Vulnerabilities > Critical

DATE CVE VULNERABILITY TITLE RISK
2014-04-27 CVE-2014-3007 OS Command Injection vulnerability in multiple products
Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 might allow remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py.
network
low complexity
python pythonware CWE-78
critical
10.0
2014-04-27 CVE-2014-1776 Use After Free vulnerability in Microsoft Internet Explorer
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014.
network
low complexity
microsoft CWE-416
critical
9.8
2014-04-27 CVE-2014-1766 Buffer Errors vulnerability in Microsoft Internet Explorer 10/11/9
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, as demonstrated by Sebastian Apelt and Andreas Schmidt during a Pwn2Own competition at CanSecWest 2014.
network
microsoft CWE-119
critical
9.3
2014-04-27 CVE-2014-1764 Permissions, Privileges, and Access Controls vulnerability in Microsoft Internet Explorer
Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code and bypass a sandbox protection mechanism by leveraging "object confusion" in a broker process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2014.
network
low complexity
microsoft CWE-264
critical
10.0
2014-04-27 CVE-2014-1763 Resource Management Errors vulnerability in Microsoft Internet Explorer 10/11/9
Use-after-free vulnerability in Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code and bypass a sandbox protection mechanism via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2014.
network
low complexity
microsoft CWE-399
critical
10.0
2014-04-27 CVE-2014-2994 Buffer Errors vulnerability in Acunetix web vulnerability Scanner 8
Stack-based buffer overflow in Acunetix Web Vulnerability Scanner (WVS) 8 build 20120704 allows remote attackers to execute arbitrary code via an HTML file containing an IMG element with a long URL (src attribute).
network
low complexity
acunetix CWE-119
critical
10.0
2014-04-25 CVE-2013-5660 Buffer Errors vulnerability in Powersoftware Winarchiver 3.2
Buffer overflow in Power Software WinArchiver 3.2 allows remote attackers to execute arbitrary code via a crafted .zip file.
network
powersoftware CWE-119
critical
9.3
2014-04-25 CVE-2014-0780 Path Traversal vulnerability in Indusoft web Studio 7.1
Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 7.1 before SP2 Patch 4 allows remote attackers to read administrative passwords in APP files, and consequently execute arbitrary code, via unspecified web requests.
network
low complexity
indusoft CWE-22
critical
9.8
2014-04-25 CVE-2014-0769 Improper Authentication vulnerability in multiple products
The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion do not require authentication for connections to certain TCP ports, which allows remote attackers to (1) modify the configuration via a request to the debug service on port 4000 or (2) delete log entries via a request to the log service on port 4001.
9.3
2014-04-25 CVE-2014-0760 Improper Authentication vulnerability in multiple products
The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion provide an undocumented access method involving the FTP protocol, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
9.3