Latest CVE Feed
-
4.0
MEDIUMCVE-2010-4806
The authoring tool in IBM Web Content Manager (WCM) 6.1.5, and 7.0.0.1 before CF003, allows remote authenticated users to bypass intended access restrictions on draft creation by leveraging certain resource editor privileges.... Read more
Affected Products : web_content_manager- Published: May. 26, 2011
- Modified: Apr. 11, 2025
-
4.0
MEDIUMCVE-2004-2769
Cerberus FTP Server before 4.0.3.0 allows remote authenticated users to list hidden files, even when the "Display hidden files" option is enabled, via the (1) MLSD or (2) MLST commands.... Read more
Affected Products : ftp_server- Published: Jul. 02, 2010
- Modified: Apr. 11, 2025
-
4.0
MEDIUMCVE-2021-25342
Calling of non-existent provider in SMP sdk prior to version 3.0.9 allows unauthorized actions including denial of service attack by hijacking the provider.... Read more
- Published: Mar. 04, 2021
- Modified: Nov. 21, 2024
-
4.0
MEDIUMCVE-2021-24371
The Import feature of the RSVPMaker WordPress plugin before 8.7.3 (/wp-admin/tools.php?page=rsvpmaker_export_screen) takes an URL input and calls curl on it, without first validating it to ensure it's a remote one. As a result, a high privilege user could... Read more
Affected Products : rsvpmaker- Published: Aug. 02, 2021
- Modified: Nov. 21, 2024
-
4.0
MEDIUMCVE-2021-25364
A pendingIntent hijacking vulnerability in Secure Folder prior to SMR APR-2021 Release 1 allows unprivileged applications to access contact information.... Read more
- Published: Apr. 09, 2021
- Modified: Nov. 21, 2024
-
4.0
MEDIUMCVE-2008-5113
WordPress 2.6.3 relies on the REQUEST superglobal array in certain dangerous situations, which makes it easier for remote attackers to conduct delayed and persistent cross-site request forgery (CSRF) attacks via crafted cookies, as demonstrated by attacks... Read more
Affected Products : wordpress- Published: Nov. 17, 2008
- Modified: Apr. 09, 2025
-
4.0
MEDIUMCVE-2016-0690
Unspecified vulnerability in the RDBMS Security component in Oracle Database Server 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows local users to affect integrity via unknown vectors, a different vulnerability than CVE-2016-0691.... Read more
- Published: Apr. 21, 2016
- Modified: Apr. 12, 2025
-
4.0
MEDIUMCVE-2008-3990
Unspecified vulnerability in the Oracle OLAP component in Oracle Database 9.2.08, 9.2.0.8DV, and 10.1.0.5 allows remote authenticated users to affect availability, related to OLAPSYS.CWM2_OLAP_AW_AWUTIL, a different vulnerability than CVE-2008-3991.... Read more
- Published: Oct. 14, 2008
- Modified: Apr. 09, 2025
-
4.0
MEDIUMCVE-2007-6698
The BDB backend for slapd in OpenLDAP before 2.3.36 allows remote authenticated users to cause a denial of service (crash) via a potentially-successful modify operation with the NOOP control set to critical, possibly due to a double free vulnerability.... Read more
Affected Products : openldap- Published: Feb. 01, 2008
- Modified: Apr. 09, 2025
-
4.0
MEDIUMCVE-2014-1442
Directory traversal vulnerability in Core FTP Server 1.2 before build 515 allows remote authenticated users to determine the existence of arbitrary files via a /../ sequence in an XCRC command.... Read more
Affected Products : core_ftp- Published: May. 02, 2014
- Modified: Apr. 12, 2025
-
4.0
MEDIUMCVE-2014-0401
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors.... Read more
- Published: Jan. 15, 2014
- Modified: Apr. 11, 2025
-
4.0
MEDIUMCVE-2008-2608
Unspecified vulnerability in the Data Pump component in Oracle Database 10.1.0.5 and 10.2.0.3 has unknown impact and remote authenticated attack vectors related to SYS.KUPF$FILE_INT.... Read more
- Published: Jul. 15, 2008
- Modified: Apr. 09, 2025
-
3.9
LOWCVE-2025-1693
The MongoDB Shell may be susceptible to control character injection where an attacker with control over the database cluster contents can inject control characters into the shell output. This may result in the display of falsified messages that appear to ... Read more
Affected Products : mongosh- Published: Feb. 27, 2025
- Modified: Feb. 27, 2025
- Vuln Type: Injection
-
3.9
LOWCVE-2023-0654
Due to a misconfiguration, the WARP Mobile Client (< 6.29) for Android was susceptible to a tapjacking attack. In the event that an attacker built a malicious application and managed to install it on a victim's device, the attacker would be able to trick ... Read more
Affected Products : warp- Published: Aug. 29, 2023
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2021-22747
Improper Check for Unusual or Exceptional Conditions vulnerability exists in Triconex Model 3009 MP installed on Tricon V11.3.x systems that could cause module reset when TCM receives malformed TriStation packets while the write-protect keyswitch is in th... Read more
Affected Products : triconex_model_3009_mp_firmware tcm_4351b_firmware triconex_model_3009_mp tcm_4351b- Published: May. 26, 2021
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2022-39403
Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: Core Client). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MyS... Read more
- Published: Oct. 18, 2022
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2025-44964
A lack of SSL certificate validation in BlueStacks v5.20 allows attackers to execute a man-it-the-middle attack and obtain sensitive information.... Read more
Affected Products : bluestacks- Published: Aug. 05, 2025
- Modified: Aug. 14, 2025
- Vuln Type: Cryptography
-
3.9
LOWCVE-2025-53177
Permission bypass vulnerability in the calendar storage module Impact: Successful exploitation of this vulnerability may affect the schedule syncing function of watches.... Read more
- Published: Jul. 07, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Authorization
-
3.9
LOWCVE-2019-5296
Mate20 Huawei smartphones versions earlier than HMA-AL00C00B175 have an out-of-bounds read vulnerability. An attacker with a high permission runs some specific commands on the smartphone. Due to insufficient input verification, successful exploit may caus... Read more
- Published: Jun. 04, 2019
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2020-29443
ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.... Read more
- Published: Jan. 26, 2021
- Modified: Nov. 21, 2024