Latest CVE Feed
-
6.5
MEDIUMCVE-2018-10480
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-10479
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-10478
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-10477
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-10476
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-10475
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-10474
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-10473
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
5.6
MEDIUMCVE-2018-10472
An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.... Read more
- Published: Apr. 27, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-10471
An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.... Read more
- Published: Apr. 27, 2018
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2018-10470
Little Snitch versions 4.0 to 4.0.6 use the SecStaticCodeCheckValidityWithErrors() function without the kSecCSCheckAllArchitectures flag and therefore do not validate all architectures stored in a fat binary. An attacker can maliciously craft a fat binary... Read more
- Published: Jun. 12, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2018-10469
b3log Symphony (aka Sym) 2.6.0 allows remote attackers to upload and execute arbitrary JSP files via the name[] parameter to the /upload URI.... Read more
Affected Products : symphony- Published: Apr. 27, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2018-10468
The transferFrom function of a smart contract implementation for Useless Ethereum Token (UET), an Ethereum ERC20 token, allows attackers to steal assets (e.g., transfer all victims' balances into their account) because certain computations involving _valu... Read more
Affected Products : useless_ethereum_token- Published: Apr. 28, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2018-10466
Zoho ManageEngine ADAudit Plus before 5.0.0 build 5100 allows blind SQL Injection.... Read more
Affected Products : manageengine_adaudit_plus- Published: May. 29, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-10465
Jamf Pro 10.x before 10.3.0 has Incorrect Access Control. Jamf Pro user accounts and groups with access to log in to Jamf Pro had full access to endpoints in the Universal API (UAPI), regardless of account privileges or privilege sets. An authenticated Ja... Read more
Affected Products : jamf- Published: Jan. 07, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2018-10432
Pexip Infinity before 18 allows Remote Denial of Service (TLS handshakes in RTMP).... Read more
Affected Products : pexip_infinity- Published: Sep. 25, 2020
- Modified: Nov. 21, 2024
-
7.2
HIGHCVE-2018-10431
D-Link DIR-615 2.5.17 devices allow Remote Code Execution via shell metacharacters in the Host field of the System / Traceroute screen.... Read more
- Published: Apr. 26, 2018
- Modified: Nov. 21, 2024
-
4.8
MEDIUMCVE-2018-10430
An issue was discovered in DiliCMS (aka DiligentCMS) 2.4.0. There is a Stored XSS Vulnerability in the fourth textbox of "System setting->site setting" of admin/index.php.... Read more
Affected Products : dilicms- Published: Apr. 26, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2018-10429
Cosmo 1.0.0Beta6 allows attackers to execute arbitrary PHP code via the Database Prefix field on the Database Info screen of install.php.... Read more
Affected Products : cosmo- Published: Apr. 26, 2018
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2018-10428
ILIAS before 5.1.26, 5.2.x before 5.2.15, and 5.3.x before 5.3.4, due to inconsistencies in parameter handling, is vulnerable to various instances of reflected cross-site-scripting.... Read more
Affected Products : ilias- Published: May. 23, 2018
- Modified: Nov. 21, 2024