Latest CVE Feed
-
3.7
LOWCVE-2006-1542
Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a "stack overflow," and possibly gain privileges, by running a script from a current working directory that has... Read more
Affected Products : python- Published: Mar. 30, 2006
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2016-0701
The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by m... Read more
Affected Products : openssl- Published: Feb. 15, 2016
- Modified: Apr. 12, 2025
-
3.7
LOWCVE-2016-0671
Unspecified vulnerability in the Oracle HTTP Server component in Oracle Fusion Middleware 12.1.2.0 allows remote attackers to affect confidentiality via vectors related to OSSL Module.... Read more
Affected Products : http_server- Published: Apr. 21, 2016
- Modified: Apr. 12, 2025
-
3.7
LOWCVE-2009-0415
Untrusted search path vulnerability in trickle 1.07 allows local users to execute arbitrary code via a Trojan horse trickle-overload.so in the current working directory, which is referenced in the LD_PRELOAD path.... Read more
Affected Products : trickle- Published: Feb. 03, 2009
- Modified: Apr. 09, 2025
-
3.7
LOWCVE-2015-0121
IBM Rational Requirements Composer 3.0 through 3.0.1.6 and 4.0 through 4.0.7 and Rational DOORS Next Generation (RDNG) 4.0 through 4.0.7 and 5.0 through 5.0.2, when LTPA single sign on is used with WebSphere Application Server, do not terminate a Requirem... Read more
- Published: May. 30, 2015
- Modified: Apr. 12, 2025
-
3.7
LOWCVE-2024-4063
A vulnerability was found in EZVIZ CS-C6-21WFR-8 5.2.7 Build 170628. It has been classified as problematic. This affects an unknown part of the component Davinci Application. The manipulation leads to improper certificate validation. It is possible to ini... Read more
Affected Products :- Published: Apr. 23, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2021-20455
IBM Cognos Controller 11.0.0 through 11.0.1 and IBM Controller 11.1.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks again... Read more
- Published: Jan. 07, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Information Disclosure
-
3.7
LOWCVE-2024-3302
There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10... Read more
- Published: Apr. 16, 2024
- Modified: Apr. 01, 2025
-
3.7
LOWCVE-2012-0032
Red Hat JBoss Operations Network (JON) before 3.0.1 uses 0777 permissions for the root directory when installing a remote client, which allows local users to read or modify subdirectories and files within the root directory, as demonstrated by obtaining J... Read more
Affected Products : jboss_operations_network- Published: Apr. 01, 2014
- Modified: Apr. 12, 2025
-
3.7
LOWCVE-2024-21144
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23; Oracle GraalVM Enterprise Edition: 20.3.14 and... Read more
- Published: Jul. 16, 2024
- Modified: Dec. 16, 2024
-
3.7
LOWCVE-2012-4572
Red Hat JBoss Enterprise Application Platform (EAP) before 6.1.0 and JBoss Portal before 6.1.0 does not load the implementation of a custom authorization module for a new application when an implementation is already loaded and the modules share class nam... Read more
- Published: Oct. 28, 2013
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2005-0953
Race condition in bzip2 1.0.2 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by bzip2 after the decompression is complete.... Read more
Affected Products : bzip2- Published: May. 02, 2005
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2010-1161
Race condition in GNU nano before 2.2.4, when run by root to edit a file that is not owned by root, allows local user-assisted attackers to change the ownership of arbitrary files via vectors related to the creation of backup files.... Read more
Affected Products : nano- Published: Apr. 16, 2010
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2024-21671
The vantage6 technology enables to manage and deploy privacy enhancing technologies like Federated Learning (FL) and Multi-Party Computation (MPC). It is possible to find out usernames from the response time of login requests. This could aid attackers in... Read more
Affected Products : vantage6- Published: Jan. 30, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2006-1174
useradd in shadow-utils before 4.0.3, and possibly other versions before 4.0.8, does not provide a required argument to the open function when creating a new user mailbox, which causes the mailbox to be created with unpredictable permissions and possibly ... Read more
Affected Products : shadow- Published: May. 28, 2006
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2013-1959
kernel/user_namespace.c in the Linux kernel before 3.8.9 does not have appropriate capability requirements for the uid_map and gid_map files, which allows local users to gain privileges by opening a file within an unprivileged process and then modifying t... Read more
Affected Products : linux_kernel- Published: May. 03, 2013
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2013-0219
System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3) removing a user home directory tree, allows local users to create, modify, or delete arbitrary files via a symlink attack on another user's files.... Read more
- Published: Feb. 24, 2013
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2006-1335
gnome screensaver before 2.14, when running on an X server with AllowDeactivateGrabs and AllowClosedownGrabs enabled, allows attackers with physical access to cause the screensaver to crash and access the session via the Ctl+Alt+Keypad-Multiply keyboard s... Read more
Affected Products : screensaver- Published: Mar. 21, 2006
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2025-51586
An issue was discoverd in file controllers/admin/AdminLoginController.php in PrestaShop before 8.2.1 allowing attackers to gain sensitive information via the reset password feature.... Read more
Affected Products : prestashop- Published: Sep. 08, 2025
- Modified: Sep. 12, 2025
- Vuln Type: Information Disclosure
-
3.7
LOWCVE-2006-1198
Comvigo IM Lock 2006 uses a simple substitution cipher to encrypt a password stored in the msnvs\prc registry value, for which all users have Read permission, which allows local users to bypass the product's blocking functionality by decrypting the passwo... Read more
Affected Products : im_lock- Published: Mar. 14, 2006
- Modified: Apr. 03, 2025