Latest CVE Feed
-
3.7
LOWCVE-2023-41306
Vulnerability of mutex management in the bone voice ID trusted application (TA) module. Successful exploitation of this vulnerability may cause the bone voice ID feature to be unavailable.... Read more
- Published: Sep. 27, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2023-26084
The armv8_dec_aes_gcm_full() API of Arm AArch64cryptolib before 86065c6 fails to the verify the authentication tag of AES-GCM protected data, leading to a man-in-the-middle attack. This occurs because of an improperly initialized variable.... Read more
Affected Products : aarch64cryptolib- Published: Mar. 15, 2023
- Modified: Feb. 27, 2025
-
3.7
LOWCVE-2023-31124
c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android. This will downgrade to using rand() as a fallback which could a... Read more
- Published: May. 25, 2023
- Modified: Feb. 13, 2025
-
3.7
LOWCVE-2000-1096
crontab by Paul Vixie uses predictable file names for a temporary file and does not properly ensure that the file is owned by the user executing the crontab -e command, which allows local users with write access to the crontab spool directory to execute a... Read more
Affected Products : vixie_cron- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2024-31265
Cross-Site Request Forgery (CSRF) vulnerability in SumoMe Sumo.This issue affects Sumo: from n/a through 1.34. ... Read more
Affected Products :- Published: Apr. 12, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2024-2355
A vulnerability has been found in keerti1924 Secret-Coder-PHP-Project 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /secret_coder.sql. The manipulation leads to inclusion of sensitive information... Read more
Affected Products : secret-coder-php-project- Published: Mar. 10, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2024-3689
A vulnerability classified as problematic has been found in Zhejiang Land Zongheng Network Technology O2OA up to 20240403. Affected is an unknown function of the file /x_portal_assemble_surface/jaxrs/portal/list?v=8.2.3-4-43f4fe3. The manipulation leads t... Read more
Affected Products :- Published: Apr. 12, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2000-0409
Netscape 4.73 and earlier follows symlinks when it imports a new certificate, which allows local users to overwrite files of the user importing the certificate.... Read more
Affected Products : communicator- Published: May. 10, 2000
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2004-2643
Directory traversal vulnerability in Microsoft cabarc allows remote attackers to overwrite files via "../" sequences in file names in a CAB archive.... Read more
Affected Products : cabarc- Published: Dec. 31, 2004
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2025-23165
In Node.js, the `ReadFileUtf8` internal binding leaks memory due to a corrupted pointer in `uv_fs_s.file`: a UTF-16 path buffer is allocated but subsequently overwritten when the file descriptor is set. This results in an unrecoverable memory leak on ever... Read more
Affected Products : node.js- Published: May. 19, 2025
- Modified: May. 19, 2025
- Vuln Type: Memory Corruption
-
3.7
LOWCVE-2022-2583
A race condition can cause incorrect HTTP request routing.... Read more
Affected Products : gobase- Published: Dec. 27, 2022
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2022-45433
Some Dahua software products have a vulnerability of unauthenticated traceroute host from remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could get the tr... Read more
- Published: Dec. 27, 2022
- Modified: Apr. 14, 2025
-
3.7
LOWCVE-2024-43944
Incorrect Authorization vulnerability in Yassine Idrissi Maintenance & Coming Soon Redirect Animation allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Maintenance & Coming Soon Redirect Animation: from n/a through 2.1.3.... Read more
Affected Products :- Published: Aug. 29, 2024
- Modified: Aug. 30, 2024
-
3.7
LOWCVE-2010-0014
System Security Services Daemon (SSSD) before 1.0.1, when the krb5 auth_provider is configured but the KDC is unreachable, allows physically proximate attackers to authenticate, via an arbitrary password, to the screen-locking program on a workstation tha... Read more
Affected Products : sssd- Published: Jan. 14, 2010
- Modified: Apr. 09, 2025
-
3.7
LOWCVE-2007-0472
Multiple race conditions in Smb4K before 0.8.0 allow local users to (1) modify arbitrary files via unspecified manipulations of Smb4K's lock file, which is not properly handled by the remove_lock_file function in core/smb4kfileio.cpp, and (2) add lines to... Read more
Affected Products : smb4k- Published: Feb. 03, 2007
- Modified: Apr. 09, 2025
-
3.7
LOWCVE-2007-0235
Stack-based buffer overflow in the glibtop_get_proc_map_s function in libgtop before 2.14.6 (libgtop2) allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a process with a long filename that is mapped in its add... Read more
Affected Products : libgtop- Published: Jan. 16, 2007
- Modified: Apr. 09, 2025
-
3.7
LOWCVE-2015-4834
Unspecified vulnerability in Oracle Sun Solaris 11.2 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Utility/Zones.... Read more
Affected Products : solaris- Published: Oct. 21, 2015
- Modified: Apr. 12, 2025
-
3.7
LOWCVE-2004-1465
Multiple buffer overflows in WinZip 9.0 and earlier may allow attackers to execute arbitrary code via multiple vectors, including the command line.... Read more
Affected Products : winzip- Published: Dec. 31, 2004
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2013-5147
Passcode Lock in Apple iOS before 7 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement by leveraging a race condition involving phone calls and ejection of a SIM card.... Read more
Affected Products : iphone_os- Published: Sep. 19, 2013
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2010-4450
Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Solaris and Linux; 5.0 Update 27 and earlier for Solaris and Linux; and 1.4.2_29 and earlier for Solaris and Linux allows l... Read more
- Published: Feb. 17, 2011
- Modified: Apr. 11, 2025