Max CVSS | 7.5 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2018-10869 | 5.0 |
redhat-certification does not properly restrict files that can be download through the /download page. A remote attacker may download any file accessible by the user running httpd.
|
13-02-2023 - 04:51 | 19-07-2018 - 22:29 | |
CVE-2018-12808 | 7.5 |
Adobe Acrobat and Reader versions 2018.011.20055 and earlier, 2017.011.30096 and earlier, and 2015.006.30434 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.
|
21-08-2019 - 16:20 | 29-08-2018 - 13:29 | |
CVE-2018-12799 | 6.8 |
Adobe Acrobat and Reader versions 2018.011.20055 and earlier, 2017.011.30096 and earlier, and 2015.006.30434 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution.
|
21-08-2019 - 16:20 | 29-08-2018 - 13:29 | |
CVE-2018-12806 | 4.3 |
Adobe Experience Manager versions 6.4, 6.3, 6.2, 6.1, and 6.0 have a reflected cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.
|
16-11-2018 - 19:11 | 29-08-2018 - 13:29 | |
CVE-2018-12807 | 5.0 |
Adobe Experience Manager versions 6.4, 6.3, 6.2, 6.1, and 6.0 have an input validation bypass vulnerability. Successful exploitation could lead to unauthorized information modification.
|
08-11-2018 - 17:28 | 29-08-2018 - 13:29 | |
CVE-2018-5003 | 6.8 |
Adobe Creative Cloud Desktop Application before 4.5.5.342 (installer) has an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to privilege escalation.
|
08-11-2018 - 17:23 | 29-08-2018 - 13:29 | |
CVE-2018-12826 | 5.0 |
Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
30-10-2018 - 14:59 | 29-08-2018 - 13:29 | |
CVE-2018-12827 | 5.0 |
Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
30-10-2018 - 14:54 | 29-08-2018 - 13:29 | |
CVE-2018-12824 | 4.3 |
Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
29-10-2018 - 20:23 | 29-08-2018 - 13:29 | |
CVE-2018-5243 | 5.0 |
The Symantec Encryption Management Server (SEMS) product, prior to version 3.4.2 MP1, may be susceptible to a denial of service (DoS) exploit. A DoS attack is a type of attack whereby the perpetrator attempts to make a particular machine or network r
|
16-10-2018 - 14:08 | 20-08-2018 - 18:29 | |
CVE-2018-2445 | 5.5 |
AdminTools in SAP BusinessObjects Business Intelligence, versions 4.1, 4.2, allows an attacker to manipulate the vulnerable application to send crafted requests on behalf of the application, resulting in a Server-Side Request Forgery (SSRF) vulnerabi
|
15-10-2018 - 17:29 | 14-08-2018 - 16:29 | |
CVE-2018-2450 | 6.5 |
SAP MaxDB (liveCache), versions 7.8 and 7.9, allows an attacker who gets DBM operator privileges to execute crafted database queries and therefore read, modify or delete sensitive data from database.
|
11-10-2018 - 16:47 | 14-08-2018 - 16:29 | |
CVE-2018-14028 | 6.5 |
In WordPress 4.9.7, plugins uploaded via the admin area are not verified as being ZIP files. This allows for PHP files to be uploaded. Once a PHP file is uploaded, the plugin extraction fails, but the PHP file remains in a predictable wp-content/uplo
|
10-10-2018 - 13:06 | 10-08-2018 - 16:29 | |
CVE-2004-2699 | 4.3 |
deleteicon.aspx in AspDotNetStorefront 3.3 allows remote attackers to delete arbitrary product images via a modified ProductID parameter.
|
29-07-2017 - 01:29 | 31-12-2004 - 05:00 |