Latest CVE Feed
-
4.3
MEDIUMCVE-2020-8883
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a mal... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8882
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8881
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8880
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2020-8879
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a mal... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8878
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2020-8877
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a mal... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2020-8876
This vulnerability allows local attackers to disclose information on affected installations of Parallels Desktop 15.1.2-47123. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerabi... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8875
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.2-47123. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerabil... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2020-8874
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.2-47123. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vul... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
8.2
HIGHCVE-2020-8873
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.2-47123. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vul... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
6.0
MEDIUMCVE-2020-8872
This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.1-47117. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to explo... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
8.2
HIGHCVE-2020-8871
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.0-47107 . An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vu... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8870
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Aug. 20, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8869
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Aug. 20, 2020
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2020-8868
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Quest Foglight Evolve 9.0.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the __service__ user account. The ... Read more
Affected Products : foglight_evolve- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2020-8867
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ... Read more
- Published: Apr. 22, 2020
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2020-8866
This vulnerability allows remote attackers to create arbitrary files on affected installations of Horde Groupware Webmail Edition 5.2.22. Authentication is required to exploit this vulnerability. The specific flaw exists within add.php. The issue results ... Read more
- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2020-8865
This vulnerability allows remote attackers to execute local PHP files on affected installations of Horde Groupware Webmail Edition 5.2.22. Authentication is required to exploit this vulnerability. The specific flaw exists within edit.php. When parsing the... Read more
- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8864
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.10B04. Authentication is not required to exploit this vulnerability. The specific flaw ... Read more
- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024