News aggregator

CVE-2018-17706

National Vulnerability Database - Mon, 10/29/2018 - 17:29
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF Phantom PDF 9.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within fxhtml2pdf. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6230.
Categories: Security News

CVE-2018-17615

National Vulnerability Database - Mon, 10/29/2018 - 17:29
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Mouse Exit events. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6333.
Categories: Security News

CVE-2018-17616

National Vulnerability Database - Mon, 10/29/2018 - 17:29
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of onBlur events. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6334.
Categories: Security News

CVE-2018-17617

National Vulnerability Database - Mon, 10/29/2018 - 17:29
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of onFocus events. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6335.
Categories: Security News

CVE-2018-17618

National Vulnerability Database - Mon, 10/29/2018 - 17:29
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Selection Change events. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6336.
Categories: Security News

CVE-2018-17619

National Vulnerability Database - Mon, 10/29/2018 - 17:29
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Validate events. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6352.
Categories: Security News

CVE-2018-17620

National Vulnerability Database - Mon, 10/29/2018 - 17:29
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Calculate events. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6353.
Categories: Security News

CVE-2018-18387

National Vulnerability Database - Mon, 10/29/2018 - 14:29
playSMS through 1.4.2 allows Privilege Escalation through Daemon abuse.
Categories: Security News

CVE-2018-17908

National Vulnerability Database - Mon, 10/29/2018 - 14:29
WebAccess Versions 8.3.2 and prior. During installation, the application installer disables user access control and does not re-enable it after the installation is complete. This could allow an attacker to run elevated arbitrary code.
Categories: Security News

CVE-2018-17910

National Vulnerability Database - Mon, 10/29/2018 - 14:29
WebAccess Versions 8.3.2 and prior. The application fails to properly validate the length of user-supplied data, causing a buffer overflow condition that allows for arbitrary remote code execution.
Categories: Security News

CVE-2018-11880

National Vulnerability Database - Mon, 10/29/2018 - 14:29
Incorrect bound check can lead to potential buffer overwrite in WLAN function in Snapdragon Mobile in version SD 835, SD 845, SD 850, SDA660.
Categories: Security News

CVE-2018-11882

National Vulnerability Database - Mon, 10/29/2018 - 14:29
Incorrect bound check can lead to potential buffer overwrite in WLAN controller in Snapdragon Mobile in version SD 835, SD 845, SD 850, SDA660.
Categories: Security News

CVE-2018-11884

National Vulnerability Database - Mon, 10/29/2018 - 14:29
Improper input validation leads to buffer overflow while processing network list offload command in WLAN function in Snapdragon Mobile in version SD 835, SD 845, SD 850, SDA660
Categories: Security News

CVE-2018-11877

National Vulnerability Database - Mon, 10/29/2018 - 14:29
When the buffer length passed is very large in WLAN, bounds check could be bypassed leading to potential buffer overwrite in Snapdragon Mobile in version SD 835, SD 845, SD 850, SDA660.
Categories: Security News

CVE-2018-11879

National Vulnerability Database - Mon, 10/29/2018 - 14:29
When the buffer length passed is very large, bounds check could be bypassed leading to potential buffer overwrite in Snapdragon Mobile in version SD 845
Categories: Security News

CVE-2018-11875

National Vulnerability Database - Mon, 10/29/2018 - 14:29
Lack of check of buffer size before copying in a WLAN function can lead to a buffer overflow in Snapdragon Mobile in version SD 845, SD 850.
Categories: Security News

CVE-2018-11876

National Vulnerability Database - Mon, 10/29/2018 - 14:29
Lack of input validation while copying to buffer in WLAN will lead to a buffer overflow in Snapdragon Mobile in version SD 835, SD 845, SD 850, SDA660.
Categories: Security News

CVE-2018-11872

National Vulnerability Database - Mon, 10/29/2018 - 14:29
Improper input validation leads to buffer overwrite in the WLAN function that handles WMI commands in Snapdragon Mobile in version SD 845, SD 850, SDA660
Categories: Security News

CVE-2018-11873

National Vulnerability Database - Mon, 10/29/2018 - 14:29
Improper input validation leads to buffer overwrite in the WLAN function that handles WLAN roam buffer in Snapdragon Mobile in version SD 845.
Categories: Security News

CVE-2018-11874

National Vulnerability Database - Mon, 10/29/2018 - 14:29
Buffer overflow if the length of passphrase is more than 32 when setting up secure NDP connection in Snapdragon Mobile in version SD 835, SD 845, SD 850, SDA660.
Categories: Security News

Pages