Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 8.8

    HIGH
    CVE-2018-10509

    A vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a attacker to exploit it via a Browser Refresh attack on vulnerable installations. An attacker must be using a AD logon user account in order to exploit this vulnerability.... Read more

    Affected Products : officescan
    • Published: Jun. 12, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10508

    A vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a attacker to use a specially crafted URL to elevate account permissions on vulnerable installations. An attacker must already have at least guest privileges in order to exploit this vu... Read more

    Affected Products : officescan
    • Published: Jun. 12, 2018
    • Modified: Nov. 21, 2024
  • 4.4

    MEDIUM
    CVE-2018-10507

    A vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a attacker to take a series of steps to bypass or render the OfficeScan Unauthorized Change Prevention inoperable on vulnerable installations. An attacker must already have administrato... Read more

    Affected Products : officescan
    • Published: Jun. 12, 2018
    • Modified: Nov. 21, 2024
  • 4.7

    MEDIUM
    CVE-2018-10506

    A out-of-bounds read information disclosure vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a local attacker to disclose sensitive information on vulnerable installations due to a flaw within the processing of IOCTL 0x220004 by the TMW... Read more

    Affected Products : officescan
    • Published: Jun. 08, 2018
    • Modified: Nov. 21, 2024
  • 6.3

    MEDIUM
    CVE-2018-10505

    A pool corruption privilege escalation vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a local attacker to escalate privileges on vulnerable installations due to a flaw within the processing of IOCTL 0x220008 in the TMWFP driver. An at... Read more

    Affected Products : officescan
    • Published: Jun. 08, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-10504

    The WebDorado "Form Maker by WD" plugin before 1.12.24 for WordPress allows CSV injection.... Read more

    Affected Products : form_maker
    • Published: Apr. 27, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10503

    An issue was discovered in index.php in baijiacms V4 v4_1_4_20170105. CSRF allows adding an administrator account via op=edituser, changing the administrator password via op=changepwd, or deleting an account via op=deleteuser.... Read more

    Affected Products : baijiacms
    • Published: Apr. 27, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-10502

    This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Galaxy Apps Fixed in version 4.2.18.2. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploi... Read more

    Affected Products : galaxy_apps
    • Published: Sep. 24, 2018
    • Modified: Nov. 21, 2024
  • 7.0

    HIGH
    CVE-2018-10501

    This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Notes Fixed in version 2.0.02.31. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit thi... Read more

    Affected Products : notes
    • Published: Sep. 24, 2018
    • Modified: Nov. 21, 2024
  • 7.0

    HIGH
    CVE-2018-10500

    This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Galaxy Apps Fixed in version 6.4.0.15. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploi... Read more

    Affected Products : galaxy_apps
    • Published: Sep. 24, 2018
    • Modified: Nov. 21, 2024
  • 7.0

    HIGH
    CVE-2018-10499

    This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy Apps Fixed in version 6.4.0.15. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exp... Read more

    Affected Products : galaxy_apps
    • Published: Sep. 24, 2018
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2018-10498

    This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of Samsung Email Fixed in version 5.0.02.16. An attacker must first obtain the ability to execute low-privileged code on the target system in order to ... Read more

    Affected Products : samsung_email
    • Published: Sep. 24, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-10497

    This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Email Fixed in version 5.0.02.16. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit thi... Read more

    Affected Products : samsung_email
    • Published: Sep. 24, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10496

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Internet Browser Fixed in version 6.4.0.15. User interaction is required to exploit this vulnerability in that the target must visit a malicious pa... Read more

    Affected Products : samsung_internet_browser
    • Published: Sep. 24, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10495

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more

    Affected Products : foxit_reader phantompdf pdf_reader
    • Published: May. 17, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10494

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file... Read more

    Affected Products : foxit_reader phantompdf pdf_reader
    • Published: May. 17, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2018-10493

    This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malici... Read more

    Affected Products : foxit_reader phantompdf pdf_reader
    • Published: May. 17, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2018-10492

    This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more

    Affected Products : foxit_reader phantompdf pdf_reader
    • Published: May. 17, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10491

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more

    Affected Products : foxit_reader phantompdf pdf_reader
    • Published: May. 17, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10490

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more

    Affected Products : foxit_reader phantompdf pdf_reader
    • Published: May. 17, 2018
    • Modified: Nov. 21, 2024
Showing 20 of 293643 Results