Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 8.8

    HIGH
    CVE-2018-14260

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14259

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14258

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14257

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14256

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14255

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14254

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14253

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14252

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14251

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14250

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14249

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14248

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14247

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14246

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14245

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14244

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14243

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14242

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-14241

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    • Published: Jul. 31, 2018
    • Modified: Nov. 21, 2024
Showing 20 of 294846 Results