Latest CVE Feed
-
3.7
LOWCVE-2023-42010
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.2 could disclose sensitive information in the HTTP response using man in the middle techniques. IBM X-Force ID: 265507.... Read more
Affected Products : sterling_b2b_integrator- Published: Jul. 17, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2023-38872
An Insecure Direct Object Reference (IDOR) vulnerability in gugoan Economizzer commit 3730880 (April 2023) and v.0.9-beta1 allows any unauthenticated attacker to access cash book entry attachments of any other user, if they know the Id of the attachment.... Read more
- Published: Sep. 28, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2012-0105
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization 4.1 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Windows Guest Additions.... Read more
- Published: Jan. 18, 2012
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2024-1433
A vulnerability, which was classified as problematic, was found in KDE Plasma Workspace up to 5.93.0. This affects the function EventPluginsManager::enabledPlugins of the file components/calendar/eventpluginsmanager.cpp of the component Theme File Handler... Read more
Affected Products : plasma-workspace- Published: Feb. 11, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2012-1720
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier, when running on Solaris, allows local users to affect confident... Read more
- Published: Jun. 16, 2012
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2011-1658
ld.so in the GNU C Library (aka glibc or libc6) 2.13 and earlier expands the $ORIGIN dynamic string token when RPATH is composed entirely of this token, which might allow local users to gain privileges by creating a hard link in an arbitrary directory to ... Read more
Affected Products : glibc- Published: Apr. 08, 2011
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2023-33849
IBM TXSeries for Multiplatforms 8.1, 8.2, 9.1, CICS TX Standard, 11.1, CICS TX Advanced 10.1, and 11.1 could transmit sensitive information in query parameters that could be intercepted using man in the middle techniques. IBM X-Force ID: 257105.... Read more
- Published: Jun. 07, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2023-28322
An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the s... Read more
Affected Products : fedora curl macos h300s_firmware h500s_firmware h700s_firmware h410s_firmware clustered_data_ontap ontap_antivirus_connector h300s +3 more products- Published: May. 26, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2023-32251
A vulnerability has been identified in the Linux kernel's ksmbd component (kernel SMB/CIFS server). A security control designed to prevent dictionary attacks, which introduces a 5-second delay during session setup, can be bypassed through the use of async... Read more
Affected Products : linux_kernel- Published: Jul. 31, 2025
- Modified: Aug. 04, 2025
- Vuln Type: Authentication
-
3.7
LOWCVE-2016-1551
ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same s... Read more
- Published: Jan. 27, 2017
- Modified: Apr. 20, 2025
-
3.7
LOWCVE-2013-0219
System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3) removing a user home directory tree, allows local users to create, modify, or delete arbitrary files via a symlink attack on another user's files.... Read more
- Published: Feb. 24, 2013
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2021-42948
HotelDruid Hotel Management Software v3.0.3 and below was discovered to have exposed session tokens in multiple links via GET parameters, allowing attackers to access user session id's.... Read more
Affected Products : hoteldruid- Published: Sep. 16, 2022
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2011-1758
The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows loca... Read more
Affected Products : sssd- Published: May. 26, 2011
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2005-4667
Buffer overflow in UnZip 5.50 and earlier allows user-assisted attackers to execute arbitrary code via a long filename command line argument. NOTE: since the overflow occurs in a non-setuid program, there are not many scenarios under which it poses a vul... Read more
Affected Products : unzip- Published: Dec. 31, 2005
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2011-0839
Unspecified vulnerability in Oracle Solaris 9, 10, and 11 Express allows local users to affect availability, related to LOFS.... Read more
- Published: Apr. 20, 2011
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2025-53492
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - MintyDocs Extension allows Stored XSS.This issue affects Mediawiki - MintyDocs Extension: from 1.43.X before 1.43... Read more
Affected Products :- Published: Jul. 02, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Cross-Site Scripting
-
3.7
LOWCVE-2024-46665
An insertion of sensitive information into sent data vulnerability [CWE-201] in FortiOS 7.6.0, 7.4.0 through 7.4.4 may allow an attacker in a man-in-the-middle position to retrieve the RADIUS accounting server shared secret via intercepting accounting-req... Read more
Affected Products : fortios- Published: Jan. 14, 2025
- Modified: Jan. 31, 2025
- Vuln Type: Information Disclosure
-
3.7
LOWCVE-2025-24430
Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could result in a security feature bypass. An attacker could exploit this race... Read more
- Published: Feb. 11, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Race Condition
-
3.7
LOWCVE-2025-24432
Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could result in a security feature bypass. An attacker could exploit this race... Read more
- Published: Feb. 11, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Race Condition
-
3.7
LOWCVE-2025-49005
Next.js is a React framework for building full-stack web applications. In Next.js App Router from 15.3.0 to before 15.3.3 and Vercel CLI from 41.4.1 to 42.2.0, a cache poisoning vulnerability was found. The issue allowed page requests for HTML content to ... Read more
- Published: Jul. 03, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Misconfiguration