Latest CVE Feed
-
6.5
MEDIUMCVE-2020-8866
This vulnerability allows remote attackers to create arbitrary files on affected installations of Horde Groupware Webmail Edition 5.2.22. Authentication is required to exploit this vulnerability. The specific flaw exists within add.php. The issue results ... Read more
- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2020-8865
This vulnerability allows remote attackers to execute local PHP files on affected installations of Horde Groupware Webmail Edition 5.2.22. Authentication is required to exploit this vulnerability. The specific flaw exists within edit.php. When parsing the... Read more
- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8864
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.10B04. Authentication is not required to exploit this vulnerability. The specific flaw ... Read more
- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8863
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.10B04. Authentication is not required to exploit this vulnerability. The specific flaw ... Read more
- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8862
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handl... Read more
- Published: Feb. 22, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8861
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 1.10B01 BETA Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within th... Read more
- Published: Feb. 22, 2020
- Modified: Nov. 21, 2024
-
8.0
HIGHCVE-2020-8860
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S10 Firmware G973FXXS3ASJA, O(8.x), P(9.0), Q(10.0) devices with Exynos chipsets. User interaction is required to exploit this vulnerability i... Read more
- Published: Feb. 22, 2020
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2020-8859
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of ELOG Electronic Logbook 3.1.4-283534d. Authentication is not required to exploit this vulnerability. The specific flaw exists within the proces... Read more
Affected Products : electronic_logbook- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
9.0
HIGHCVE-2020-8858
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Moxa MGate 5105-MB-EIP firmware version 4.1. Authentication is required to exploit this vulnerability. The specific flaw exists within the DestIP parameter w... Read more
Affected Products : mgate_5105-mb-eip_firmware mgate_5105-mb-eip-t_firmware mgate_5105-mb-eip mgate_5105-mb-eip-t- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8857
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8856
This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25608. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fi... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8855
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.2947. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fi... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8854
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8853
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2020-8852
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicio... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8851
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8850
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8849
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8848
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8847
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024