Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 8.8

    HIGH
    CVE-2018-14250

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14249

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14248

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14247

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14246

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14245

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14244

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14243

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14242

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14241

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-14089

    An issue was discovered in a smart contract implementation for Virgo_ZodiacToken, an Ethereum token. In this contract, 'bool sufficientAllowance = allowance <= _value' will cause an arbitrary transfer in the function transferFrom because '<=' is used inst... Read more

    Affected Products : virgo_zodiactoken
    • Published: Jul. 16, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2018-14088

    An issue was discovered in a smart contract implementation for STeX White List (STE(WL)), an Ethereum token. The contract has an integer overflow. If the owner sets the value of amount to a large number then the "amount * 1000000000000000" will cause an i... Read more

    Affected Products : stex_white_list
    • Published: Jul. 16, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2018-14087

    An issue was discovered in a smart contract implementation for EUC (EUC), an Ethereum token. The contract has an integer overflow. If the owner sets the value of buyPrice to a large number in setPrices() then the "msg.value * buyPrice" will cause an integ... Read more

    Affected Products : encryptedtoken
    • Published: Jul. 16, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2018-14086

    An issue was discovered in a smart contract implementation for SingaporeCoinOrigin (SCO), an Ethereum token. The contract has an integer overflow. If the owner sets the value of sellPrice to a large number in setPrices() then the "amount * sellPrice" will... Read more

    Affected Products : mytoken
    • Published: Jul. 16, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-14085

    An issue was discovered in a smart contract implementation for UserWallet 0x0a7bca9FB7AfF26c6ED8029BB6f0F5D291587c42, an Ethereum token. First, suppose that the owner adds the evil contract address to his sweepers. The evil contract looks like this: contr... Read more

    Affected Products : userwallet
    • Published: Jul. 16, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2018-14084

    An issue was discovered in a smart contract implementation for MKCB, an Ethereum token. If the owner sets the value of sellPrice to a large number in setPrices() then the "amount * sellPrice" will cause an integer overflow in sell().... Read more

    Affected Products : myadvancedtoken
    • Published: Jul. 16, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-14083

    LICA miniCMTS E8K(u/i/...) devices allow remote attackers to obtain sensitive information via a direct POST request for the inc/user.ini file, leading to discovery of a password hash.... Read more

    Affected Products : minicmts_e8k_firmware minicmts_e8k
    • Published: Jul. 25, 2018
    • Modified: Nov. 21, 2024
  • 5.4

    MEDIUM
    CVE-2018-14082

    PHP Scripts Mall JOB SITE (aka Job Portal) 3.0.1 has Cross-site Scripting (XSS) via the search bar.... Read more

    Affected Products : job_portal
    • Published: Jul. 18, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2018-14081

    An issue was discovered on D-Link DIR-809 A1 through 1.09, A2 through 1.11, and Guest Zone through 1.09 devices. Device passwords, such as the admin password and the WPA key, are stored in cleartext.... Read more

    • Published: Oct. 09, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-14080

    An issue was discovered on D-Link DIR-809 A1 through 1.09, A2 through 1.11, and Guest Zone through 1.09 devices. One can bypass authentication mechanisms to download the configuration file.... Read more

    • Published: Oct. 09, 2018
    • Modified: Nov. 21, 2024
Showing 20 of 294836 Results