Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2018-07-31 CVE-2018-14241 Incorrect Type Conversion or Cast vulnerability in Foxitsoftware Foxit Reader
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.
network
low complexity
foxitsoftware CWE-704
8.8
2018-07-31 CVE-2018-11623 Incorrect Type Conversion or Cast vulnerability in Foxitsoftware Foxit Reader
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.
network
low complexity
foxitsoftware CWE-704
8.8
2018-07-31 CVE-2018-11622 Out-of-bounds Write vulnerability in Foxitsoftware Foxit Reader
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.
network
low complexity
foxitsoftware CWE-787
8.8
2018-07-31 CVE-2018-11619 Use After Free vulnerability in Foxitsoftware Foxit Reader
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.
network
low complexity
foxitsoftware CWE-416
8.8
2018-07-31 CVE-2018-11618 Use After Free vulnerability in Foxitsoftware Foxit Reader
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.
network
low complexity
foxitsoftware CWE-416
8.8
2018-07-31 CVE-2018-11617 Use After Free vulnerability in Foxitsoftware Foxit Reader
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.
network
low complexity
foxitsoftware CWE-416
8.8
2018-07-31 CVE-2016-8631 Unspecified vulnerability in Redhat Openshift 3.0/3.3
The OpenShift Enterprise 3 router does not properly sort routes when processing newly added routes.
network
low complexity
redhat
7.7
2018-07-31 CVE-2017-5693 Resource Exhaustion vulnerability in Intel Puma Firmware 5.0/6.0Soc/7.0Soc
Firmware in the Intel Puma 5, 6, and 7 Series might experience resource depletion or timeout, which allows a network attacker to create a denial of service via crafted network traffic.
network
low complexity
intel CWE-400
7.5
2018-07-31 CVE-2016-8657 Permissions, Privileges, and Access Controls vulnerability in Redhat Jboss Enterprise Application Platform 5.0.0/6.0.0/6.4.0
It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files.
local
low complexity
redhat CWE-264
7.8
2018-07-31 CVE-2018-10607 Resource Exhaustion vulnerability in Martem Telem-Gw6 Firmware and Telem-Gwm Firmware
Martem TELEM GW6 and GWM devices with firmware 2018.04.18-linux_4-01-601cb47 and prior allow the creation of new connections to one or more IOAs, without closing them properly, which may cause a denial of service within the industrial process control channel.
network
low complexity
martem CWE-400
7.5