Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 5.3

    MEDIUM
    CVE-2018-12087

    Failure to validate certificates in OPC Foundation UA Client Applications communicating without security allows attackers with control over a piece of network infrastructure to decrypt passwords.... Read more

    Affected Products : ua-.net-legacy ua-.netstandard
    • Published: Oct. 03, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-12086

    Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.... Read more

    • Published: Sep. 14, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-12085

    Liblouis 3.6.0 has a stack-based Buffer Overflow in the function parseChars in compileTranslationTable.c, a different vulnerability than CVE-2018-11440.... Read more

    Affected Products : ubuntu_linux leap liblouis
    • Published: Jun. 09, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-12084

    The mintToken function of a smart contract implementation for BitAsean (BAS), a tradable Ethereum ERC20 token, has no period constraint, which allows the owner to increase the total supply of the digital assets arbitrarily so as to make profits, aka the "... Read more

    Affected Products : bitasean
    • Published: Jun. 25, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-12083

    The mintToken function of a smart contract implementation for GOAL Bonanza (GOAL), a tradable Ethereum ERC20 token, has no period constraint, which allows the owner to increase the total supply of the digital assets arbitrarily so as to make profits, aka ... Read more

    Affected Products : goal_bonanza
    • Published: Jun. 25, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-12082

    The mintToken function of a smart contract implementation for Fujinto (NTO), a tradable Ethereum ERC20 token, has no period constraint, which allows the owner to increase the total supply of the digital assets arbitrarily so as to make profits, aka the "t... Read more

    Affected Products : fujinto
    • Published: Jun. 25, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-12081

    The mintToken function of a smart contract implementation for Target Coin (TGT), a tradable Ethereum ERC20 token, has no period constraint, which allows the owner to increase the total supply of the digital assets arbitrarily so as to make profits, aka th... Read more

    Affected Products : target_coin
    • Published: Jun. 25, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-12080

    The mintToken function of a smart contract implementation for Internet Node Token (INT), a tradable Ethereum ERC20 token, has no period constraint, which allows the owner to increase the total supply of the digital assets arbitrarily so as to make profits... Read more

    Affected Products : node_token
    • Published: Jun. 25, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-12079

    The mintToken function of a smart contract implementation for Substratum (SUB), a tradable Ethereum ERC20 token, has no period constraint, which allows the owner to increase the total supply of the digital assets arbitrarily so as to make profits, aka the... Read more

    Affected Products : substratum
    • Published: Jun. 25, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-12078

    The mintToken function of a smart contract implementation for PolyAI (AI), a tradable Ethereum ERC20 token, has no period constraint, which allows the owner to increase the total supply of the digital assets arbitrarily so as to make profits, aka the "tra... Read more

    Affected Products : polyai
    • Published: Jun. 25, 2018
    • Modified: Nov. 21, 2024
  • 4.2

    MEDIUM
    CVE-2018-12076

    A vulnerability in the UPC bar code of the Avanti Markets MarketCard could allow an unauthenticated, local attacker to access funds within the customer's MarketCard balance, and also could lead to Customer Information Disclosure. The vulnerability is due ... Read more

    Affected Products : market_card
    • Published: Dec. 13, 2018
    • Modified: Nov. 21, 2024
  • 5.3

    MEDIUM
    CVE-2018-12073

    An issue was discovered on Eminent EM4544 9.10 devices. The device does not require the user's current password to set a new one within the web interface. Therefore, it is possible to exploit this issue (e.g., in combination with a successful XSS, or at a... Read more

    Affected Products : em4544
    • Published: Jun. 17, 2018
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2018-12072

    An issue was discovered in Cloud Media Popcorn A-200 03-05-130708-21-POP-411-000 firmware. It is configured to provide TELNET remote access (without a password) that pops a shell as root. If an attacker can connect to port 23 on the device, he can complet... Read more

    • Published: Jun. 17, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-12070

    The sell function of a smart contract implementation for SEC, a tradable Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the seller, because of overflow of the multiplication of its argument amount and a manip... Read more

    Affected Products : sec
    • Published: Jun. 25, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-12068

    The sell function of a smart contract implementation for Target Coin (TGT), a tradable Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the seller, because of overflow of the multiplication of its argument amou... Read more

    Affected Products : target_coin
    • Published: Jun. 25, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-12067

    The sell function of a smart contract implementation for Substratum (SUB), a tradable Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the seller, because of overflow of the multiplication of its argument amoun... Read more

    Affected Products : substratum
    • Published: Jun. 25, 2018
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2018-12066

    BIRD Internet Routing Daemon before 1.6.4 allows local users to cause a denial of service (stack consumption and daemon crash) via BGP mask expressions in birdc.... Read more

    Affected Products : bird
    • Published: Jun. 08, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2018-12065

    A Local File Inclusion vulnerability in /system/WCore/WHelper.php in Creatiwity wityCMS 0.6.2 allows remote attackers to include local PHP files (execute PHP code) or read non-PHP files by replacing a helper.json file.... Read more

    Affected Products : witycms
    • Published: Jun. 08, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2018-12064

    tinyexr 0.9.5 has a heap-based buffer over-read via tinyexr::ReadChannelInfo in tinyexr.h.... Read more

    Affected Products : tinyexr
    • Published: Jun. 08, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-12063

    The sell function of a smart contract implementation for Internet Node Token (INT), a tradable Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the seller, because of overflow of the multiplication of its argum... Read more

    Affected Products : node_token
    • Published: Jun. 25, 2018
    • Modified: Nov. 21, 2024
Showing 20 of 294072 Results