Latest CVE Feed
-
3.7
LOWCVE-2022-39399
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 a... Read more
Affected Products : fedora oncommand_insight oncommand_workflow_automation jdk jre e-series_santricity_os_controller e-series_santricity_storage_manager graalvm 7-mode_transition_tool zulu +5 more products- Published: Oct. 18, 2022
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2022-35252
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to a... Read more
Affected Products : debian_linux curl hci_management_node solidfire macos element_software h300s_firmware h500s_firmware h700s_firmware h410s_firmware +8 more products- Published: Sep. 23, 2022
- Modified: May. 05, 2025
-
3.7
LOWCVE-2014-0476
The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.... Read more
- Published: Oct. 25, 2014
- Modified: Apr. 12, 2025
-
3.7
LOWCVE-2006-1174
useradd in shadow-utils before 4.0.3, and possibly other versions before 4.0.8, does not provide a required argument to the open function when creating a new user mailbox, which causes the mailbox to be created with unpredictable permissions and possibly ... Read more
Affected Products : shadow- Published: May. 28, 2006
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2016-1551
ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same s... Read more
- Published: Jan. 27, 2017
- Modified: Apr. 20, 2025
-
3.7
LOWCVE-2024-31265
Cross-Site Request Forgery (CSRF) vulnerability in SumoMe Sumo.This issue affects Sumo: from n/a through 1.34. ... Read more
Affected Products :- Published: Apr. 12, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2024-3689
A vulnerability classified as problematic has been found in Zhejiang Land Zongheng Network Technology O2OA up to 20240403. Affected is an unknown function of the file /x_portal_assemble_surface/jaxrs/portal/list?v=8.2.3-4-43f4fe3. The manipulation leads t... Read more
Affected Products :- Published: Apr. 12, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2024-30110
HCL DRYiCE AEX product is impacted by lack of input validation vulnerability in a particular web application. A malicious script can be injected into a system which can cause the system to behave in unexpected ways.... Read more
Affected Products :- Published: Jun. 28, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2024-30109
HCL DRYiCE AEX is impacted by a lack of clickjacking protection in the AEX web application. An attacker can use multiple transparent or opaque layers to trick a user into clicking on a button or link on another page than the one intended.... Read more
Affected Products :- Published: Jun. 28, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2024-39302
BigBlueButton is an open-source virtual classroom designed to help teachers teach and learners learn. An attacker may be able to exploit the overly elevated file permissions in the `/usr/local/bigbluebutton/core/vendor/bundle/ruby/2.7.0/gems/resque-2.6.0`... Read more
Affected Products : bigbluebutton- Published: Jun. 28, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2005-4667
Buffer overflow in UnZip 5.50 and earlier allows user-assisted attackers to execute arbitrary code via a long filename command line argument. NOTE: since the overflow occurs in a non-setuid program, there are not many scenarios under which it poses a vul... Read more
Affected Products : unzip- Published: Dec. 31, 2005
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2025-32789
EspoCRM is an Open Source Customer Relationship Management software. Prior to version 9.0.7, users can be sorted by their password hash. This flaw allows an attacker to make assumptions about the hash values of other users stored in the password column of... Read more
Affected Products : espocrm- Published: Apr. 16, 2025
- Modified: Jun. 18, 2025
- Vuln Type: Information Disclosure
-
3.7
LOWCVE-2009-4411
The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or dire... Read more
Affected Products : acl- Published: Dec. 24, 2009
- Modified: Apr. 09, 2025
-
3.7
LOWCVE-2025-23165
In Node.js, the `ReadFileUtf8` internal binding leaks memory due to a corrupted pointer in `uv_fs_s.file`: a UTF-16 path buffer is allocated but subsequently overwritten when the file descriptor is set. This results in an unrecoverable memory leak on ever... Read more
Affected Products : node.js- Published: May. 19, 2025
- Modified: May. 19, 2025
- Vuln Type: Memory Corruption
-
3.7
LOWCVE-2023-26084
The armv8_dec_aes_gcm_full() API of Arm AArch64cryptolib before 86065c6 fails to the verify the authentication tag of AES-GCM protected data, leading to a man-in-the-middle attack. This occurs because of an improperly initialized variable.... Read more
Affected Products : aarch64cryptolib- Published: Mar. 15, 2023
- Modified: Feb. 27, 2025
-
3.7
LOWCVE-2023-21968
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 2... Read more
- Published: Apr. 18, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2000-0579
IRIX crontab creates temporary files with predictable file names and with the umask of the user, which could allow local users to modify another user's crontab file as it is being edited.... Read more
Affected Products : irix- Published: Jun. 21, 2000
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2000-0578
SGI MIPSPro compilers C, C++, F77 and F90 generate temporary files in /tmp with predictable file names, which could allow local users to insert malicious contents into these files as they are being compiled by another user.... Read more
Affected Products : mipspro_compilers- Published: Jun. 21, 2000
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2023-34401
Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. Inside profile folder there is a file, which is encoded with proprietary UD2 codec. Due to missed size checks in the enapsulate file, attacker can achieve Out-o... Read more
Affected Products : headunit_ntg6_mercedes-benz_user_experience- Published: Feb. 13, 2025
- Modified: Jun. 27, 2025
- Vuln Type: Memory Corruption
-
3.7
LOWCVE-2005-4268
Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.... Read more
Affected Products : cpio- Published: Dec. 15, 2005
- Modified: Apr. 03, 2025