Latest CVE Feed
-
3.7
LOWCVE-2024-10977
Client use of server error message in PostgreSQL allows a server not trusted under current SSL or GSS settings to furnish arbitrary non-NUL bytes to the libpq application. For example, a man-in-the-middle attacker could send a long error message that a h... Read more
Affected Products : postgresql- Published: Nov. 14, 2024
- Modified: Feb. 20, 2025
-
3.7
LOWCVE-2025-48946
liboqs is a C-language cryptographic library that provides implementations of post-quantum cryptography algorithms. liboqs prior to version 0.13.0 supports the HQC algorithm, an algorithm with a theoretical design flaw which leads to large numbers of malf... Read more
Affected Products : liboqs- Published: May. 30, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Cryptography
-
3.7
LOWCVE-2025-3360
A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.... Read more
Affected Products : glib- Published: Apr. 07, 2025
- Modified: Apr. 14, 2025
- Vuln Type: Memory Corruption
-
3.7
LOWCVE-2025-42988
Under certain conditions, SAP Business Objects Business Intelligence Platform allows an unauthenticated attacker to enumerate HTTP endpoints in the internal network by specially crafting HTTP requests. This disclosure of information could further enable t... Read more
Affected Products :- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Information Disclosure
-
3.7
LOWCVE-2024-10106
A buffer overflow vulnerability in the packet handoff plugin allows an attacker to overwrite memory outside the plugin's buffer.... Read more
- Published: Jan. 09, 2025
- Modified: Jan. 09, 2025
- Vuln Type: Memory Corruption
-
3.7
LOWCVE-2008-0883
acroread in Adobe Acrobat Reader 8.1.2 allows local users to overwrite arbitrary files via a symlink attack on temporary files related to SSL certificate handling.... Read more
- Published: Mar. 06, 2008
- Modified: Apr. 09, 2025
-
3.7
LOWCVE-2021-43980
The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18... Read more
- Published: Sep. 28, 2022
- Modified: May. 21, 2025
-
3.7
LOWCVE-2021-36368
An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user c... Read more
- Published: Mar. 13, 2022
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2024-34079
octo-sts is a GitHub App that acts like a Security Token Service (STS) for the Github API. This vulnerability can spike the resource utilization of the STS service, and combined with a significant traffic volume could potentially lead to a denial of servi... Read more
Affected Products :- Published: May. 14, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2015-1841
The Web Admin interface in Red Hat Enterprise Virtualization Manager (RHEV-M) allows local users to bypass the timeout function by selecting a VM in the VM grid view.... Read more
Affected Products : enterprise_virtualization- Published: Sep. 08, 2015
- Modified: Apr. 12, 2025
-
3.7
LOWCVE-2013-7347
Luci in Red Hat Conga does not properly enforce the user session timeout, which might allow attackers to gain access to the session by reading the __ac session cookie. NOTE: this issue has been SPLIT due to different vulnerability types. Use CVE-2012-335... Read more
- Published: Mar. 31, 2014
- Modified: Apr. 12, 2025
-
3.7
LOWCVE-2013-1959
kernel/user_namespace.c in the Linux kernel before 3.8.9 does not have appropriate capability requirements for the uid_map and gid_map files, which allows local users to gain privileges by opening a file within an unprivileged process and then modifying t... Read more
Affected Products : linux_kernel- Published: May. 03, 2013
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2014-0476
The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.... Read more
- Published: Oct. 25, 2014
- Modified: Apr. 12, 2025
-
3.7
LOWCVE-2024-4596
A vulnerability was found in Kimai up to 2.15.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Session Handler. The manipulation of the argument PHPSESSIONID leads to information disclosure. The attack... Read more
Affected Products : kimai- Published: May. 07, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2011-2300
Unspecified vulnerability in Oracle VM VirtualBox 3.0, 3.1, 3.2, and 4.0 through 4.0.8 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Guest Additions for Windows.... Read more
Affected Products : vm_virtualbox- Published: Jul. 21, 2011
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2012-0081
Unspecified vulnerability in Oracle GlassFish Enterprise Server 3.1.1 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Administration.... Read more
Affected Products : glassfish_server- Published: Jan. 18, 2012
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2005-1727
Apple Mac OS X 10.4.x up to 10.4.1 sets insecure world- and group-writable permissions for the (1) system cache folder and (2) Dashboard system widgets, which allows local users to conduct unauthorized file operations via "file race conditions."... Read more
Affected Products : mac_os_x_server- Published: Jun. 08, 2005
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2024-30114
Insufficient sanitization in HCL Leap allows client-side script injection in the authoring environment.... Read more
Affected Products :- Published: Apr. 24, 2025
- Modified: Apr. 29, 2025
- Vuln Type: Cross-Site Scripting
-
3.7
LOWCVE-2023-41263
An issue was discovered in Plixer Scrutinizer before 19.3.1. It exposes debug logs to unauthenticated users at the /debug/ URL path. With knowledge of valid IP addresses and source types, an unauthenticated attacker can download debug logs containing appl... Read more
Affected Products : scrutinizer- Published: Oct. 12, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2025-1152
A vulnerability classified as problematic has been found in GNU Binutils 2.43. Affected is the function xstrdup of the file xstrdup.c of the component ld. The manipulation leads to memory leak. It is possible to launch the attack remotely. The complexity ... Read more
Affected Products : binutils- Published: Feb. 10, 2025
- Modified: Feb. 10, 2025
- Vuln Type: Memory Corruption