Vulnerabilities > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-10-09 | CVE-2018-12479 | Improper Input Validation vulnerability in Opensuse Open Build Service A Improper Input Validation vulnerability in Open Build Service allows remote attackers to cause DoS by specifying crafted request IDs. | 7.5 |
2018-10-09 | CVE-2018-12477 | CRLF Injection vulnerability in Opensuse Leap 15.0/42.3 A Improper Neutralization of CRLF Sequences vulnerability in Open Build Service allows remote attackers to cause deletion of directories by tricking obs-service-refresh_patches to delete them. | 7.5 |
2018-10-09 | CVE-2018-18071 | Cleartext Transmission of Sensitive Information vulnerability in Mercedes-Benz Mercedes ME 2.11.0 An issue was discovered in the Daimler Mercedes-Benz Me app 2.11.0-846 for iOS. | 7.5 |
2018-10-08 | CVE-2016-7475 | Improper Input Validation vulnerability in F5 products Under some circumstances on BIG-IP 12.0.0-12.1.0, 11.6.0-11.6.1, or 11.4.0-11.5.4 HF1, the Traffic Management Microkernel (TMM) may not properly clean-up pool member network connections when using SPDY or HTTP/2 virtual server profiles. | 7.5 |
2018-10-08 | CVE-2018-18066 | NULL Pointer Dereference vulnerability in multiple products snmp_oid_compare in snmplib/snmp_api.c in Net-SNMP before 5.8 has a NULL Pointer Exception bug that can be used by an unauthenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service. | 7.5 |
2018-10-08 | CVE-2018-17775 | Incorrect Permission Assignment for Critical Resource vulnerability in Seqrite END Point Security 7.4 Seqrite End Point Security v7.4 has "Everyone: (F)" permission for %PROGRAMFILES%\Seqrite\Seqrite, which allows local users to gain privileges by replacing an executable file with a Trojan horse. | 7.8 |
2018-10-08 | CVE-2018-3997 | Use After Free vulnerability in Foxitsoftware Phantompdf An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader, version 9.2.0.9297. | 8.8 |
2018-10-08 | CVE-2018-3996 | Use After Free vulnerability in Foxitsoftware Phantompdf An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.2.0.9297. | 8.8 |
2018-10-08 | CVE-2018-3992 | Use After Free vulnerability in Foxitsoftware Phantompdf An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader, version 9.2.0.9297. | 8.8 |
2018-10-08 | CVE-2018-3945 | Use After Free vulnerability in Foxitsoftware Phantompdf An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. | 8.8 |