Latest CVE Feed
-
8.0
HIGHCVE-2020-8860
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S10 Firmware G973FXXS3ASJA, O(8.x), P(9.0), Q(10.0) devices with Exynos chipsets. User interaction is required to exploit this vulnerability i... Read more
- Published: Feb. 22, 2020
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2020-8859
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of ELOG Electronic Logbook 3.1.4-283534d. Authentication is not required to exploit this vulnerability. The specific flaw exists within the proces... Read more
Affected Products : electronic_logbook- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
9.0
HIGHCVE-2020-8858
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Moxa MGate 5105-MB-EIP firmware version 4.1. Authentication is required to exploit this vulnerability. The specific flaw exists within the DestIP parameter w... Read more
Affected Products : mgate_5105-mb-eip_firmware mgate_5105-mb-eip-t_firmware mgate_5105-mb-eip mgate_5105-mb-eip-t- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8857
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8856
This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25608. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fi... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8855
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.2947. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fi... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8854
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8853
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2020-8852
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicio... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8851
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8850
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8849
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8848
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8847
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8846
This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fi... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8845
This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fi... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8844
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.... Read more
- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
7.4
HIGHCVE-2020-8843
An issue was discovered in Istio 1.3 through 1.3.6. Under certain circumstances, it is possible to bypass a specifically configured Mixer policy. Istio-proxy accepts the x-istio-attributes header at ingress that can be used to affect policy decisions when... Read more
Affected Products : istio- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8841
An issue was discovered in TestLink 1.9.19. The relation_type parameter of the lib/requirements/reqSearch.php endpoint is vulnerable to authenticated SQL Injection.... Read more
Affected Products : testlink- Published: Feb. 10, 2020
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2020-8840
FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.... Read more
- Published: Feb. 10, 2020
- Modified: Nov. 21, 2024