Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 8.8

    HIGH
    CVE-2018-14310

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14309

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14308

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14307

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14306

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14305

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14304

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14303

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14302

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14301

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14300

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    Affected Products : foxit_reader phantompdf windows
    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14299

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14298

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14297

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14296

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14295

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF Phantom PDF 9.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a ... Read more

    Affected Products : foxit_reader phantompdf windows
    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14294

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14293

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14292

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14291

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
Showing 20 of 294836 Results