Office 2011 for Mac allows remote attackers to execute arbitrary code via crafted PNG data in an Office document, leading to improper memory allocation, aka "Office Buffer Overflow Vulnerability."
CVE-2013-1347 Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013.
CVE-2013-1488 The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to execute arbitrary code via unspecified vectors involving reflection, Libraries, "improper toString calls," and the JDBC driver manager, as demonstrated by James Forshaw during a Pwn2Own competition at CanSecWest 2013.
CVE-2013-1491 The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to execute arbitrary code via vectors related to 2D, as demonstrated by Joshua Drake during a Pwn2Own competition at CanSecWest 2013.
CVE-2013-1690 Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.
CVE-2013-2420 Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient "validation of images" in share/native/sun/awt/image/awt_ImageRep.c, possibly involving offsets.
CVE-2013-2460 Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "insufficient access checks" in the tracing component.
CVE-2013-2463 Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image attribute verification" in 2D.
CVE-2013-2465 Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D.
CVE-2013-2471 Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect IntegerComponentRaster size checks."
CVE-2013-2472 Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ShortBandedRaster size checks" in 2D.
CVE-2013-2473 Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ByteBandedRaster size checks" in 2D.
CVE-2013-2577 Buffer overflow in XnView before 2.04 allows remote attackers to execute arbitrary code via a crafted PCT file.
CVE-2013-2729 Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2727.
CVE-2013-3111 Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3123.
CVE-2013-3115 Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3162.
CVE-2013-3117 Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3122 and CVE-2013-3124.
CVE-2013-3118 Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3120 and CVE-2013-3125.
CVE-2013-3120 Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3125.
CVE-2013-3123 Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3111.
CVE-2013-3128 The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5, allow remote attackers to execute arbitrary code via a crafted OpenType font (OTF) file, aka "OpenType Font Parsing Vulnerability."
CVE-2013-3134 The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 on 64-bit platforms does not properly allocate arrays of structures, which allows remote attackers to execute arbitrary code via a crafted .NET Framework application that changes array data, aka "Array Allocation Vulnerability."
CVE-2013-3139 Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3142.
CVE-2013-3142 Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3139.
CVE-2013-3143 Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3161.
CVE-2013-3146 Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3152.
CVE-2013-3147 Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
CVE-2013-3148 Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3153.
CVE-2013-3155 Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka "Access Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3157.
CVE-2013-3158 Microsoft Excel 2003 SP3 and 2007 SP3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
CVE-2013-3163 Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.
CVE-2013-3164 Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
CVE-2013-3181 usp10.dll in the Unicode Scripts Processor in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted OpenType font, aka "Uniscribe Font Parsing Engine Memory Corruption Vulnerability."
CVE-2013-3184 Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
CVE-2013-3191 Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3187 and CVE-2013-3193.
CVE-2013-3193 Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3187 and CVE-2013-3191.
CVE-2013-3203 Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3201, CVE-2013-3206, CVE-2013-3207, and CVE-2013-3209.
CVE-2013-3204 Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
CVE-2013-3205 Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
CVE-2013-3206 Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3201, CVE-2013-3203, CVE-2013-3207, and CVE-2013-3209.
CVE-2013-3208 Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
CVE-2013-3329 Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
CVE-2013-3343 Adobe Flash Player before 10.3.183.90 and 11.x before 11.7.700.224 on Windows, before 10.3.183.90 and 11.x before 11.7.700.225 on Mac OS X, before 10.3.183.90 and 11.x before 11.2.202.291 on Linux, before 11.1.111.59 on Android 2.x and 3.x, and before 11.1.115.63 on Android 4.x; Adobe AIR before 3.7.0.2090 on Windows and Android and before 3.7.0.2100 on Mac OS X; and Adobe AIR SDK & Compiler before 3.7.0.2090 on Windows and before 3.7.0.2100 on Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
CVE-2013-3345 Adobe Flash Player before 11.7.700.232 and 11.8.x before 11.8.800.94 on Windows and Mac OS X, before 11.2.202.297 on Linux, before 11.1.111.64 on Android 2.x and 3.x, and before 11.1.115.69 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
CVE-2013-3346 Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
CVE-2013-3347 Integer overflow in Adobe Flash Player before 11.7.700.232 and 11.8.x before 11.8.800.94 on Windows and Mac OS X, before 11.2.202.297 on Linux, before 11.1.111.64 on Android 2.x and 3.x, and before 11.1.115.69 on Android 4.x allows attackers to execute arbitrary code via PCM data that is not properly handled during resampling.
CVE-2013-3352 Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3354 and CVE-2013-3355.
CVE-2013-3353 Buffer overflow in Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-3356.
CVE-2013-3354 Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3352 and CVE-2013-3355.
CVE-2013-3355 Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3352 and CVE-2013-3354.
CVE-2013-3356 Buffer overflow in Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-3353.
CVE-2013-3357 Integer overflow in Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-3358.
CVE-2013-3361 Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK & Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3362, CVE-2013-3363, and CVE-2013-5324.
CVE-2013-3362 Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK & Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3361, CVE-2013-3363, and CVE-2013-5324.
CVE-2013-3363 Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK & Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3361, CVE-2013-3362, and CVE-2013-5324.
CVE-2013-3664 Trimble SketchUp (formerly Google SketchUp) before 2013 (13.0.3689) allows remote attackers to execute arbitrary code via a crafted color palette table in a MAC Pict texture, which triggers an out-of-bounds stack write. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-3662. NOTE: this issue was SPLIT due to different affected products and codebases (ADT1); CVE-2013-7388 has been assigned to the paintlib issue.
CVE-2013-3845 Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
CVE-2013-3848 Microsoft Word Automation Services in SharePoint Server 2010 SP1, Word Web App 2010 SP1 in Office Web Apps 2010, Word 2003 SP3, Word 2007 SP3, Word 2010 SP1, Office Compatibility Pack SP3, and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Word Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3847, CVE-2013-3849, and CVE-2013-3858.
CVE-2013-3850 Microsoft Word 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Word Memory Corruption Vulnerability."
CVE-2013-3852 Microsoft Word 2003 SP3, 2007 SP3, and 2010 SP1; Office Compatibility Pack SP3; and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Word Memory Corruption Vulnerability."
CVE-2013-3854 Microsoft Office 2007 SP3 and Word 2007 SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Word Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3853.
CVE-2013-3856 Microsoft Word 2003 SP3 and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Word Memory Corruption Vulnerability."
CVE-2013-3875 Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
CVE-2013-3882 Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3885.
CVE-2013-3891 Microsoft Word 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Memory Corruption Vulnerability."
CVE-2013-3906 GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013.
CVE-2013-3914 Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
CVE-2013-3916 Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3912.
CVE-2013-3934 Stack-based buffer overflow in Kingsoft Writer 2012 8.1.0.3030, as used in Kingsoft Office 2013 before 9.1.0.4256, allows remote attackers to execute arbitrary code via a long font name in a WPS file.
CVE-2013-4798 Unspecified vulnerability in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1705.
CVE-2013-5047 Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-5048.
CVE-2013-5048 Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-5047.
CVE-2013-5049 Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
CVE-2013-5051 Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
CVE-2013-5324 Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK & Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3361, CVE-2013-3362, and CVE-2013-3363.
CVE-2013-5325 Adobe Reader and Acrobat 11.x before 11.0.05 on Windows allow remote attackers to execute arbitrary JavaScript code in a javascript: URL via a crafted PDF document.
CVE-2013-5330 Adobe Flash Player before 11.7.700.252 and 11.8.x and 11.9.x before 11.9.900.152 on Windows and Mac OS X and before 11.2.202.327 on Linux, Adobe AIR before 3.9.0.1210, Adobe AIR SDK before 3.9.0.1210, and Adobe AIR SDK & Compiler before 3.9.0.1210 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5329.
CVE-2013-5331 Adobe Flash Player before 11.7.700.257 and 11.8.x and 11.9.x before 11.9.900.170 on Windows and Mac OS X and before 11.2.202.332 on Linux, Adobe AIR before 3.9.0.1380, Adobe AIR SDK before 3.9.0.1380, and Adobe AIR SDK & Compiler before 3.9.0.1380 allow remote attackers to execute arbitrary code via crafted .swf content that leverages an unspecified "type confusion," as exploited in the wild in December 2013.
CVE-2013-5332 Adobe Flash Player before 11.7.700.257 and 11.8.x and 11.9.x before 11.9.900.170 on Windows and Mac OS X and before 11.2.202.332 on Linux, Adobe AIR before 3.9.0.1380, Adobe AIR SDK before 3.9.0.1380, and Adobe AIR SDK & Compiler before 3.9.0.1380 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
CVE-2013-6877 Heap-based buffer overflow in RealNetworks RealPlayer before 17.0.4.61 on Windows, and Mac RealPlayer before 12.0.1.1738, allows remote attackers to execute arbitrary code via a long string in the TRACKID element of an RMP file, a different vulnerability than CVE-2013-7260.
CVE-2013-7331 The Microsoft.XMLDOM ActiveX control in Microsoft Windows 8.1 and earlier allows remote attackers to determine the existence of local pathnames, UNC share pathnames, intranet hostnames, and intranet IP addresses by examining error codes, as demonstrated by a res:// URL, and exploited in the wild in February 2014.
CVE-2014-0269
CVE-2014-0270
CVE-2014-0274
CVE-2014-0275
CVE-2014-0277
CVE-2014-0278
CVE-2014-0279
CVE-2014-0280
CVE-2014-0281
CVE-2014-0282
CVE-2014-0283
CVE-2014-0284
CVE-2014-0285
CVE-2014-0286
CVE-2014-0287
CVE-2014-0288
CVE-2014-0290
CVE-2014-0297
CVE-2014-0298
CVE-2014-0299
CVE-2014-0302
CVE-2014-0304
CVE-2014-0305
CVE-2014-0306
CVE-2014-0309
CVE-2014-0310
CVE-2014-0311
CVE-2014-0312
CVE-2014-0313
CVE-2014-0314
CVE-2014-0322
CVE-2014-0324
CVE-2014-0456 Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
CVE-2014-0457 Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
CVE-2014-0492
CVE-2014-0493
CVE-2014-0495
CVE-2014-0497
CVE-2014-0498
CVE-2014-0502
CVE-2014-0506
CVE-2014-0507
CVE-2014-0510
CVE-2014-0512
CVE-2014-0515
CVE-2014-0520
CVE-2014-0522
CVE-2014-0523
CVE-2014-0524
CVE-2014-0525
CVE-2014-0526
CVE-2014-0527
CVE-2014-0533
CVE-2014-0536
CVE-2014-0538
CVE-2014-0540
CVE-2014-0543
CVE-2014-0544
CVE-2014-0550
CVE-2014-0554
CVE-2014-0555
CVE-2014-0556
CVE-2014-0557
CVE-2014-0558
CVE-2014-0559
CVE-2014-0564
CVE-2014-0565
CVE-2014-0567
CVE-2014-0569
CVE-2014-0576
CVE-2014-0577
CVE-2014-0581
CVE-2014-0584
CVE-2014-0585
CVE-2014-0586
CVE-2014-0589
CVE-2014-1563
CVE-2014-1751
CVE-2014-1753
CVE-2014-1755
CVE-2014-1765
CVE-2014-1772
CVE-2014-1776
CVE-2014-1785
CVE-2014-1791
CVE-2014-1797
CVE-2014-1800
CVE-2014-1802
CVE-2014-1804
CVE-2014-1805
CVE-2014-1815
CVE-2014-2299
CVE-2014-2782
CVE-2014-2787
CVE-2014-2797
CVE-2014-2799
CVE-2014-2823
CVE-2014-2824
CVE-2014-4050
CVE-2014-4057
CVE-2014-4063
CVE-2014-4073
CVE-2014-4080
CVE-2014-4081
CVE-2014-4082
CVE-2014-4084
CVE-2014-4087
CVE-2014-4088
CVE-2014-4092
CVE-2014-4095
CVE-2014-4117
CVE-2014-4118
CVE-2014-4126
CVE-2014-4127
CVE-2014-4129
CVE-2014-4132
CVE-2014-4133
CVE-2014-4134
CVE-2014-4137
CVE-2014-4138
CVE-2014-4141
CVE-2014-4143
CVE-2014-4148
CVE-2014-4149
CVE-2014-6327
CVE-2014-6330
CVE-2014-6332
CVE-2014-6335
CVE-2014-6337
CVE-2014-6341
CVE-2014-6342
CVE-2014-6344
CVE-2014-6347
CVE-2014-6348
CVE-2014-6351
CVE-2014-6352
CVE-2014-6353
CVE-2014-6356
CVE-2014-6360
CVE-2014-6361
CVE-2014-6366
CVE-2014-6369
CVE-2014-6374
CVE-2014-6375
CVE-2014-7169
CVE-2014-7187
CVE-2014-8439
CVE-2014-8440
CVE-2014-8441
CVE-2014-8446
CVE-2014-8449
CVE-2014-8459
CVE-2014-8460
CVE-2014-8966
CVE-2014-9158
CVE-2014-9161
CVE-2014-9163
CVE-2014-9165
CVE-2014-9208
CVE-2015-0017
CVE-2015-0018
CVE-2015-0019
CVE-2015-0020
CVE-2015-0022
CVE-2015-0023
CVE-2015-0026
CVE-2015-0030
CVE-2015-0031
CVE-2015-0035
CVE-2015-0036
CVE-2015-0038
CVE-2015-0039
CVE-2015-0040
CVE-2015-0042
CVE-2015-0044
CVE-2015-0045
CVE-2015-0046
CVE-2015-0048
CVE-2015-0049
CVE-2015-0056
CVE-2015-0064
CVE-2015-0068
CVE-2015-0081
CVE-2015-0085
CVE-2015-0086
CVE-2015-0090
CVE-2015-0092
CVE-2015-0093
CVE-2015-0099
CVE-2015-0100
CVE-2015-0135
CVE-2015-0235 Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
CVE-2015-0305
CVE-2015-0306
CVE-2015-0308
CVE-2015-0309
CVE-2015-0310
CVE-2015-0311
CVE-2015-0313
CVE-2015-0314
CVE-2015-0318
CVE-2015-0319
CVE-2015-0320
CVE-2015-0321
CVE-2015-0322
CVE-2015-0323
CVE-2015-0324
CVE-2015-0326
CVE-2015-0327
CVE-2015-0329
CVE-2015-0330
CVE-2015-0332
CVE-2015-0333
CVE-2015-0334
CVE-2015-0335
CVE-2015-0336
CVE-2015-0338
CVE-2015-0339
CVE-2015-0341
CVE-2015-0346
CVE-2015-0347
CVE-2015-0348
CVE-2015-0349
CVE-2015-0350
CVE-2015-0351
CVE-2015-0352
CVE-2015-0353
CVE-2015-0354
CVE-2015-0356
CVE-2015-0358
CVE-2015-0359
CVE-2015-1622
CVE-2015-1623
CVE-2015-1624
CVE-2015-1625
CVE-2015-1641
CVE-2015-1642
CVE-2015-1649
CVE-2015-1650
CVE-2015-1651
CVE-2015-1652
CVE-2015-1657
CVE-2015-1658
CVE-2015-1659
CVE-2015-1660
CVE-2015-1662
CVE-2015-1665
CVE-2015-1666
CVE-2015-1667
CVE-2015-1668
CVE-2015-1671
CVE-2015-1673
CVE-2015-1675
CVE-2015-1682
CVE-2015-1687
CVE-2015-1689
CVE-2015-1691
CVE-2015-1695
CVE-2015-1696
CVE-2015-1697
CVE-2015-1698
CVE-2015-1699
CVE-2015-1705
CVE-2015-1706
CVE-2015-1708
CVE-2015-1710
CVE-2015-1712
CVE-2015-1714
CVE-2015-1717
CVE-2015-1718
CVE-2015-1728
CVE-2015-1731
CVE-2015-1732
CVE-2015-1733
CVE-2015-1736
CVE-2015-1737
CVE-2015-1738
CVE-2015-1740
CVE-2015-1741
CVE-2015-1742
CVE-2015-1747
CVE-2015-1750
CVE-2015-1751
CVE-2015-1752
CVE-2015-1753
CVE-2015-1755
CVE-2015-1759
CVE-2015-1760
CVE-2015-1766
CVE-2015-1767
CVE-2015-1770
CVE-2015-1903
CVE-2015-2372
CVE-2015-2376
CVE-2015-2377
CVE-2015-2380
CVE-2015-2383
CVE-2015-2384
CVE-2015-2388
CVE-2015-2397
CVE-2015-2401
CVE-2015-2403
CVE-2015-2404
CVE-2015-2406
CVE-2015-2408
CVE-2015-2415
CVE-2015-2422
CVE-2015-2426
CVE-2015-2431
CVE-2015-2432
CVE-2015-2435
CVE-2015-2442
CVE-2015-2444
CVE-2015-2446
CVE-2015-2450
CVE-2015-2451
CVE-2015-2455
CVE-2015-2458
CVE-2015-2459
CVE-2015-2460
CVE-2015-2461
CVE-2015-2462
CVE-2015-2463
CVE-2015-2464
CVE-2015-2467
CVE-2015-2468
CVE-2015-2469
CVE-2015-2470
CVE-2015-2477
CVE-2015-2478
CVE-2015-2482
CVE-2015-2485
CVE-2015-2486
CVE-2015-2488
CVE-2015-2490
CVE-2015-2491
CVE-2015-2492
CVE-2015-2493
CVE-2015-2498
CVE-2015-2499
CVE-2015-2500
CVE-2015-2501
CVE-2015-2502
CVE-2015-2504
CVE-2015-2506
CVE-2015-2510
CVE-2015-2513
CVE-2015-2515
CVE-2015-2520
CVE-2015-2521
CVE-2015-2523
CVE-2015-2545
CVE-2015-2548
CVE-2015-2555
CVE-2015-2557
CVE-2015-3038
CVE-2015-3041
CVE-2015-3042
CVE-2015-3043
CVE-2015-3046
CVE-2015-3048
CVE-2015-3050
CVE-2015-3051
CVE-2015-3052
CVE-2015-3053
CVE-2015-3054
CVE-2015-3056
CVE-2015-3057
CVE-2015-3059
CVE-2015-3070
CVE-2015-3072
CVE-2015-3074
CVE-2015-3075
CVE-2015-3077
CVE-2015-3078
CVE-2015-3081
CVE-2015-3084
CVE-2015-3086
CVE-2015-3087
CVE-2015-3088
CVE-2015-3089
CVE-2015-3090
CVE-2015-3093
CVE-2015-3100
CVE-2015-3103
CVE-2015-3104
CVE-2015-3105
CVE-2015-3106
CVE-2015-3117
CVE-2015-3118
CVE-2015-3119
CVE-2015-3120
CVE-2015-3121
CVE-2015-3123
CVE-2015-3127
CVE-2015-3128
CVE-2015-3129
CVE-2015-3130
CVE-2015-3788
CVE-2015-4430
CVE-2015-4433
CVE-2015-4435
CVE-2015-4438
CVE-2015-4441
CVE-2015-4447
CVE-2015-4448
CVE-2015-5093
CVE-2015-5094
CVE-2015-5095
CVE-2015-5096
CVE-2015-5097
CVE-2015-5098
CVE-2015-5099
CVE-2015-5113
CVE-2015-5122
CVE-2015-5123
CVE-2015-5125
CVE-2015-5126
CVE-2015-5127
CVE-2015-5131
CVE-2015-5133
CVE-2015-5134
CVE-2015-5539
CVE-2015-5541
CVE-2015-5543
CVE-2015-5544
CVE-2015-5545
CVE-2015-5546
CVE-2015-5547
CVE-2015-5548
CVE-2015-5549
CVE-2015-5553
CVE-2015-5554
CVE-2015-5555
CVE-2015-5556
CVE-2015-5557
CVE-2015-5558
CVE-2015-5559
CVE-2015-5560
CVE-2015-5561
CVE-2015-5562
CVE-2015-5563
CVE-2015-5564
CVE-2015-5565
CVE-2015-5566
CVE-2015-5567
CVE-2015-5568
CVE-2015-5570
CVE-2015-5573
CVE-2015-5575
CVE-2015-5579
CVE-2015-5580
CVE-2015-5581
CVE-2015-5582
CVE-2015-5584
CVE-2015-5587
CVE-2015-5588
CVE-2015-6040
CVE-2015-6042
CVE-2015-6045
CVE-2015-6048
CVE-2015-6049
CVE-2015-6050
CVE-2015-6055
CVE-2015-6064
CVE-2015-6065
CVE-2015-6066
CVE-2015-6068
CVE-2015-6070
CVE-2015-6071
CVE-2015-6072
CVE-2015-6073
CVE-2015-6075
CVE-2015-6076
CVE-2015-6077
CVE-2015-6078
CVE-2015-6079
CVE-2015-6080
CVE-2015-6081
CVE-2015-6087
CVE-2015-6091
CVE-2015-6092
CVE-2015-6093
CVE-2015-6094
CVE-2015-6096
CVE-2015-6097
CVE-2015-6098
CVE-2015-6100
CVE-2015-6101
CVE-2015-6104
CVE-2015-6106
CVE-2015-6107
CVE-2015-6109
CVE-2015-6113
CVE-2015-6114
CVE-2015-6118
CVE-2015-6122
CVE-2015-6124
CVE-2015-6130
CVE-2015-6132
CVE-2015-6134
CVE-2015-6136
CVE-2015-6140
CVE-2015-6141
CVE-2015-6142
CVE-2015-6145
CVE-2015-6147
CVE-2015-6148
CVE-2015-6149
CVE-2015-6150
CVE-2015-6151
CVE-2015-6152
CVE-2015-6153
CVE-2015-6154
CVE-2015-6155
CVE-2015-6156
CVE-2015-6157
CVE-2015-6158
CVE-2015-6159
CVE-2015-6160
CVE-2015-6162
CVE-2015-6168
CVE-2015-6170
CVE-2015-6173
CVE-2015-6174
CVE-2015-6175
CVE-2015-6177
CVE-2015-6676
CVE-2015-6678
CVE-2015-6682
CVE-2015-7088
CVE-2015-7089
CVE-2015-7625
CVE-2015-7627
CVE-2015-7629
CVE-2015-7631
CVE-2015-7633
CVE-2015-7645
CVE-2015-7647
CVE-2015-7651
CVE-2015-7652
CVE-2015-7653
CVE-2015-7654
CVE-2015-7655
CVE-2015-7659
CVE-2015-7660
CVE-2015-7662
CVE-2015-7663
CVE-2015-8042
CVE-2015-8046
CVE-2015-8048
CVE-2015-8060
CVE-2015-8396
CVE-2015-8407
CVE-2015-8408
CVE-2015-8410
CVE-2015-8412
CVE-2015-8413
CVE-2015-8414
CVE-2015-8418
CVE-2015-8419
CVE-2015-8435
CVE-2015-8436
CVE-2015-8437
CVE-2015-8438
CVE-2015-8439
CVE-2015-8442
CVE-2015-8443
CVE-2015-8445
CVE-2015-8446
CVE-2015-8447
CVE-2015-8448
CVE-2015-8449
CVE-2015-8450
CVE-2015-8457
CVE-2015-8459
CVE-2015-8460
CVE-2015-8634
CVE-2015-8635
CVE-2015-8636
CVE-2015-8638
CVE-2015-8640
CVE-2015-8641
CVE-2015-8642
CVE-2015-8643
CVE-2015-8644
CVE-2015-8645
CVE-2015-8646
CVE-2015-8648
CVE-2015-8649
CVE-2015-8650
CVE-2015-8651
CVE-2015-8655
CVE-2015-8658
CVE-2015-8789
CVE-2016-0002
CVE-2016-0003
CVE-2016-0006
CVE-2016-0007
CVE-2016-0008
CVE-2016-0010
CVE-2016-0015
CVE-2016-0021
CVE-2016-0024
CVE-2016-0025
CVE-2016-0034
CVE-2016-0035
CVE-2016-0038
CVE-2016-0040
CVE-2016-0046
CVE-2016-0048
CVE-2016-0051
CVE-2016-0052
CVE-2016-0053
CVE-2016-0054
CVE-2016-0055
CVE-2016-0056
CVE-2016-0058
CVE-2016-0060
CVE-2016-0061
CVE-2016-0062
CVE-2016-0063
CVE-2016-0067
CVE-2016-0068
CVE-2016-0071
CVE-2016-0072
CVE-2016-0073
CVE-2016-0075
CVE-2016-0079
CVE-2016-0080
CVE-2016-0082
CVE-2016-0083
CVE-2016-0087
CVE-2016-0092
CVE-2016-0093
CVE-2016-0095
CVE-2016-0096
CVE-2016-0098
CVE-2016-0099
CVE-2016-0102
CVE-2016-0103
CVE-2016-0104
CVE-2016-0105
CVE-2016-0106
CVE-2016-0108
CVE-2016-0109
CVE-2016-0110
CVE-2016-0112
CVE-2016-0118
CVE-2016-0121
CVE-2016-0122
CVE-2016-0126
CVE-2016-0134
CVE-2016-0136
CVE-2016-0139
CVE-2016-0143
CVE-2016-0145
CVE-2016-0147
CVE-2016-0151
CVE-2016-0154
CVE-2016-0155
CVE-2016-0156
CVE-2016-0157
CVE-2016-0158
CVE-2016-0159
CVE-2016-0164
CVE-2016-0165
CVE-2016-0166
CVE-2016-0167
CVE-2016-0169
CVE-2016-0171
CVE-2016-0172
CVE-2016-0173
CVE-2016-0174
CVE-2016-0175
CVE-2016-0184
CVE-2016-0185
CVE-2016-0187
CVE-2016-0189
CVE-2016-0191
CVE-2016-0192
CVE-2016-0193
CVE-2016-0194
CVE-2016-0196
CVE-2016-0199
CVE-2016-0200
CVE-2016-0728
CVE-2016-0931
CVE-2016-0933
CVE-2016-0936
CVE-2016-0938
CVE-2016-0939
CVE-2016-0940
CVE-2016-0942
CVE-2016-0943
CVE-2016-0944
CVE-2016-0945
CVE-2016-0946
CVE-2016-0959
CVE-2016-0960
CVE-2016-0961
CVE-2016-0962
CVE-2016-0963
CVE-2016-0964
CVE-2016-0965
CVE-2016-0966
CVE-2016-0967
CVE-2016-0968
CVE-2016-0969
CVE-2016-0971
CVE-2016-0972
CVE-2016-0973
CVE-2016-0974
CVE-2016-0975
CVE-2016-0976
CVE-2016-0977
CVE-2016-0978
CVE-2016-0979
CVE-2016-0981
CVE-2016-0982
CVE-2016-0983
CVE-2016-0984
CVE-2016-0985
CVE-2016-0986
CVE-2016-0987
CVE-2016-0988
CVE-2016-0989
CVE-2016-0990
CVE-2016-0991
CVE-2016-0993
CVE-2016-0995
CVE-2016-0996
CVE-2016-0999
CVE-2016-1006
CVE-2016-1007
CVE-2016-1009
CVE-2016-1010
CVE-2016-1011
CVE-2016-1012
CVE-2016-1013
CVE-2016-1015
CVE-2016-1016
CVE-2016-1017
CVE-2016-1018
CVE-2016-1019
CVE-2016-1037
CVE-2016-1038
CVE-2016-1039
CVE-2016-1040
CVE-2016-1041
CVE-2016-1042
CVE-2016-1044
CVE-2016-1045
CVE-2016-1046
CVE-2016-1047
CVE-2016-1048
CVE-2016-1049
CVE-2016-1050
CVE-2016-1060
CVE-2016-1061
CVE-2016-1062
CVE-2016-1064
CVE-2016-1065
CVE-2016-1066
CVE-2016-1069
CVE-2016-1072
CVE-2016-1073
CVE-2016-1075
CVE-2016-1077
CVE-2016-1078
CVE-2016-1079
CVE-2016-1080
CVE-2016-1082
CVE-2016-1083
CVE-2016-1084
CVE-2016-1085
CVE-2016-1088
CVE-2016-1089
CVE-2016-1091
CVE-2016-1092
CVE-2016-1093
CVE-2016-1094
CVE-2016-1095
CVE-2016-1096
CVE-2016-1097
CVE-2016-1098
CVE-2016-1099
CVE-2016-1100
CVE-2016-1104
CVE-2016-1105
CVE-2016-1106
CVE-2016-1107
CVE-2016-1108
CVE-2016-1109
CVE-2016-1110
CVE-2016-1111
CVE-2016-1116
CVE-2016-1521
CVE-2016-1522
CVE-2016-1681
CVE-2016-2207
CVE-2016-2209
CVE-2016-2939
CVE-2016-2946
CVE-2016-3198
CVE-2016-3199
CVE-2016-3203
CVE-2016-3205
CVE-2016-3206
CVE-2016-3207
CVE-2016-3209
CVE-2016-3211
CVE-2016-3215
CVE-2016-3218
CVE-2016-3219
CVE-2016-3220
CVE-2016-3221
CVE-2016-3222
CVE-2016-3225
CVE-2016-3233
CVE-2016-3240
CVE-2016-3242
CVE-2016-3243
CVE-2016-3246
CVE-2016-3249
CVE-2016-3250
CVE-2016-3252
CVE-2016-3254
CVE-2016-3259
CVE-2016-3261
CVE-2016-3263
CVE-2016-3264
CVE-2016-3270
CVE-2016-3271
CVE-2016-3280
CVE-2016-3281
CVE-2016-3282
CVE-2016-3284
CVE-2016-3286
CVE-2016-3288
CVE-2016-3289
CVE-2016-3290
CVE-2016-3293
CVE-2016-3297
CVE-2016-3303
CVE-2016-3306
CVE-2016-3308
CVE-2016-3309
CVE-2016-3310
CVE-2016-3311
CVE-2016-3313
CVE-2016-3317
CVE-2016-3318
CVE-2016-3322
CVE-2016-3326
CVE-2016-3327
CVE-2016-3331
CVE-2016-3343
CVE-2016-3348
CVE-2016-3353
CVE-2016-3355
CVE-2016-3358
CVE-2016-3359
CVE-2016-3360
CVE-2016-3362
CVE-2016-3363
CVE-2016-3365
CVE-2016-3369
CVE-2016-3371
CVE-2016-3373
CVE-2016-3376
CVE-2016-3377
CVE-2016-3381
CVE-2016-3383
CVE-2016-3385
CVE-2016-3386
CVE-2016-3387
CVE-2016-3388
CVE-2016-3593
CVE-2016-3645
CVE-2016-3646
CVE-2016-3653
CVE-2016-4108
CVE-2016-4121
CVE-2016-4136
CVE-2016-4139
CVE-2016-4141
CVE-2016-4142
CVE-2016-4143
CVE-2016-4144
CVE-2016-4146
CVE-2016-4147
CVE-2016-4148
CVE-2016-4149
CVE-2016-4150
CVE-2016-4151
CVE-2016-4152
CVE-2016-4153
CVE-2016-4154
CVE-2016-4155
CVE-2016-4156
CVE-2016-4171 Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in June 2016.
CVE-2016-4173
CVE-2016-4174
CVE-2016-4175
CVE-2016-4176
CVE-2016-4177
CVE-2016-4178
CVE-2016-4179
CVE-2016-4182
CVE-2016-4185
CVE-2016-4188
CVE-2016-4191
CVE-2016-4192
CVE-2016-4201
CVE-2016-4202
CVE-2016-4203
CVE-2016-4204
CVE-2016-4205
CVE-2016-4206
CVE-2016-4207
CVE-2016-4222
CVE-2016-4223
CVE-2016-4224
CVE-2016-4225
CVE-2016-4226
CVE-2016-4227
CVE-2016-4228
CVE-2016-4229
CVE-2016-4230
CVE-2016-4231
CVE-2016-4232
CVE-2016-4249
CVE-2016-4251
CVE-2016-4252
CVE-2016-4255
CVE-2016-4271
CVE-2016-4272
CVE-2016-4274
CVE-2016-4276
CVE-2016-4280
CVE-2016-4283
CVE-2016-4285
CVE-2016-4298
CVE-2016-4304
CVE-2016-4305
CVE-2016-4324
CVE-2016-4333
CVE-2016-4637
CVE-2016-5195 Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
CVE-2016-6940
CVE-2016-6942
CVE-2016-6943
CVE-2016-6945
CVE-2016-6948
CVE-2016-6949
CVE-2016-6950
CVE-2016-6952
CVE-2016-6953
CVE-2016-6954
CVE-2016-6956
CVE-2016-6961
CVE-2016-6962
CVE-2016-6963
CVE-2016-6964
CVE-2016-6965
CVE-2016-6970
CVE-2016-6978
CVE-2016-6979
CVE-2016-6981
CVE-2016-6982
CVE-2016-6983
CVE-2016-6984
CVE-2016-6985
CVE-2016-6986
CVE-2016-6987
CVE-2016-6988
CVE-2016-7182
CVE-2016-7184
CVE-2016-7185
CVE-2016-7188
CVE-2016-7189
CVE-2016-7193
CVE-2016-7194
CVE-2016-7196
CVE-2016-7198
CVE-2016-7200
CVE-2016-7203
CVE-2016-7205
CVE-2016-7210
CVE-2016-7211
CVE-2016-7212
CVE-2016-7213
CVE-2016-7214
CVE-2016-7215
CVE-2016-7217
CVE-2016-7219
CVE-2016-7222
CVE-2016-7226
CVE-2016-7228
CVE-2016-7229
CVE-2016-7230
CVE-2016-7231
CVE-2016-7232
CVE-2016-7233
CVE-2016-7234
CVE-2016-7235
CVE-2016-7236
CVE-2016-7242
CVE-2016-7246
CVE-2016-7255
CVE-2016-7257
CVE-2016-7260
CVE-2016-7262
CVE-2016-7264
CVE-2016-7265
CVE-2016-7268
CVE-2016-7272
CVE-2016-7274
CVE-2016-7276
CVE-2016-7277
CVE-2016-7279
CVE-2016-7282
CVE-2016-7283
CVE-2016-7286
CVE-2016-7289
CVE-2016-7292
CVE-2016-7295
CVE-2016-7296
CVE-2016-7297
CVE-2016-7799
CVE-2016-7855
CVE-2016-7857
CVE-2016-7858
CVE-2016-7859
CVE-2016-7860
CVE-2016-7862
CVE-2016-7863
CVE-2016-7864
CVE-2016-7865
CVE-2016-7871
CVE-2016-7873
CVE-2016-7874
CVE-2016-7875
CVE-2016-7879
CVE-2016-8382 An exploitable heap corruption vulnerability exists in the Doc_SetSummary functionality of AntennaHouse DMC HTMLFilter. A specially crafted doc file can cause a heap corruption resulting in arbitrary code execution. An attacker can send a malicious doc file to trigger this vulnerability.
CVE-2016-8383 An exploitable heap corruption vulnerability exists in the Doc_GetFontTable functionality of AntennaHouse DMC HTMLFilter. A specially crafted doc file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provide malicious doc file to trigger this vulnerability.
CVE-2016-8384 An exploitable heap corruption vulnerability exists in the DHFSummary functionality of AntennaHouse DMC HTMLFilter.
CVE-2016-8385 An exploitable uninitialized variable vulnerability which leads to a stack-based buffer overflow exists in Iceni Argus. When it attempts to convert a malformed PDF to XML a stack variable will be left uninitialized which will later be used to fetch a length that is used in a copy operation. In most cases this will allow an aggressor to write outside the bounds of a stack buffer which is used to contain colors. This can lead to code execution under the context of the account running the tool.
CVE-2016-8707 An exploitable out of bounds write exists in the handling of compressed TIFF images in ImageMagicks's convert utility. A crafted TIFF document can lead to an out of bounds write which in particular circumstances could be leveraged into remote code execution. The vulnerability can be triggered through any user controlled TIFF that is handled by this functionality.
CVE-2016-8709 A remote out of bound write / memory corruption vulnerability exists in the PDF parsing functionality of Nitro Pro 10. A specially crafted PDF file can cause a vulnerability resulting in potential memory corruption. An attacker can send the victim a specific PDF file to trigger this vulnerability.
CVE-2016-8710 An exploitable heap write out of bounds vulnerability exists in the decoding of BPG images in Libbpg library. A crafted BPG image decoded by libbpg can cause an integer underflow vulnerability causing an out of bounds heap write leading to remote code execution. This vulnerability can be triggered via attempting to decode a crafted BPG image using Libbpg.
CVE-2016-8713 A remote out of bound write / memory corruption vulnerability exists in the PDF parsing functionality of Nitro Pro 10.5.9.9. A specially crafted PDF file can cause a vulnerability resulting in potential memory corruption. An attacker can send the victim a specific PDF file to trigger this vulnerability.
CVE-2016-8729 An exploitable memory corruption vulnerability exists in the JBIG2 parser of Artifex MuPDF 1.9. A specially crafted PDF can cause a negative number to be passed to a memset resulting in memory corruption and potential code execution. An attacker can specially craft a PDF and send to the victim to trigger this vulnerability.
CVE-2016-8730 An of bound write / memory corruption vulnerability exists in the GIF parsing functionality of Core PHOTO-PAINT X8 18.1.0.661. A specially crafted GIF file can cause a vulnerability resulting in potential memory corruption resulting in code execution. An attacker can send the victim a specific GIF file to trigger this vulnerability.
CVE-2016-8732 Multiple security flaws exists in InvProtectDrv.sys which is a part of Invincea Dell Protected Workspace 5.1.1-22303. Weak restrictions on the driver communication channel and additional insufficient checks allow any application to turn off some of the protection mechanisms provided by the Invincea product.
CVE-2016-8823
CVE-2016-9031 An exploitable integer overflow exists in the Joyent SmartOS 20161110T013148Z Hyprlofs file system. The vulnerability is present in the Ioctl system call with the command HYPRLOFS_ADD_ENTRIES when dealing with 32-bit file systems. An attacker can craft an input that can cause a kernel panic and potentially be leveraged into a full privilege escalation vulnerability. This vulnerability is distinct from CVE-2016-8733.
CVE-2016-9034 An exploitable buffer overflow exists in the Joyent SmartOS 20161110T013148Z Hyprlofs file system. The vulnerability is present in the Ioctl system call with the command HYPRLOFS_ADD_ENTRIES when dealing with 32-bit file systems. An attacker can craft an input that can cause a buffer overflow in the nm variable leading to an out of bounds memory access and could result in potential privilege escalation. This vulnerability is distinct from CVE-2016-9032.
CVE-2016-9035 An exploitable buffer overflow exists in the Joyent SmartOS 20161110T013148Z Hyprlofs file system. The vulnerability is present in the Ioctl system call with the command HYPRLOFS_ADD_ENTRIES when dealing with native file systems. An attacker can craft an input that can cause a buffer overflow in the path variable leading to an out of bounds memory access and could result in potential privilege escalation. This vulnerability is distinct from CVE-2016-9033.
CVE-2016-9038 An exploitable double fetch vulnerability exists in the SboxDrv.sys driver functionality of Invincea-X 6.1.3-24058. A specially crafted input buffer and race condition can result in kernel memory corruption, which could result in privilege escalation. An attacker needs to execute a special application locally to trigger this vulnerability.
CVE-2016-9040 An exploitable denial of service exists in the the Joyent SmartOS OS 20161110T013148Z Hyprlofs file system. The vulnerability is present in the Ioctl system call with the command HYPRLOFSADDENTRIES when used with a 32 bit model. An attacker can cause a buffer to be allocated and never freed. When repeatedly exploit this will result in memory exhaustion, resulting in a full system denial of service.
CVE-2016-9043 An out of bound write vulnerability exists in the EMF parsing functionality of CorelDRAW X8 (CdrGfx - Corel Graphics Engine (64-Bit) - 18.1.0.661). A specially crafted EMF file can cause a vulnerability resulting in potential code execution. An attacker can send the victim a specific EMF file to trigger this vulnerability.
CVE-2016-9949
CVE-2017-0003
CVE-2017-0006
CVE-2017-0007
CVE-2017-0009
CVE-2017-0011
CVE-2017-0018
CVE-2017-0019
CVE-2017-0020
CVE-2017-0023
CVE-2017-0026
CVE-2017-0032
CVE-2017-0033
CVE-2017-0037
CVE-2017-0040
CVE-2017-0046
CVE-2017-0047
CVE-2017-0052
CVE-2017-0056
CVE-2017-0060
CVE-2017-0064
CVE-2017-0065
CVE-2017-0066
CVE-2017-0070
CVE-2017-0071
CVE-2017-0072
CVE-2017-0073
CVE-2017-0077
CVE-2017-0079
CVE-2017-0082
CVE-2017-0083
CVE-2017-0086
CVE-2017-0087
CVE-2017-0088
CVE-2017-0089
CVE-2017-0090
CVE-2017-0103
CVE-2017-0106
CVE-2017-0108
CVE-2017-0121
CVE-2017-0130
CVE-2017-0131
CVE-2017-0133
CVE-2017-0141
CVE-2017-0155
CVE-2017-0156
CVE-2017-0158
CVE-2017-0160
CVE-2017-0165
CVE-2017-0189
CVE-2017-0192
CVE-2017-0194
CVE-2017-0199
CVE-2017-0200
CVE-2017-0201
CVE-2017-0202
CVE-2017-0204
CVE-2017-0205
CVE-2017-0210
CVE-2017-0211
CVE-2017-0215
CVE-2017-0220
CVE-2017-0227
CVE-2017-0228
CVE-2017-0234
CVE-2017-0240
CVE-2017-0243
CVE-2017-0245
CVE-2017-0246
CVE-2017-0250
CVE-2017-0259
CVE-2017-0261
CVE-2017-0290
CVE-2017-2374
CVE-2017-2775 An exploitable memory corruption vulnerability exists in the LvVariantUnflatten functionality in 64-bit versions of LabVIEW before 2015 SP1 f7 Patch and 2016 before f2 Patch. A specially crafted VI file can cause a user controlled value to be used as a loop terminator resulting in internal heap corruption. An attacker controlled VI file can be used to trigger this vulnerability, exploitation could lead to remote code execution.
CVE-2017-2789 When copying filedata into a buffer, JustSystems Ichitaro Office 2016 Trial will calculate two values to determine how much data to copy from the document. If both of these values are larger than the size of the buffer, the application will choose the smaller of the two and trust it to copy data from the file. This value is larger than the buffer size, which leads to a heap-based buffer overflow. This overflow corrupts an offset in the heap used in pointer arithmetic for writing data and can lead to code execution under the context of the application.
CVE-2017-2799 An exploitable heap corruption vulnerability exists in the AddSst functionality of Antenna House DMC HTMLFilter as used by MarkLogic 8.0-6. A specially crafted XLS file can cause a heap corruption resulting in arbitrary code execution. An attacker can send or provide a malicious XLS file to trigger this vulnerability.
CVE-2017-2810 An exploitable vulnerability exists in the Databook loading functionality of Tablib 0.11.4. A yaml loaded Databook can execute arbitrary python commands resulting in command execution. An attacker can insert python into loaded yaml to trigger this vulnerability.
CVE-2017-2813 An exploitable integer overflow vulnerability exists in the JPEG 2000 parser functionality of IrfanView 4.44. A specially crafted jpeg2000 image can cause an integer overflow leading to wrong memory allocation resulting in arbitrary code execution. Vulnerability can be triggered by viewing the image in via the application or by using thumbnailing feature of IrfanView.
CVE-2017-2819 An exploitable heap-based buffer overflow exists in the Hangul Word Processor component (version 9.6.1.4350) of Hancom Thinkfree Office NEO 9.6.1.4902. A specially crafted document stream can cause an integer underflow resulting in a buffer overflow which can lead to code execution under the context of the application. An attacker can entice a user to open up a document in order to trigger this vulnerability.
CVE-2017-2926
CVE-2017-2927
CVE-2017-2928
CVE-2017-2930
CVE-2017-2933
CVE-2017-2934
CVE-2017-2936
CVE-2017-2937
CVE-2017-2947
CVE-2017-2948
CVE-2017-2950
CVE-2017-2951
CVE-2017-2957
CVE-2017-2958
CVE-2017-2961
CVE-2017-2963
CVE-2017-2965
CVE-2017-2966
CVE-2017-2967
CVE-2017-2984
CVE-2017-2988
CVE-2017-2990
CVE-2017-2991
CVE-2017-2992
CVE-2017-2993
CVE-2017-2994
CVE-2017-2995
CVE-2017-2996
CVE-2017-2997
CVE-2017-2998
CVE-2017-2999
CVE-2017-3001
CVE-2017-3002
CVE-2017-3003
CVE-2017-3014
CVE-2017-3017
CVE-2017-3019
CVE-2017-3020
CVE-2017-3022
CVE-2017-3024
CVE-2017-3025
CVE-2017-3026
CVE-2017-3030
CVE-2017-3042
CVE-2017-3045
CVE-2017-3050
CVE-2017-3051
CVE-2017-3055
CVE-2017-3056
CVE-2017-3057
CVE-2017-3060
CVE-2017-3062
CVE-2017-3063
CVE-2017-3064
CVE-2017-3068
CVE-2017-3069 Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the BlendMode class. Successful exploitation could lead to arbitrary code execution.
CVE-2017-3070 Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the ConvolutionFilter class. Successful exploitation could lead to arbitrary code execution.
CVE-2017-3071 Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable use after free vulnerability when masking display objects. Successful exploitation could lead to arbitrary code execution.
CVE-2017-3072 Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the BitmapData class. Successful exploitation could lead to arbitrary code execution.
CVE-2017-3073 Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable use after free vulnerability when handling multiple mask properties of display objects, aka memory corruption. Successful exploitation could lead to arbitrary code execution.
CVE-2017-3074 Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the Graphics class. Successful exploitation could lead to arbitrary code execution.
CVE-2017-3075
CVE-2017-3076
CVE-2017-3078
CVE-2017-3079
CVE-2017-3080 Adobe Flash Player versions 26.0.0.131 and earlier have a security bypass vulnerability related to the Flash API used by Internet Explorer. Successful exploitation could lead to information disclosure.
CVE-2017-3081
CVE-2017-3082
CVE-2017-3083
CVE-2017-3084
CVE-2017-3085 Adobe Flash Player versions 26.0.0.137 and earlier have a security bypass vulnerability that leads to information disclosure when performing URL redirect.
CVE-2017-3099
CVE-2017-3100
CVE-2017-3106 Adobe Flash Player versions 26.0.0.137 and earlier have an exploitable type confusion vulnerability when parsing SWF files. Successful exploitation could lead to arbitrary code execution.
CVE-2017-3112
CVE-2017-3113
CVE-2017-3114
CVE-2017-3120
CVE-2017-3121
CVE-2017-3123
CVE-2017-5754
CVE-2017-6753
CVE-2017-7064
CVE-2017-8468
CVE-2017-8496
CVE-2017-8497
CVE-2017-8509
CVE-2017-8524
CVE-2017-8541
CVE-2017-8547
CVE-2017-8558
CVE-2017-8570
CVE-2017-8578
CVE-2017-8594
CVE-2017-8598
CVE-2017-8601
CVE-2017-8605
CVE-2017-8618
CVE-2017-8619
CVE-2017-8625
CVE-2017-8652
CVE-2017-8682
CVE-2017-8694
CVE-2017-8727
CVE-2017-8734
CVE-2017-8747
CVE-2017-8749
CVE-2017-8750
CVE-2017-8751
CVE-2017-8757
CVE-2017-9226
CVE-2017-9638
CVE-2017-11210
CVE-2017-11213
CVE-2017-11218
CVE-2017-11220
CVE-2017-11221
CVE-2017-11222
CVE-2017-11223
CVE-2017-11224
CVE-2017-11225
CVE-2017-11226
CVE-2017-11227
CVE-2017-11229
CVE-2017-11232
CVE-2017-11233
CVE-2017-11236
CVE-2017-11237
CVE-2017-11238
CVE-2017-11239
CVE-2017-11242
CVE-2017-11243
CVE-2017-11252
CVE-2017-11258
CVE-2017-11260
CVE-2017-11263
CVE-2017-11265
CVE-2017-11268
CVE-2017-11281
CVE-2017-11282
CVE-2017-11292 Adobe Flash Player version 27.0.0.159 and earlier has a flawed bytecode verification procedure, which allows for an untrusted value to be used in the calculation of an array index. This can lead to type confusion, and successful exploitation could lead to arbitrary code execution.
CVE-2017-11791
CVE-2017-11793
CVE-2017-11798
CVE-2017-11802
CVE-2017-11810
CVE-2017-11811
CVE-2017-11812
CVE-2017-11822
CVE-2017-11837
CVE-2017-11840
CVE-2017-11841
CVE-2017-11845
CVE-2017-11846
CVE-2017-11847
CVE-2017-11855
CVE-2017-11856 Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how Internet Explorer handles objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11855.
CVE-2017-11858
CVE-2017-11882
CVE-2017-11890
CVE-2017-11893
CVE-2017-11894
CVE-2017-11901
CVE-2017-11903
CVE-2017-11907
CVE-2017-11909
CVE-2017-11913
CVE-2017-11914
CVE-2017-11916
CVE-2017-11930
CVE-2017-11935
CVE-2017-12824
CVE-2017-16368
CVE-2017-16371
CVE-2017-16372
CVE-2017-16382
CVE-2017-16385
CVE-2017-16386
CVE-2017-16388
CVE-2017-16389
CVE-2017-16393
CVE-2017-16394
CVE-2017-16399
CVE-2017-16406
CVE-2017-16410
CVE-2017-16411
CVE-2017-16415
CVE-2017-16416
CVE-2017-16417
CVE-2017-16419
CVE-2017-16943
CVE-2017-17485
CVE-2018-0742
CVE-2018-0758
CVE-2018-0762
CVE-2018-0767
CVE-2018-0774
CVE-2018-0777
CVE-2018-0798
CVE-2018-0802
CVE-2018-0817
CVE-2018-0819
CVE-2018-0825 StructuredQuery in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how objects are handled in memory, aka "StructuredQuery Remote Code Execution Vulnerability".
CVE-2018-0834
CVE-2018-0841
CVE-2018-0842
CVE-2018-0846
CVE-2018-0858
CVE-2018-0860
CVE-2018-0870
CVE-2018-0872
CVE-2018-0874
CVE-2018-0877 The Desktop Bridge Virtual File System (VFS) in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how file paths are managed, aka "Windows Desktop Bridge VFS Elevation of Privilege Vulnerability".
CVE-2018-0880 The Desktop Bridge in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how the virtual registry is managed, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0882.
CVE-2018-0882 The Desktop Bridge in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how the virtual registry is managed, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0880.
CVE-2018-0903
CVE-2018-0920
CVE-2018-0930
CVE-2018-0933
CVE-2018-0935
CVE-2018-0952
CVE-2018-0953
CVE-2018-0955
CVE-2018-0978
CVE-2018-0986
CVE-2018-0988
CVE-2018-0990
CVE-2018-0991
CVE-2018-0995
CVE-2018-0996
CVE-2018-0997
CVE-2018-0998
CVE-2018-1001
CVE-2018-1003
CVE-2018-1010
CVE-2018-1011
CVE-2018-1012
CVE-2018-1013
CVE-2018-1015
CVE-2018-1016
CVE-2018-1018
CVE-2018-1023
CVE-2018-1026
CVE-2018-1027
CVE-2018-1028
CVE-2018-1029
CVE-2018-1030
CVE-2018-4200
CVE-2018-4233
CVE-2018-4871
CVE-2018-4877
CVE-2018-4878 A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.
CVE-2018-4883
CVE-2018-4884
CVE-2018-4886
CVE-2018-4888
CVE-2018-4897
CVE-2018-4898
CVE-2018-4901
CVE-2018-4902
CVE-2018-4903
CVE-2018-4905
CVE-2018-4907
CVE-2018-4911
CVE-2018-4932
CVE-2018-4933
CVE-2018-4934
CVE-2018-4937
CVE-2018-4945
CVE-2018-4952
CVE-2018-4955
CVE-2018-4959
CVE-2018-4961
CVE-2018-4962
CVE-2018-4964
CVE-2018-4965
CVE-2018-4966
CVE-2018-4967
CVE-2018-4968
CVE-2018-4969
CVE-2018-4971
CVE-2018-4972
CVE-2018-4974
CVE-2018-4979
CVE-2018-4982
CVE-2018-4983
CVE-2018-4984
CVE-2018-4985
CVE-2018-4986
CVE-2018-4987
CVE-2018-4990
CVE-2018-4993
CVE-2018-4995
CVE-2018-5001
CVE-2018-5002
CVE-2018-5008
CVE-2018-5009
CVE-2018-5015
CVE-2018-5016
CVE-2018-5017
CVE-2018-5020
CVE-2018-5031
CVE-2018-5032
CVE-2018-5035
CVE-2018-5038
CVE-2018-5060
CVE-2018-5062
CVE-2018-5146
CVE-2018-6064
CVE-2018-8110
CVE-2018-8111
CVE-2018-8120
CVE-2018-8123
CVE-2018-8124
CVE-2018-8125
CVE-2018-8137
CVE-2018-8147
CVE-2018-8148
CVE-2018-8157
CVE-2018-8158
CVE-2018-8161
CVE-2018-8164
CVE-2018-8165
CVE-2018-8166
CVE-2018-8167
CVE-2018-8172
CVE-2018-8174
CVE-2018-8208
CVE-2018-8233
CVE-2018-8242
CVE-2018-8248
CVE-2018-8249
CVE-2018-8262
CVE-2018-8274
CVE-2018-8275
CVE-2018-8278
CVE-2018-8279
CVE-2018-8283
CVE-2018-8288
CVE-2018-8289
CVE-2018-8291
CVE-2018-8297
CVE-2018-8298
CVE-2018-8324
CVE-2018-8344
CVE-2018-8345
CVE-2018-8353
CVE-2018-8367
CVE-2018-8371
CVE-2018-8373
CVE-2018-8379
CVE-2018-8383
CVE-2018-8384
CVE-2018-8387
CVE-2018-8389
CVE-2018-8391
CVE-2018-8401
CVE-2018-8403
CVE-2018-8404
CVE-2018-8405
CVE-2018-8406
CVE-2018-8411
CVE-2018-8414 A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths, aka "Windows Shell Remote Code Execution Vulnerability." This affects Windows 10 Servers, Windows 10.
CVE-2018-8420
CVE-2018-8440
CVE-2018-8442
CVE-2018-8447
CVE-2018-8453
CVE-2018-8456
CVE-2018-8461
CVE-2018-8467
CVE-2018-8475
CVE-2018-8495
CVE-2018-8522
CVE-2018-8539
CVE-2018-8544
CVE-2018-8545
CVE-2018-8552
CVE-2018-8553
CVE-2018-8555
CVE-2018-8562
CVE-2018-8563
CVE-2018-8565
CVE-2018-8582
CVE-2018-8584
CVE-2018-8587
CVE-2018-8588
CVE-2018-8589
CVE-2018-8617
CVE-2018-8619
CVE-2018-8624
CVE-2018-8625
CVE-2018-8628
CVE-2018-8653
CVE-2018-8897
CVE-2018-10561
CVE-2018-12386
CVE-2018-12387
CVE-2018-12754
CVE-2018-12763
CVE-2018-12766
CVE-2018-12767
CVE-2018-12768
CVE-2018-12796
CVE-2018-12799
CVE-2018-12825
CVE-2018-12826
CVE-2018-12827
CVE-2018-12830
CVE-2018-12837
CVE-2018-12843
CVE-2018-12844
CVE-2018-12853
CVE-2018-12856
CVE-2018-12857
CVE-2018-12860
CVE-2018-12861
CVE-2018-12862
CVE-2018-12863
CVE-2018-12865
CVE-2018-12866
CVE-2018-12867
CVE-2018-12878
CVE-2018-12880
CVE-2018-12881
CVE-2018-15929
CVE-2018-15942
CVE-2018-15943
CVE-2018-15944
CVE-2018-15945
CVE-2018-15948
CVE-2018-15951
CVE-2018-15982
CVE-2018-15984
CVE-2018-15985
CVE-2018-15989
CVE-2018-15991
CVE-2018-15992
CVE-2018-15995
CVE-2018-15996
CVE-2018-15997
CVE-2018-16001
CVE-2018-16002
CVE-2018-16011
CVE-2018-16012
CVE-2018-16013
CVE-2018-16015
CVE-2018-16017
CVE-2018-16027
CVE-2018-16028
CVE-2018-16029
CVE-2018-16030
CVE-2018-16031
CVE-2018-16033
CVE-2018-16034
CVE-2018-16035
CVE-2018-16040
CVE-2018-16041
CVE-2018-16044
CVE-2018-16047
CVE-2018-16865 An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.
CVE-2018-17463
CVE-2018-19698
CVE-2018-19699
CVE-2018-19700
CVE-2018-19701
CVE-2018-19703
CVE-2018-19704
CVE-2018-19707
CVE-2018-19711
CVE-2018-19712
CVE-2018-19713
CVE-2018-19714
CVE-2018-19715
CVE-2018-19717
CVE-2018-19725
CVE-2018-20250
CVE-2019-0539
CVE-2019-0541
CVE-2019-0543
CVE-2019-0552
CVE-2019-0565
CVE-2019-0566
CVE-2019-0567
CVE-2019-0568
CVE-2019-0569
CVE-2019-0573
CVE-2019-0574
CVE-2019-0591
CVE-2019-0592
CVE-2019-0593
CVE-2019-0606
CVE-2019-0607
CVE-2019-0609
CVE-2019-0610
CVE-2019-0612
CVE-2019-0628
CVE-2019-0633
CVE-2019-0636
CVE-2019-0639
CVE-2019-0640
CVE-2019-0642
CVE-2019-0644
CVE-2019-0645
CVE-2019-0648
CVE-2019-0650
CVE-2019-0651
CVE-2019-0652
CVE-2019-0655
CVE-2019-0656
CVE-2019-0658
CVE-2019-0661
CVE-2019-0665
CVE-2019-0666
CVE-2019-0667
CVE-2019-0669
CVE-2019-0676
CVE-2019-0685
CVE-2019-0731
CVE-2019-0732
CVE-2019-0752
CVE-2019-0753
CVE-2019-0763
CVE-2019-0767
CVE-2019-0768
CVE-2019-0769
CVE-2019-0770
CVE-2019-0775
CVE-2019-0788
CVE-2019-0794
CVE-2019-0796
CVE-2019-0797
CVE-2019-0801
CVE-2019-0803
CVE-2019-0805
CVE-2019-0806
CVE-2019-0808
CVE-2019-0810
CVE-2019-0812
CVE-2019-0822
CVE-2019-0829
CVE-2019-0836
CVE-2019-0840
CVE-2019-0841
CVE-2019-0844
CVE-2019-0859
CVE-2019-0861
CVE-2019-0862
CVE-2019-0863
CVE-2019-0880
CVE-2019-0884
CVE-2019-0885
CVE-2019-0911
CVE-2019-0918
CVE-2019-0920
CVE-2019-0930
CVE-2019-0931
CVE-2019-0938
CVE-2019-0940
CVE-2019-0943
CVE-2019-0959
CVE-2019-0986
CVE-2019-0988
CVE-2019-0989
CVE-2019-0990
CVE-2019-0991
CVE-2019-0992
CVE-2019-0993
CVE-2019-1001
CVE-2019-1003
CVE-2019-1004
CVE-2019-1005
CVE-2019-1014
CVE-2019-1017
CVE-2019-1023
CVE-2019-1030
CVE-2019-1041
CVE-2019-1051
CVE-2019-1055
CVE-2019-1060
CVE-2019-1063
CVE-2019-1065
CVE-2019-1073
CVE-2019-1074
CVE-2019-1089
CVE-2019-1092
CVE-2019-1104
CVE-2019-1107
CVE-2019-1112
CVE-2019-1132
CVE-2019-1140
CVE-2019-1164
CVE-2019-1170
CVE-2019-1195
CVE-2019-1196
CVE-2019-1214
CVE-2019-1215
CVE-2019-1216
CVE-2019-1219
CVE-2019-1238
CVE-2019-1239
CVE-2019-1256
CVE-2019-1257
CVE-2019-1284
CVE-2019-1285
CVE-2019-1296
CVE-2019-1307
CVE-2019-1308
CVE-2019-1335
CVE-2019-1344
CVE-2019-1345
CVE-2019-1362
CVE-2019-1366
CVE-2019-1367
CVE-2019-1390
CVE-2019-1393
CVE-2019-1394
CVE-2019-1396
CVE-2019-1429
CVE-2019-1436
CVE-2019-1437
CVE-2019-1485
CVE-2019-5786
CVE-2019-6116
CVE-2019-7018
CVE-2019-7019
CVE-2019-7020
CVE-2019-7021
CVE-2019-7022
CVE-2019-7024
CVE-2019-7025
CVE-2019-7026
CVE-2019-7029
CVE-2019-7030
CVE-2019-7032
CVE-2019-7033
CVE-2019-7036
CVE-2019-7038
CVE-2019-7039
CVE-2019-7040
CVE-2019-7041
CVE-2019-7043
CVE-2019-7044
CVE-2019-7045
CVE-2019-7046
CVE-2019-7048
CVE-2019-7049
CVE-2019-7050
CVE-2019-7051
CVE-2019-7052
CVE-2019-7053
CVE-2019-7054
CVE-2019-7055
CVE-2019-7056
CVE-2019-7058
CVE-2019-7059
CVE-2019-7060
CVE-2019-7061
CVE-2019-7063
CVE-2019-7064
CVE-2019-7065
CVE-2019-7066
CVE-2019-7067
CVE-2019-7068
CVE-2019-7069
CVE-2019-7070
CVE-2019-7071
CVE-2019-7072
CVE-2019-7074
CVE-2019-7076
CVE-2019-7077
CVE-2019-7079
CVE-2019-7080
CVE-2019-7082
CVE-2019-7084
CVE-2019-7108
CVE-2019-7112
CVE-2019-7118
CVE-2019-7120
CVE-2019-7122
CVE-2019-7124
CVE-2019-7127
CVE-2019-7143
CVE-2019-7782
CVE-2019-7837
CVE-2019-8518
CVE-2019-10149
CVE-2019-11687
CVE-2019-11707
CVE-2019-11932
CVE-2019-13686
CVE-2019-13720 Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2019-16858
CVE-2020-0601
CVE-2020-0634
CVE-2020-0674
CVE-2020-0720
CVE-2020-0721
CVE-2020-0723
CVE-2020-0726
CVE-2020-0784
CVE-2020-0788
CVE-2020-0824
CVE-2020-0832
CVE-2020-0833
CVE-2020-0847
CVE-2020-0898
CVE-2020-0938
CVE-2020-0968
CVE-2020-0986 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316.
CVE-2020-1020
CVE-2020-1035
CVE-2020-1048 An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1070.
CVE-2020-1058
CVE-2020-1060
CVE-2020-1062
CVE-2020-1153
CVE-2020-1207
CVE-2020-1213
CVE-2020-1214
CVE-2020-1215
CVE-2020-1216
CVE-2020-1219
CVE-2020-1230
CVE-2020-3805