Filter and search through 887 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2018-8440 | An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). | 7.8 | 728 | Neutral | Yes |
| Yes |
| CVE-2018-8414 | A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths. | 8.8 | 927 | Neutral | Yes | Yes |
| CVE-2018-8373 | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. | 7.5 | 804 | Neutral | Yes | Yes |
| CVE-2018-8174 | A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code E... | 7.5 | 804 | Viral | Yes | Yes |
| CVE-2018-8120 | A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. | 7.0 | 605 | Trending | Yes | Yes |
| CVE-2018-5002 | Adobe Flash Player have a stack-based buffer overflow vulnerability that could lead to remote code execution. | 7.8 | 857 | Neutral | Yes | Yes |
| CVE-2018-4990 | Adobe Acrobat and Reader have a double free vulnerability that could lead to remote code execution. | 8.8 | 863 | Neutral | Yes | Yes |
| CVE-2018-4878 | Adobe Flash Player contains a use-after-free vulnerability that could allow for code execution. | 7.8 | 857 | Viral | Yes | Yes |
| CVE-2018-19207 | The Van Ons WP GDPR Compliance (aka wp-gdpr-compliance) plugin before 1.4.3 for WordPress allows remote attackers to execute arbitrary code because $w... | 0.0 | 0 | Low | Yes | Yes |
| CVE-2018-18956 | The ProcessMimeEntity function in util-decode-mime.c in Suricata 4.x before 4.0.6 allows remote attackers to cause a denial of service (segfault and d... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2018-15982 | Adobe Flash Player com.adobe.tvsdk.mediacore.metadata Use After Free Vulnerability | 7.8 | 857 | Rising | Yes | Yes |
| CVE-2018-15454 | A vulnerability in the Session Initiation Protocol (SIP) inspection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Thr... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2018-14847 | MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary f... | 9.1 | 987 | Viral | Yes | Yes |
| CVE-2018-10657 | Matrix Synapse before 0.28.1 is prone to a denial of service flaw where malicious events injected with depth = 2<sup>63</sup> - 1 render rooms unusabl... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2018-10468 | The transferFrom function of a smart contract implementation for Useless Ethereum Token (UET), an Ethereum ERC20 token, allows attackers to steal asse... | 0.0 | 0 | Neutral | Yes | No |
| CVE-2018-10376 | An integer overflow in the transferProxy function of a smart contract implementation for SmartMesh (aka SMT), an Ethereum ERC20 token, allows attacker... | 0.0 | 0 | Neutral | Yes | No |
| CVE-2018-10299 | An integer overflow in the batchTransfer function of a smart contract implementation for Beauty Ecosystem Coin (BEC), the Ethereum ERC20 token used in... | 0.0 | 0 | Neutral | Yes | No |
| CVE-2018-0802 | Microsoft Office contains a memory corruption vulnerability due to the way objects are handled in memory. Successful exploitation allows for remote co... | 7.8 | 857 | Neutral | Yes | Yes |
| CVE-2017-8759 | Microsoft .NET Framework contains a remote code execution vulnerability when processing untrusted input that could allow an attacker to take control o... | 7.8 | 891 | Viral | Yes | Yes |
| CVE-2017-8543 | Microsoft Windows allows an attacker to take control of the affected system when Windows Search fails to handle objects in memory. | 9.8 | 906 | Neutral | Yes | Yes |