Latest CVE Feed
-
6.5
MEDIUMCVE-2018-10486
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-10485
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-10484
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-10483
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-10482
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-10481
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-10480
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-10479
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-10478
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-10477
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-10476
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-10475
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-10474
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-10473
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more
- Published: May. 17, 2018
- Modified: Nov. 21, 2024
-
5.6
MEDIUMCVE-2018-10472
An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.... Read more
- Published: Apr. 27, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-10471
An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.... Read more
- Published: Apr. 27, 2018
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2018-10470
Little Snitch versions 4.0 to 4.0.6 use the SecStaticCodeCheckValidityWithErrors() function without the kSecCSCheckAllArchitectures flag and therefore do not validate all architectures stored in a fat binary. An attacker can maliciously craft a fat binary... Read more
- Published: Jun. 12, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2018-10469
b3log Symphony (aka Sym) 2.6.0 allows remote attackers to upload and execute arbitrary JSP files via the name[] parameter to the /upload URI.... Read more
Affected Products : symphony- Published: Apr. 27, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2018-10468
The transferFrom function of a smart contract implementation for Useless Ethereum Token (UET), an Ethereum ERC20 token, allows attackers to steal assets (e.g., transfer all victims' balances into their account) because certain computations involving _valu... Read more
Affected Products : useless_ethereum_token- Published: Apr. 28, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2018-10466
Zoho ManageEngine ADAudit Plus before 5.0.0 build 5100 allows blind SQL Injection.... Read more
Affected Products : manageengine_adaudit_plus- Published: May. 29, 2018
- Modified: Nov. 21, 2024