Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2018-10-09 CVE-2018-12479 Improper Input Validation vulnerability in Opensuse Open Build Service
A Improper Input Validation vulnerability in Open Build Service allows remote attackers to cause DoS by specifying crafted request IDs.
network
low complexity
opensuse CWE-20
7.5
2018-10-09 CVE-2018-12477 CRLF Injection vulnerability in Opensuse Leap 15.0/42.3
A Improper Neutralization of CRLF Sequences vulnerability in Open Build Service allows remote attackers to cause deletion of directories by tricking obs-service-refresh_patches to delete them.
network
low complexity
opensuse CWE-93
7.5
2018-10-09 CVE-2018-18071 Cleartext Transmission of Sensitive Information vulnerability in Mercedes-Benz Mercedes ME 2.11.0
An issue was discovered in the Daimler Mercedes-Benz Me app 2.11.0-846 for iOS.
network
low complexity
mercedes-benz CWE-319
7.5
2018-10-08 CVE-2016-7475 Improper Input Validation vulnerability in F5 products
Under some circumstances on BIG-IP 12.0.0-12.1.0, 11.6.0-11.6.1, or 11.4.0-11.5.4 HF1, the Traffic Management Microkernel (TMM) may not properly clean-up pool member network connections when using SPDY or HTTP/2 virtual server profiles.
network
low complexity
f5 CWE-20
7.5
2018-10-08 CVE-2018-18066 NULL Pointer Dereference vulnerability in multiple products
snmp_oid_compare in snmplib/snmp_api.c in Net-SNMP before 5.8 has a NULL Pointer Exception bug that can be used by an unauthenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
network
low complexity
net-snmp netapp CWE-476
7.5
2018-10-08 CVE-2018-17775 Incorrect Permission Assignment for Critical Resource vulnerability in Seqrite END Point Security 7.4
Seqrite End Point Security v7.4 has "Everyone: (F)" permission for %PROGRAMFILES%\Seqrite\Seqrite, which allows local users to gain privileges by replacing an executable file with a Trojan horse.
local
low complexity
seqrite CWE-732
7.8
2018-10-08 CVE-2018-3997 Use After Free vulnerability in Foxitsoftware Phantompdf
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader, version 9.2.0.9297.
network
low complexity
foxitsoftware CWE-416
8.8
2018-10-08 CVE-2018-3996 Use After Free vulnerability in Foxitsoftware Phantompdf
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.2.0.9297.
network
low complexity
foxitsoftware CWE-416
8.8
2018-10-08 CVE-2018-3992 Use After Free vulnerability in Foxitsoftware Phantompdf
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader, version 9.2.0.9297.
network
low complexity
foxitsoftware CWE-416
8.8
2018-10-08 CVE-2018-3945 Use After Free vulnerability in Foxitsoftware Phantompdf
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096.
network
low complexity
foxitsoftware CWE-416
8.8