Latest CVE Feed
-
3.7
LOWCVE-2023-40160
Directory traversal vulnerability exists in Mailing List Search CGI (pmmls.exe) included in A.K.I Software's PMailServer/PMailServer2 products. If this vulnerability is exploited, a remote attacker may obtain arbitrary files on the server.... Read more
Affected Products :- Published: Mar. 18, 2024
- Modified: Mar. 24, 2025
-
3.7
LOWCVE-2021-2448
Vulnerability in the Oracle Financial Services Crime and Compliance Investigation Hub product of Oracle Financial Services Applications (component: Reports). The supported version that is affected is 20.1.2. Difficult to exploit vulnerability allows high ... Read more
Affected Products : financial_services_crime_and_compliance_investigation_hub- Published: Jul. 21, 2021
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2012-3128
Unspecified vulnerability in Oracle SPARC T-Series Servers running System Firmware 8.2.0 and 8.1.4.e or earlier allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Integrated Lights Out Manager.... Read more
Affected Products : netra_sparc_t3-1 sparc_t3-1 sparc_t3-1b sparc_t3-4 netra_sparc_t3-1b sparc_t3-2 sparc_t4-1 sparc_t4-1b sparc_t4-2 sparc_t4-4 +4 more products- Published: Jul. 17, 2012
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2024-9654
The Easy Digital Downloads plugin for WordPress is vulnerable to Improper Authorization in versions 3.1 through 3.3.4. This is due to a lack of sufficient validation checks within the 'verify_guest_email' function to ensure the requesting user is the inte... Read more
Affected Products : easy_digital_downloads- Published: Dec. 17, 2024
- Modified: Feb. 07, 2025
-
3.7
LOWCVE-2023-49822
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in David Vongries Ultimate Dashboard allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Ultimate Dashboard: from n/a through 3.7.10.... Read more
Affected Products :- Published: Jun. 04, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2024-45453
Authentication Bypass by Spoofing vulnerability in Peter Hardy-vanDoorn Maintenance Redirect allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Maintenance Redirect: from n/a through 2.0.1.... Read more
Affected Products :- Published: Sep. 23, 2024
- Modified: Sep. 26, 2024
-
3.7
LOWCVE-2024-32708
Authentication Bypass by Spoofing vulnerability in helderk Maintenance Mode allows Functionality Bypass.This issue affects Maintenance Mode: from n/a through 3.0.1.... Read more
Affected Products : maintenance_mode- Published: May. 17, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2024-47869
Gradio is an open-source Python package designed for quick prototyping. This vulnerability involves a **timing attack** in the way Gradio compares hashes for the `analytics_dashboard` function. Since the comparison is not done in constant time, an attacke... Read more
Affected Products : gradio- Published: Oct. 10, 2024
- Modified: Oct. 17, 2024
-
3.7
LOWCVE-2023-3803
A vulnerability classified as problematic has been found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0. This affects an unknown part of the file /Service/ImageStationDataService.asmx of the component File Name Handler. The manipulation... Read more
Affected Products : flash_flood_disaster_monitoring_and_warning_system- Published: Jul. 21, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2020-2900
Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: Tools). Supported versions that are affected are 19.3.1 and 20.0.0. Difficult to exploit vulnerability allows low privileged attacker with network access via mult... Read more
Affected Products : graalvm- Published: Apr. 15, 2020
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2024-20955
Vulnerability in the Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Compiler). Supported versions that are affected are Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 2... Read more
- Published: Jan. 16, 2024
- Modified: Jun. 03, 2025
-
3.7
LOWCVE-2023-33855
Under certain conditions, RSA operations performed by IBM Common Cryptographic Architecture (CCA) 7.0.0 through 7.5.36 may exhibit non-constant-time behavior. This could allow a remote attacker to obtain sensitive information using a timing-based attack.... Read more
- Published: Mar. 26, 2024
- Modified: Jul. 25, 2025
-
3.7
LOWCVE-2004-2626
GUI overlay vulnerability in the Java API in Siemens S55 cellular phones allows remote attackers to send unauthorized SMS messages by overlaying a confirmation message with a malicious message.... Read more
Affected Products : s55- Published: Dec. 31, 2004
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2000-0799
inpview in InPerson in SGI IRIX 5.3 through IRIX 6.5.10 allows local users to gain privileges via a symlink attack on the .ilmpAAA temporary file.... Read more
Affected Products : irix- Published: Oct. 20, 2000
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2024-30132
HCL Nomad server on Domino did not configure certain HTTP Security headers by default which could allow an attacker to obtain sensitive information via unspecified vectors.... Read more
Affected Products : nomad_server_on_domino- Published: Oct. 01, 2024
- Modified: Oct. 29, 2024
-
3.7
LOWCVE-2023-33847
IBM TXSeries for Multiplatforms 8.1, 8.2, 9.1, CICS TX Standard, 11.1, CICS TX Advanced 10.1, and 11.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link ... Read more
Affected Products : linux_kernel aix hp-ux cics_tx txseries_for_multiplatform txseries_for_multiplatforms- Published: Jun. 08, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2022-34394
Dell OS10, version 10.5.3.4, contains an Improper Certificate Validation vulnerability in Support Assist. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to unauthorized access to limited switch configuration data. ... Read more
- Published: Sep. 28, 2022
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2023-37948
Jenkins Oracle Cloud Infrastructure Compute Plugin 1.0.16 and earlier does not validate SSH host keys when connecting OCI clouds, enabling man-in-the-middle attacks.... Read more
Affected Products : cloud_infrastructure_compute- Published: Jul. 12, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2001-1085
Lmail 2.7 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file.... Read more
Affected Products : lmail- Published: Jul. 05, 2001
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2004-1683
A race condition in crrtrap for QNX RTP 6.1 allows local users to gain privileges by modifying the PATH environment variable to reference a malicious io-graphics program before is executed by crrtrap.... Read more
Affected Products : rtos- Published: Sep. 13, 2004
- Modified: Apr. 03, 2025