Vulnerabilities > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-05-24 | CVE-2018-5679 | Out-of-bounds Read vulnerability in Foxitsoftware Reader This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. | 8.8 |
2018-05-24 | CVE-2018-5678 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Reader This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. | 8.8 |
2018-05-24 | CVE-2018-5677 | Out-of-bounds Read vulnerability in Foxitsoftware Reader This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. | 8.8 |
2018-05-24 | CVE-2018-5676 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Reader This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. | 8.8 |
2018-05-24 | CVE-2018-5675 | Out-of-bounds Write vulnerability in Foxitsoftware Reader This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. | 8.8 |
2018-05-24 | CVE-2018-5674 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Reader This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. | 8.8 |
2018-05-24 | CVE-2013-3024 | Permissions, Privileges, and Access Controls vulnerability in IBM Websphere Application Server 8.5.0.0/8.5.0.1/8.5.0.2 IBM WebSphere Application Server (WAS) 8.5 through 8.5.0.2 on UNIX allows local users to gain privileges by leveraging improper process initialization. | 7.8 |
2018-05-24 | CVE-2013-3023 | Information Exposure vulnerability in IBM Tivoli Application Dependency Discovery Manager IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2 and 7.2.0 through 7.2.1.4 might allow remote attackers to obtain sensitive information about Tomcat credentials by sniffing the network for a session in which HTTP is used. | 8.1 |
2018-05-24 | CVE-2018-7526 | Forced Browsing vulnerability in Beaconmedaes Scroll Medical AIR Systems Firmware In TotalAlert Web Application in BeaconMedaes Scroll Medical Air Systems prior to v4107600010.23, by accessing a specific uniform resource locator (URL) on the webserver, a malicious user may be able to access information in the application without authenticating. | 7.5 |
2018-05-24 | CVE-2018-11416 | Double Free vulnerability in Jpegoptim Project Jpegoptim 1.4.5 jpegoptim.c in jpegoptim 1.4.5 (fixed in 1.4.6) has an invalid use of realloc() and free(), which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. | 8.8 |