Latest CVE Feed
-
3.7
LOWCVE-2024-1433
A vulnerability, which was classified as problematic, was found in KDE Plasma Workspace up to 5.93.0. This affects the function EventPluginsManager::enabledPlugins of the file components/calendar/eventpluginsmanager.cpp of the component Theme File Handler... Read more
Affected Products : plasma-workspace- Published: Feb. 11, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2006-1542
Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a "stack overflow," and possibly gain privileges, by running a script from a current working directory that has... Read more
Affected Products : python- Published: Mar. 30, 2006
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2025-48015
Failed login response could be different depending on whether the username was local or central.... Read more
Affected Products :- Published: May. 20, 2025
- Modified: May. 21, 2025
- Vuln Type: Information Disclosure
-
3.7
LOWCVE-2010-0014
System Security Services Daemon (SSSD) before 1.0.1, when the krb5 auth_provider is configured but the KDC is unreachable, allows physically proximate attackers to authenticate, via an arbitrary password, to the screen-locking program on a workstation tha... Read more
Affected Products : sssd- Published: Jan. 14, 2010
- Modified: Apr. 09, 2025
-
3.7
LOWCVE-2005-1751
Race condition in shtool 2.0.1 and earlier allows local users to create or modify arbitrary files via a symlink attack on the .shtool.$$ temporary file, a different vulnerability than CVE-2005-1759.... Read more
Affected Products : shtool- Published: May. 25, 2005
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2005-4667
Buffer overflow in UnZip 5.50 and earlier allows user-assisted attackers to execute arbitrary code via a long filename command line argument. NOTE: since the overflow occurs in a non-setuid program, there are not many scenarios under which it poses a vul... Read more
Affected Products : unzip- Published: Dec. 31, 2005
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2025-32789
EspoCRM is an Open Source Customer Relationship Management software. Prior to version 9.0.7, users can be sorted by their password hash. This flaw allows an attacker to make assumptions about the hash values of other users stored in the password column of... Read more
Affected Products : espocrm- Published: Apr. 16, 2025
- Modified: Jun. 18, 2025
- Vuln Type: Information Disclosure
-
3.7
LOWCVE-2009-4411
The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or dire... Read more
Affected Products : acl- Published: Dec. 24, 2009
- Modified: Apr. 09, 2025
-
3.7
LOWCVE-2024-58249
In wxWidgets before 3.2.7, a crash can be triggered in wxWidgets apps when connections are refused in wxWebRequestCURL.... Read more
Affected Products : wxwidgets- Published: Apr. 16, 2025
- Modified: Apr. 17, 2025
- Vuln Type: Denial of Service
-
3.7
LOWCVE-2006-4886
The VirusScan On-Access Scan component in McAfee VirusScan Enterprise 7.1.0 and Scan Engine 4.4.00 allows local privileged users to bypass security restrictions and disable the On-Access Scan option by opening the program via the task bar and quickly clic... Read more
- Published: Sep. 19, 2006
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2007-0775
Multiple unspecified vulnerabilities in the layout engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allow remote attackers to cause a denial of service (crash) and potentially execut... Read more
- Published: Feb. 26, 2007
- Modified: Apr. 09, 2025
-
3.7
LOWCVE-2008-0883
acroread in Adobe Acrobat Reader 8.1.2 allows local users to overwrite arbitrary files via a symlink attack on temporary files related to SSL certificate handling.... Read more
- Published: Mar. 06, 2008
- Modified: Apr. 09, 2025
-
3.7
LOWCVE-2021-41136
Puma is a HTTP 1.1 server for Ruby/Rack applications. Prior to versions 5.5.1 and 4.3.9, using `puma` with a proxy which forwards HTTP header values which contain the LF character could allow HTTP request smugggling. A client could smuggle a request throu... Read more
- Published: Oct. 12, 2021
- Modified: May. 27, 2025
-
3.7
LOWCVE-2001-0627
vi as included with SCO OpenServer 5.0 - 5.0.6 allows a local attacker to overwrite arbitrary files via a symlink attack.... Read more
Affected Products : openserver- Published: Aug. 22, 2001
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2012-0133
HP ProCurve 5400 zl switches with certain serial numbers include a compact flash card that contains an unspecified virus, which might allow user-assisted remote attackers to execute arbitrary code on a PC by leveraging manual transfer of this card.... Read more
Affected Products : procurve_switch_5400zl procurve_switch_5400zl_management_module procurve_switch_5406-44g-poe\+-4sfpzl procurve_switch_5406-48gzl procurve_switch_5406zl-44g-poe\+\/2xg_sfp\+_v2 procurve_switch_5406zl-44g-poe\+\/4g_sfp\+_v2 procurve_switch_5412-92g-poe\+-4sfpzl procurve_switch_5412-96gzl procurve_switch_5412zl-92g-poe\+\/4g_sfp\+_v2 procurve_switch_5412zl-92gg-poe\+\/2xg_sfp\+_v2 +4 more products- Published: Apr. 12, 2012
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2006-1174
useradd in shadow-utils before 4.0.3, and possibly other versions before 4.0.8, does not provide a required argument to the open function when creating a new user mailbox, which causes the mailbox to be created with unpredictable permissions and possibly ... Read more
Affected Products : shadow- Published: May. 28, 2006
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2025-42988
Under certain conditions, SAP Business Objects Business Intelligence Platform allows an unauthenticated attacker to enumerate HTTP endpoints in the internal network by specially crafting HTTP requests. This disclosure of information could further enable t... Read more
Affected Products :- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Information Disclosure
-
3.7
LOWCVE-2025-8556
A flaw was found in CIRCL's implementation of the FourQ elliptic curve. This vulnerability allows an attacker to compromise session security via low-order point injection and incorrect point validation during Diffie-Hellman key exchange.... Read more
Affected Products : circl- Published: Aug. 06, 2025
- Modified: Aug. 06, 2025
- Vuln Type: Cryptography
-
3.7
LOWCVE-2025-54352
WordPress 3.5 through 6.8.2 allows remote attackers to guess titles of private and draft posts via pingback.ping XML-RPC requests. NOTE: the Supplier is not changing this behavior.... Read more
Affected Products : wordpress- Published: Jul. 21, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Information Disclosure
-
3.7
LOWCVE-2022-41914
Zulip is an open-source team collaboration tool. For organizations with System for Cross-domain Identity Management(SCIM) account management enabled, Zulip Server 5.0 through 5.6 checked the SCIM bearer token using a comparator that did not run in constan... Read more
- Published: Nov. 16, 2022
- Modified: Nov. 21, 2024