Latest CVE Feed
-
4.0
MEDIUMCVE-2019-4112
IBM WebSphere eXtreme Scale 8.6 Admin Console allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 158105.... Read more
Affected Products : websphere_extreme_scale- Published: Sep. 30, 2019
- Modified: Nov. 21, 2024
-
4.0
MEDIUMCVE-2019-4161
IBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, and 1.0.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 158660.... Read more
Affected Products : security_information_queue- Published: Jun. 06, 2019
- Modified: Nov. 21, 2024
-
4.0
MEDIUMCVE-2002-2175
phpSquidPass before 0.2 uses an incomplete regular expression to find a matching username in its database, which allows remote authenticated attackers to effectively delete other usernames via a short username that matches the end of the targeted username... Read more
Affected Products : phpsquidpass- Published: Dec. 31, 2002
- Modified: Apr. 03, 2025
-
4.0
MEDIUMCVE-2019-4465
IBM Cloud Pak System 2.3 and 2.3.0.1 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 163774.... Read more
Affected Products : cloud_pak_system- Published: Dec. 03, 2019
- Modified: Nov. 21, 2024
-
4.0
MEDIUMCVE-2005-0253
Directory traversal vulnerability in index.php for BibORB 1.3.2, and possibly earlier versions, allows remote attackers to delete arbitrary files via a Delete action and .. (dot dot) sequences in the database_name parameter.... Read more
Affected Products : biborb- Published: May. 02, 2005
- Modified: Apr. 03, 2025
-
4.0
MEDIUMCVE-2019-4398
IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise 2.5 through 2.5.0.9 and 2.4 through 2.4.0.5 could allow a local user to obtain sensitive information from SessionManagement cookies. IBM X-Force ID: 162259.... Read more
- Published: Oct. 24, 2019
- Modified: Nov. 21, 2024
-
4.0
MEDIUMCVE-2008-1528
ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), allow remote authenticated users to obtain authentication data by making direct HTTP requests and then reading the HTML source, as demonstrated... Read more
- Published: Mar. 26, 2008
- Modified: Apr. 09, 2025
-
4.0
MEDIUMCVE-2008-1301
Absolute path traversal vulnerability in system/workplace/admin/workplace/logfileview/logfileViewSettings.jsp in Alkacon OpenCms 7.0.3 and 7.0.4 allows remote authenticated administrators to read arbitrary files via a full pathname in the filePath.0 param... Read more
Affected Products : opencms- Published: Mar. 12, 2008
- Modified: Apr. 09, 2025
-
4.0
MEDIUMCVE-2008-1263
The Linksys WRT54G router stores passwords and keys in cleartext in the Config.bin file, which might allow remote authenticated users to obtain sensitive information via an HTTP request for the top-level Config.bin URI.... Read more
- Published: Mar. 10, 2008
- Modified: Apr. 09, 2025
-
4.0
MEDIUMCVE-2025-20923
Improper access control in Galaxy Wearable prior to version 2.2.61.24112961 allows local attackers to launch arbitrary activity with Galaxy Wearable privilege.... Read more
Affected Products : galaxy_wearable- Published: Mar. 06, 2025
- Modified: Mar. 06, 2025
- Vuln Type: Authorization
-
4.0
MEDIUMCVE-2025-25765
MRCMS v3.1.2 was discovered to contain an arbitrary file write vulnerability via the component /file/save.do.... Read more
Affected Products : mrcms- Published: Feb. 21, 2025
- Modified: Mar. 28, 2025
- Vuln Type: Misconfiguration
-
4.0
MEDIUMCVE-2012-0712
The XML feature in IBM DB2 9.5 before FP9, 9.7 through FP5, and 9.8 through FP4 allows remote authenticated users to cause a denial of service (infinite loop) by calling the XMLPARSE function with a crafted string expression.... Read more
Affected Products : db2- Published: Mar. 20, 2012
- Modified: Apr. 11, 2025
-
4.0
MEDIUMCVE-2012-0115
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485... Read more
- Published: Jan. 18, 2012
- Modified: Apr. 11, 2025
-
4.0
MEDIUMCVE-2013-3805
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Prepared Statements.... Read more
- Published: Jul. 17, 2013
- Modified: Apr. 11, 2025
-
4.0
MEDIUMCVE-2007-0297
Unspecified vulnerability in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.47.11 and 8.48.06 has unknown impact and attack vectors in PeopleTools, aka PSE03.... Read more
- Published: Jan. 17, 2007
- Modified: Apr. 09, 2025
-
4.0
MEDIUMCVE-2013-2039
Directory traversal vulnerability in lib/files/view.php in ownCloud before 4.0.15, 4.5.x 4.5.11, and 5.x before 5.0.6 allows remote authenticated users to access arbitrary files via unspecified vectors.... Read more
- Published: Mar. 14, 2014
- Modified: Apr. 12, 2025
-
4.0
MEDIUMCVE-2014-1682
The API in Zabbix before 1.8.20rc1, 2.0.x before 2.0.11rc1, and 2.2.x before 2.2.2rc1 allows remote authenticated users to spoof arbitrary users via the user name in a user.login request.... Read more
- Published: May. 08, 2014
- Modified: Apr. 12, 2025
-
4.0
MEDIUMCVE-2007-4374
Babo Violent 2 2.08.00 does not validate the sender field of a chat message composed by a client, which allows remote authenticated users to spoof messages.... Read more
Affected Products : babo_violent- Published: Aug. 16, 2007
- Modified: Apr. 09, 2025
-
4.0
MEDIUMCVE-2012-1756
Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors.... Read more
- Published: Jul. 17, 2012
- Modified: Apr. 11, 2025
-
4.0
MEDIUMCVE-2013-3793
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.... Read more
- Published: Jul. 17, 2013
- Modified: Apr. 11, 2025