Latest CVE Feed
-
8.8
HIGHCVE-2018-14326
In MP4v2 2.0.0, there is an integer overflow (with resultant memory corruption) when resizing MP4Array for the ftyp atom in mp4array.h.... Read more
- Published: Jul. 16, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-14325
In MP4v2 2.0.0, there is an integer underflow (with resultant memory corruption) when parsing MP4Atom in mp4atom.cpp.... Read more
- Published: Jul. 16, 2018
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2018-14324
The demo feature in Oracle GlassFish Open Source Edition 5.0 has TCP port 7676 open by default with a password of admin for the admin account. This allows remote attackers to obtain potentially sensitive information, perform database operations, or manipu... Read more
Affected Products : glassfish_server- Published: Jul. 16, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-14320
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of PoDoFo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The spe... Read more
Affected Products : podofo- Published: Sep. 17, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-14318
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy S8 G950FXXU1AQL5. User interaction is required to exploit this vulnerability in that the target must have their cellular radios enabled. The... Read more
- Published: Sep. 24, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-14317
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more
- Published: Aug. 30, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-14316
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malici... Read more
- Published: Jul. 31, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-14315
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more
- Published: Jul. 31, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-14314
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more
- Published: Jul. 31, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-14313
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more
- Published: Jul. 31, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-14312
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more
- Published: Jul. 31, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-14311
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The speci... Read more
- Published: Jul. 31, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-14310
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more
- Published: Jul. 31, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-14309
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more
- Published: Jul. 31, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-14308
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more
- Published: Jul. 31, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-14307
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more
- Published: Jul. 31, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-14306
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more
- Published: Jul. 31, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-14305
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more
- Published: Jul. 31, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-14304
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more
- Published: Jul. 31, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-14303
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more
- Published: Jul. 31, 2018
- Modified: Nov. 21, 2024