Latest CVE Feed
-
4.7
MEDIUMCVE-2018-10506
A out-of-bounds read information disclosure vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a local attacker to disclose sensitive information on vulnerable installations due to a flaw within the processing of IOCTL 0x220004 by the TMW... Read more
Affected Products : officescan- Published: Jun. 08, 2018
- Modified: Nov. 21, 2024
-
6.3
MEDIUMCVE-2018-10505
A pool corruption privilege escalation vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a local attacker to escalate privileges on vulnerable installations due to a flaw within the processing of IOCTL 0x220008 in the TMWFP driver. An at... Read more
Affected Products : officescan- Published: Jun. 08, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2018-10504
The WebDorado "Form Maker by WD" plugin before 1.12.24 for WordPress allows CSV injection.... Read more
Affected Products : form_maker- Published: Apr. 27, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-10503
An issue was discovered in index.php in baijiacms V4 v4_1_4_20170105. CSRF allows adding an administrator account via op=edituser, changing the administrator password via op=changepwd, or deleting an account via op=deleteuser.... Read more
Affected Products : baijiacms- Published: Apr. 27, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2018-10502
This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Galaxy Apps Fixed in version 4.2.18.2. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploi... Read more
Affected Products : galaxy_apps- Published: Sep. 24, 2018
- Modified: Nov. 21, 2024
-
7.0
HIGHCVE-2018-10501
This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Notes Fixed in version 2.0.02.31. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit thi... Read more
Affected Products : notes- Published: Sep. 24, 2018
- Modified: Nov. 21, 2024
-
7.0
HIGHCVE-2018-10500
This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Galaxy Apps Fixed in version 6.4.0.15. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploi... Read more
Affected Products : galaxy_apps- Published: Sep. 24, 2018
- Modified: Nov. 21, 2024
-
7.0
HIGHCVE-2018-10499
This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy Apps Fixed in version 6.4.0.15. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exp... Read more
Affected Products : galaxy_apps- Published: Sep. 24, 2018
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2018-10498
This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of Samsung Email Fixed in version 5.0.02.16. An attacker must first obtain the ability to execute low-privileged code on the target system in order to ... Read more
Affected Products : samsung_email- Published: Sep. 24, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2018-10497
This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Email Fixed in version 5.0.02.16. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit thi... Read more
Affected Products : samsung_email- Published: Sep. 24, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-10496
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Internet Browser Fixed in version 6.4.0.15. User interaction is required to exploit this vulnerability in that the target must visit a malicious pa... Read more
Affected Products : samsung_internet_browser- Published: Sep. 24, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-10495
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-10494
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-10493
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malici... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-10492
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-10491
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-10490
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-10489
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-10488
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-10487
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024