Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 6.3

    MEDIUM
    CVE-2018-10505

    A pool corruption privilege escalation vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a local attacker to escalate privileges on vulnerable installations due to a flaw within the processing of IOCTL 0x220008 in the TMWFP driver. An at... Read more

    Affected Products : officescan
    • Published: Jun. 08, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-10504

    The WebDorado "Form Maker by WD" plugin before 1.12.24 for WordPress allows CSV injection.... Read more

    Affected Products : form_maker
    • Published: Apr. 27, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10503

    An issue was discovered in index.php in baijiacms V4 v4_1_4_20170105. CSRF allows adding an administrator account via op=edituser, changing the administrator password via op=changepwd, or deleting an account via op=deleteuser.... Read more

    Affected Products : baijiacms
    • Published: Apr. 27, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-10502

    This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Galaxy Apps Fixed in version 4.2.18.2. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploi... Read more

    Affected Products : galaxy_apps
    • Published: Sep. 24, 2018
    • Modified: Nov. 21, 2024
  • 7.0

    HIGH
    CVE-2018-10501

    This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Notes Fixed in version 2.0.02.31. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit thi... Read more

    Affected Products : notes
    • Published: Sep. 24, 2018
    • Modified: Nov. 21, 2024
  • 7.0

    HIGH
    CVE-2018-10500

    This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Galaxy Apps Fixed in version 6.4.0.15. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploi... Read more

    Affected Products : galaxy_apps
    • Published: Sep. 24, 2018
    • Modified: Nov. 21, 2024
  • 7.0

    HIGH
    CVE-2018-10499

    This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy Apps Fixed in version 6.4.0.15. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exp... Read more

    Affected Products : galaxy_apps
    • Published: Sep. 24, 2018
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2018-10498

    This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of Samsung Email Fixed in version 5.0.02.16. An attacker must first obtain the ability to execute low-privileged code on the target system in order to ... Read more

    Affected Products : samsung_email
    • Published: Sep. 24, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-10497

    This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Email Fixed in version 5.0.02.16. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit thi... Read more

    Affected Products : samsung_email
    • Published: Sep. 24, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10496

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Internet Browser Fixed in version 6.4.0.15. User interaction is required to exploit this vulnerability in that the target must visit a malicious pa... Read more

    Affected Products : samsung_internet_browser
    • Published: Sep. 24, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10495

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more

    Affected Products : foxit_reader phantompdf pdf_reader
    • Published: May. 17, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10494

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    Affected Products : foxit_reader phantompdf pdf_reader
    • Published: May. 17, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2018-10493

    This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malici... Read more

    Affected Products : foxit_reader phantompdf pdf_reader
    • Published: May. 17, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2018-10492

    This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more

    Affected Products : foxit_reader phantompdf pdf_reader
    • Published: May. 17, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10491

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more

    Affected Products : foxit_reader phantompdf pdf_reader
    • Published: May. 17, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10490

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more

    Affected Products : foxit_reader phantompdf pdf_reader
    • Published: May. 17, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10489

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more

    Affected Products : foxit_reader phantompdf pdf_reader
    • Published: May. 17, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10488

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more

    Affected Products : foxit_reader phantompdf pdf_reader
    • Published: May. 17, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2018-10487

    This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more

    Affected Products : foxit_reader phantompdf pdf_reader
    • Published: May. 17, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2018-10486

    This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more

    Affected Products : foxit_reader phantompdf pdf_reader
    • Published: May. 17, 2018
    • Modified: Nov. 21, 2024
Showing 20 of 293639 Results