Vulnerabilities > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-11-05 | CVE-2019-5088 | Out-of-bounds Write vulnerability in Investintech Able2Extract 14.0.7 An exploitable memory corruption vulnerability exists in Investintech Able2Extract Professional 14.0.7 x64. | 7.8 |
2019-11-05 | CVE-2019-16284 | Unspecified vulnerability in HP products A potential security vulnerability has been identified in multiple HP products and versions which involves possible execution of arbitrary code during boot services that can result in elevation of privilege. | 7.2 |
2019-11-05 | CVE-2018-19167 | Resource Exhaustion vulnerability in Cloakcoin CloakCoin through 2.2.2.0 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. | 7.5 |
2019-11-05 | CVE-2018-19166 | Resource Exhaustion vulnerability in Peercoin peercoin through 0.6.4 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. | 7.5 |
2019-11-05 | CVE-2018-19165 | Resource Exhaustion vulnerability in Nebl Neblio neblio through 1.5.1 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. | 7.5 |
2019-11-05 | CVE-2018-19164 | Resource Exhaustion vulnerability in Reddcoin reddcoin through 2.1.0.5 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. | 7.5 |
2019-11-05 | CVE-2018-19163 | Resource Exhaustion vulnerability in Stratisplatform Stratisx stratisX through 2.0.0.5 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. | 7.5 |
2019-11-05 | CVE-2018-19162 | Resource Exhaustion vulnerability in Diviproject Divi Divi through 4.0.5 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. | 7.5 |
2019-11-05 | CVE-2018-19161 | Resource Exhaustion vulnerability in Alqo alqo through 4.1 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. | 7.5 |
2019-11-05 | CVE-2018-19160 | Resource Exhaustion vulnerability in Bit.Diamonds Diamond Diamond through 3.0.1.2 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. | 7.5 |