Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2016-04-22 CVE-2016-4064 Improper Access Control vulnerability in Foxitsoftware Foxit Reader and Phantompdf
Use-after-free vulnerability in the XFA forms handling functionality in Foxit Reader and PhantomPDF before 7.3.4 on Windows allows remote attackers to execute arbitrary code via a crafted remerge call.
local
low complexity
foxitsoftware CWE-284
7.8
2016-04-22 CVE-2016-4063 Unspecified vulnerability in Foxitsoftware Foxit Reader and Phantompdf
Use-after-free vulnerability in Foxit Reader and PhantomPDF before 7.3.4 on Windows allows remote attackers to execute arbitrary code via an object with a revision number of -1 in a PDF document.
local
low complexity
foxitsoftware
7.8
2016-04-22 CVE-2016-4061 Improper Input Validation vulnerability in Foxitsoftware Foxit Reader and Phantompdf
Foxit Reader and PhantomPDF before 7.3.4 on Windows allow remote attackers to cause a denial of service (application crash) via a crafted content stream.
network
low complexity
foxitsoftware CWE-20
7.5
2016-04-22 CVE-2016-4060 Unspecified vulnerability in Foxitsoftware Foxit Reader and Phantompdf
Use-after-free vulnerability in Foxit Reader and PhantomPDF before 7.3.4 on Windows allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
network
low complexity
foxitsoftware
7.5
2016-04-22 CVE-2016-4059 Unspecified vulnerability in Foxitsoftware Foxit Reader and Phantompdf
Use-after-free vulnerability in Foxit Reader and PhantomPDF before 7.3.4 on Windows allows remote attackers to execute arbitrary code via a crafted FlateDecode stream in a PDF document.
local
low complexity
foxitsoftware
7.8
2016-04-22 CVE-2016-1593 Path Traversal vulnerability in Novell Service Desk 7.1
Directory traversal vulnerability in the import users feature in Micro Focus Novell Service Desk before 7.2 allows remote authenticated administrators to upload and execute arbitrary JSP files via a ..
network
low complexity
novell CWE-22
7.2
2016-04-22 CVE-2016-2354 Improper Access Control vulnerability in Lemurmonitors Bluedriver 6.3.2
The Bluetooth functionality in Lemur Vehicle Monitors BlueDriver before 2016-04-07 supports unrestricted pairing without a PIN, which allows remote attackers to send arbitrary CAN commands by leveraging access to a device inside or adjacent to the vehicle, as demonstrated by a CAN command to disrupt braking or steering.
low complexity
lemurmonitors CWE-284
8.8
2016-04-22 CVE-2016-2306 Cryptographic Issues vulnerability in Ecava Integraxor
The HMI web server in Ecava IntegraXor before 5.0 build 4522 allows remote attackers to obtain sensitive cleartext information by sniffing the network.
network
low complexity
ecava CWE-310
7.5
2016-04-22 CVE-2016-2299 SQL Injection vulnerability in Ecava Integraxor
SQL injection vulnerability in Ecava IntegraXor before 5.0 build 4522 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
network
low complexity
ecava CWE-89
7.3
2016-04-21 CVE-2016-3190 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
The fill_xrgb32_lerp_opaque_spans function in cairo-image-compositor.c in cairo before 1.14.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a negative span length.
network
low complexity
opensuse cairographics CWE-119
7.5