Filter and search through 887 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2011-2462 | The Universal 3D (U3D) component in Adobe Reader and Acrobat contains a memory corruption vulnerability which could allow remote attackers to execute ... | 9.8 | 999 | Neutral | Yes |
| Yes |
| CVE-2011-2444 | Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on A... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2011-2110 | Adobe Flash Player before 10.3.181.26 on Windows, Mac OS X, Linux, and Solaris, and 10.3.185.23 and earlier on Android, allows remote attackers to exe... | 0.0 | 0 | Neutral | Yes | Yes |
| CVE-2011-2107 | Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.181.22 on Windows, Mac OS X, Linux, and Solaris, and 10.3.185.22 and earlie... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2011-1968 | The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP2 does not properly process packets in ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2011-1950 | plone.app.users in Plone 4.0 and 4.1 allows remote authenticated users to modify the properties of arbitrary accounts via unspecified vectors, as expl... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2011-1752 | The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of ser... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2011-1722 | Multiple SQL injection vulnerabilities in WEC Discussion Forum (wec_discussion) extension 2.1.0 and earlier for TYPO3 allow remote attackers to execut... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2011-1345 | Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessi... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2011-1331 | JustSystems Ichitaro 2005 through 2011, Ichitaro Government 6, Ichitaro Government 2006 through 2010, Ichitaro Portable, Ichitaro Pro, and Ichitaro Vi... | 0.0 | 0 | Neutral | Yes | Yes |
| CVE-2011-1255 | The Timed Interactive Multimedia Extensions (aka HTML+TIME) implementation in Microsoft Internet Explorer 6 through 8 does not properly handle objects... | 0.0 | 0 | Neutral | Yes | Yes |
| CVE-2011-1249 | The Ancillary Function Driver (AFD) in afd.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server... | 0.0 | 0 | Neutral | Yes | Yes |
| CVE-2011-1035 | The password reset in PivotX before 2.2.4 allows remote attackers to modify the passwords of arbitrary users via unspecified vectors. | 0.0 | 0 | Neutral | No | Yes |
| CVE-2011-0627 | Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute ar... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2011-0618 | Integer overflow in Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2011-0611 | Adobe Flash Player contains a vulnerability that allows remote attackers to execute arbitrary code or cause a denial of service (application crash) vi... | 8.8 | 863 | Neutral | Yes | Yes |
| CVE-2011-0609 | Adobe Flash Player contains an unspecified vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS). | 7.8 | 749 | Neutral | Yes | Yes |
| CVE-2011-0226 | Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and ot... | 0.0 | 0 | Neutral | Yes | Yes |
| CVE-2011-0096 | The MHTML protocol handler in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2,... | 6.1 | 569 | Neutral | Yes | Yes |
| CVE-2011-0094 | Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code by accessing an object that (1) ... | 0.0 | 0 | Neutral | No | Yes |