Latest CVE Feed
-
3.7
LOWCVE-2025-54999
OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, when using OpenBao's userpass auth method, user enumeration was possible due to timin... Read more
Affected Products : openbao- Published: Aug. 09, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Authentication
-
3.7
LOWCVE-2025-54787
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. There is a vulnerability in SuiteCRM version 7.14.6 which allows unauthenticated downloads of any file from the upload-directory, as long as it is na... Read more
Affected Products : suitecrm- Published: Aug. 07, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Authorization
-
3.7
LOWCVE-2025-31362
Use of hard-coded cryptographic key issue exists in BizRobo! all versions. Credentials inside robot files may be obtained if the encryption key is available. The vendor provides the workaround information and recommends to apply it to the deployment envi... Read more
Affected Products :- Published: Apr. 11, 2025
- Modified: Apr. 11, 2025
- Vuln Type: Cryptography
-
3.7
LOWCVE-2025-54352
WordPress 3.5 through 6.8.2 allows remote attackers to guess titles of private and draft posts via pingback.ping XML-RPC requests. NOTE: the Supplier is not changing this behavior.... Read more
Affected Products : wordpress- Published: Jul. 21, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Information Disclosure
-
3.7
LOWCVE-2005-0988
Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after t... Read more
Affected Products : enterprise_linux enterprise_linux_desktop freebsd ubuntu_linux linux_advanced_workstation linux secure_linux turbolinux_appliance_server turbolinux_desktop turbolinux_home +3 more products- Published: May. 02, 2005
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2008-4229
Race condition in the Passcode Lock feature in Apple iPhone OS 2.0 through 2.1 and iPhone OS for iPod touch 2.0 through 2.1 allows physically proximate attackers to remove the lock and launch arbitrary applications by restoring the device from a backup.... Read more
- Published: Nov. 25, 2008
- Modified: Apr. 09, 2025
-
3.7
LOWCVE-2025-49005
Next.js is a React framework for building full-stack web applications. In Next.js App Router from 15.3.0 to before 15.3.3 and Vercel CLI from 41.4.1 to 42.2.0, a cache poisoning vulnerability was found. The issue allowed page requests for HTML content to ... Read more
- Published: Jul. 03, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Misconfiguration
-
3.7
LOWCVE-2024-22403
Nextcloud server is a self hosted personal cloud system. In affected versions OAuth codes did not expire. When an attacker would get access to an authorization code they could authenticate at any time using the code. As of version 28.0.0 OAuth codes are i... Read more
- Published: Jan. 18, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2012-5659
Untrusted search path vulnerability in plugins/abrt-action-install-debuginfo-to-abrt-cache.c in Automatic Bug Reporting Tool (ABRT) 2.0.9 and earlier allows local users to load and execute arbitrary Python modules by modifying the PYTHONPATH environment v... Read more
Affected Products : automatic_bug_reporting_tool- Published: Mar. 12, 2013
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2013-1959
kernel/user_namespace.c in the Linux kernel before 3.8.9 does not have appropriate capability requirements for the uid_map and gid_map files, which allows local users to gain privileges by opening a file within an unprivileged process and then modifying t... Read more
Affected Products : linux_kernel- Published: May. 03, 2013
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2013-0404
Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Kernel/Boot.... Read more
- Published: Apr. 17, 2013
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2011-0812
Unspecified vulnerability in the Solaris component in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect availability via unknown vectors related to Kernel.... Read more
- Published: Apr. 20, 2011
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2023-38546
This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for s... Read more
- Published: Oct. 18, 2023
- Modified: Feb. 13, 2025
-
3.7
LOWCVE-2011-4316
Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, in certain unspecified conditions, does not lock the desktop screen between SPICE sessions, which allows local users with access to a virtual machine to gain access to other users' desktop ses... Read more
Affected Products : enterprise_virtualization_manager- Published: Jan. 04, 2013
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2023-3803
A vulnerability classified as problematic has been found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0. This affects an unknown part of the file /Service/ImageStationDataService.asmx of the component File Name Handler. The manipulation... Read more
Affected Products : flash_flood_disaster_monitoring_and_warning_system- Published: Jul. 21, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2025-4056
A flaw was found in GLib. A denial of service on Windows platforms may occur if an application attempts to spawn a program using long command lines.... Read more
- Published: Jul. 28, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Denial of Service
-
3.7
LOWCVE-2025-32471
The device’s passwords have not been adequately salted, making them vulnerable to password extraction attacks.... Read more
Affected Products :- Published: Apr. 28, 2025
- Modified: Apr. 29, 2025
- Vuln Type: Cryptography
-
3.7
LOWCVE-2025-8204
A vulnerability classified as problematic was found in Comodo Dragon up to 134.0.6998.179. Affected by this vulnerability is an unknown functionality of the component HSTS Handler. The manipulation leads to security check for standard. The attack can be l... Read more
Affected Products : dragon- Published: Jul. 26, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Misconfiguration
-
3.7
LOWCVE-2025-8283
A vulnerability was found in the netavark package, a network stack for containers used with Podman. Due to dns.podman search domain being removed, netavark may return external servers if a valid A/AAAA record is sent as a response. When creating a contain... Read more
- Published: Jul. 28, 2025
- Modified: Aug. 11, 2025
- Vuln Type: Misconfiguration
-
3.7
LOWCVE-2005-1039
Race condition in Core Utilities (coreutils) 5.2.1, when (1) mkdir, (2) mknod, or (3) mkfifo is running with the -m switch, allows local users to modify permissions of other files.... Read more
Affected Products : coreutils- Published: May. 02, 2005
- Modified: Apr. 03, 2025