Latest CVE Feed
-
3.7
LOWCVE-2000-1096
crontab by Paul Vixie uses predictable file names for a temporary file and does not properly ensure that the file is owned by the user executing the crontab -e command, which allows local users with write access to the crontab spool directory to execute a... Read more
Affected Products : vixie_cron- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2023-33855
Under certain conditions, RSA operations performed by IBM Common Cryptographic Architecture (CCA) 7.0.0 through 7.5.36 may exhibit non-constant-time behavior. This could allow a remote attacker to obtain sensitive information using a timing-based attack.... Read more
- Published: Mar. 26, 2024
- Modified: Jul. 25, 2025
-
3.7
LOWCVE-2024-45453
Authentication Bypass by Spoofing vulnerability in Peter Hardy-vanDoorn Maintenance Redirect allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Maintenance Redirect: from n/a through 2.0.1.... Read more
Affected Products :- Published: Sep. 23, 2024
- Modified: Sep. 26, 2024
-
3.7
LOWCVE-2024-20955
Vulnerability in the Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Compiler). Supported versions that are affected are Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 2... Read more
- Published: Jan. 16, 2024
- Modified: Jun. 03, 2025
-
3.7
LOWCVE-2024-32708
Authentication Bypass by Spoofing vulnerability in helderk Maintenance Mode allows Functionality Bypass.This issue affects Maintenance Mode: from n/a through 3.0.1.... Read more
Affected Products : maintenance_mode- Published: May. 17, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2020-2900
Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: Tools). Supported versions that are affected are 19.3.1 and 20.0.0. Difficult to exploit vulnerability allows low privileged attacker with network access via mult... Read more
Affected Products : graalvm- Published: Apr. 15, 2020
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2023-37948
Jenkins Oracle Cloud Infrastructure Compute Plugin 1.0.16 and earlier does not validate SSH host keys when connecting OCI clouds, enabling man-in-the-middle attacks.... Read more
Affected Products : cloud_infrastructure_compute- Published: Jul. 12, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2022-41914
Zulip is an open-source team collaboration tool. For organizations with System for Cross-domain Identity Management(SCIM) account management enabled, Zulip Server 5.0 through 5.6 checked the SCIM bearer token using a comparator that did not run in constan... Read more
- Published: Nov. 16, 2022
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2025-8515
A vulnerability was found in Intelbras InControl 2.21.60.9 and classified as problematic. This issue affects some unknown processing of the file /v1/operador/ of the component JSON Endpoint. The manipulation leads to information disclosure. The attack may... Read more
Affected Products : incontrol_web- Published: Aug. 04, 2025
- Modified: Aug. 21, 2025
- Vuln Type: Information Disclosure
-
3.7
LOWCVE-2024-47869
Gradio is an open-source Python package designed for quick prototyping. This vulnerability involves a **timing attack** in the way Gradio compares hashes for the `analytics_dashboard` function. Since the comparison is not done in constant time, an attacke... Read more
Affected Products : gradio- Published: Oct. 10, 2024
- Modified: Oct. 17, 2024
-
3.7
LOWCVE-2023-3803
A vulnerability classified as problematic has been found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0. This affects an unknown part of the file /Service/ImageStationDataService.asmx of the component File Name Handler. The manipulation... Read more
Affected Products : flash_flood_disaster_monitoring_and_warning_system- Published: Jul. 21, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2000-0799
inpview in InPerson in SGI IRIX 5.3 through IRIX 6.5.10 allows local users to gain privileges via a symlink attack on the .ilmpAAA temporary file.... Read more
Affected Products : irix- Published: Oct. 20, 2000
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2020-9009
The ShipStation.com plugin 1.1 and earlier for CS-Cart allows remote attackers to insert arbitrary information into the database (via action=shipnotify) because access to this endpoint is completely unchecked. The attacker must guess an order number.... Read more
Affected Products : shipstation- Published: Apr. 11, 2023
- Modified: Feb. 11, 2025
-
3.7
LOWCVE-2024-22139
Authentication Bypass by Spoofing vulnerability in Filipe Seabra WordPress Manutenção allows Functionality Bypass.This issue affects WordPress Manutenção: from n/a through 1.0.6.... Read more
Affected Products :- Published: May. 17, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2023-33847
IBM TXSeries for Multiplatforms 8.1, 8.2, 9.1, CICS TX Standard, 11.1, CICS TX Advanced 10.1, and 11.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link ... Read more
Affected Products : linux_kernel aix hp-ux cics_tx txseries_for_multiplatform txseries_for_multiplatforms- Published: Jun. 08, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2025-32943
The vulnerability allows any authenticated user to leak the contents of arbitrary “.m3u8” files from the PeerTube server due to a path traversal in the HLS endpoint.... Read more
Affected Products :- Published: Apr. 15, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Path Traversal
-
3.7
LOWCVE-2025-54352
WordPress 3.5 through 6.8.2 allows remote attackers to guess titles of private and draft posts via pingback.ping XML-RPC requests. NOTE: the Supplier is not changing this behavior.... Read more
Affected Products : wordpress- Published: Jul. 21, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Information Disclosure
-
3.7
LOWCVE-2024-10106
A buffer overflow vulnerability in the packet handoff plugin allows an attacker to overwrite memory outside the plugin's buffer.... Read more
- Published: Jan. 09, 2025
- Modified: Jan. 09, 2025
- Vuln Type: Memory Corruption
-
3.7
LOWCVE-2025-42988
Under certain conditions, SAP Business Objects Business Intelligence Platform allows an unauthenticated attacker to enumerate HTTP endpoints in the internal network by specially crafting HTTP requests. This disclosure of information could further enable t... Read more
Affected Products :- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Information Disclosure
-
3.7
LOWCVE-2011-1758
The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows loca... Read more
Affected Products : sssd- Published: May. 26, 2011
- Modified: Apr. 11, 2025