Vulnerabilities > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-07-31 | CVE-2018-14241 | Incorrect Type Conversion or Cast vulnerability in Foxitsoftware Foxit Reader This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. | 8.8 |
2018-07-31 | CVE-2018-11623 | Incorrect Type Conversion or Cast vulnerability in Foxitsoftware Foxit Reader This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. | 8.8 |
2018-07-31 | CVE-2018-11622 | Out-of-bounds Write vulnerability in Foxitsoftware Foxit Reader This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. | 8.8 |
2018-07-31 | CVE-2018-11619 | Use After Free vulnerability in Foxitsoftware Foxit Reader This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. | 8.8 |
2018-07-31 | CVE-2018-11618 | Use After Free vulnerability in Foxitsoftware Foxit Reader This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. | 8.8 |
2018-07-31 | CVE-2018-11617 | Use After Free vulnerability in Foxitsoftware Foxit Reader This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. | 8.8 |
2018-07-31 | CVE-2016-8631 | Unspecified vulnerability in Redhat Openshift 3.0/3.3 The OpenShift Enterprise 3 router does not properly sort routes when processing newly added routes. | 7.7 |
2018-07-31 | CVE-2017-5693 | Resource Exhaustion vulnerability in Intel Puma Firmware 5.0/6.0Soc/7.0Soc Firmware in the Intel Puma 5, 6, and 7 Series might experience resource depletion or timeout, which allows a network attacker to create a denial of service via crafted network traffic. | 7.5 |
2018-07-31 | CVE-2016-8657 | Permissions, Privileges, and Access Controls vulnerability in Redhat Jboss Enterprise Application Platform 5.0.0/6.0.0/6.4.0 It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files. | 7.8 |
2018-07-31 | CVE-2018-10607 | Resource Exhaustion vulnerability in Martem Telem-Gw6 Firmware and Telem-Gwm Firmware Martem TELEM GW6 and GWM devices with firmware 2018.04.18-linux_4-01-601cb47 and prior allow the creation of new connections to one or more IOAs, without closing them properly, which may cause a denial of service within the industrial process control channel. | 7.5 |