Latest CVE Feed
-
3.6
LOWCVE-2015-4231
The Python interpreter in Cisco NX-OS 6.2(8a) on Nexus 7000 devices allows local users to bypass intended access restrictions and delete an arbitrary VDC's files by leveraging administrative privileges in one VDC, aka Bug ID CSCur08416.... Read more
- Published: Jul. 03, 2015
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2014-8737
Multiple directory traversal vulnerabilities in GNU binutils 2.24 and earlier allow local users to delete arbitrary files via a .. (dot dot) or full path name in an archive to (1) strip or (2) objcopy or create arbitrary files via (3) a .. (dot dot) or fu... Read more
- Published: Dec. 09, 2014
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2025-55188
7-Zip before 25.01 does not always properly handle symbolic links during extraction.... Read more
Affected Products : 7-zip- Published: Aug. 08, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Path Traversal
-
3.6
LOWCVE-2025-27613
Gitk is a Tcl/Tk based Git history browser. Starting with 1.7.0, when a user clones an untrusted repository and runs gitk without additional command arguments, files for which the user has write permission can be created and truncated. The option Support ... Read more
Affected Products : git- Published: Jul. 10, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Misconfiguration
-
3.6
LOWCVE-2025-30731
Vulnerability in the Oracle Applications Technology Stack product of Oracle E-Business Suite (component: Configuration). Supported versions that are affected are 12.2.3-12.2.14. Difficult to exploit vulnerability allows unauthenticated attacker with logo... Read more
Affected Products : applications_technology_stack- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Authorization
-
3.6
LOWCVE-2024-54014
Improper authorization in handler for custom URL scheme issue in 'Skylark' App for Android 6.2.13 and earlier and 'Skylark' App for iOS 6.2.13 and earlier allows an attacker to lead the application to access an arbitrary web site via another application i... Read more
Affected Products :- Published: Dec. 05, 2024
- Modified: Dec. 05, 2024
-
3.6
LOWCVE-2022-37010
In JetBrains IntelliJ IDEA before 2022.2 email address validation in the "Git User Name Is Not Defined" dialog was missed... Read more
Affected Products : intellij_idea- Published: Jul. 28, 2022
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2006-2288
Avahi before 0.6.10 allows local users to cause a denial of service (mDNS/DNS-SD service disconnect) via unspecified mDNS name conflicts.... Read more
Affected Products : avahi- Published: May. 10, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2017-10308
Vulnerability in the Oracle Agile PLM component of Oracle Supply Chain Products Suite (subcomponent: Performance). Supported versions that are affected are 9.3.5 and 9.3.6. Easily exploitable vulnerability allows physical access to compromise Oracle Agile... Read more
Affected Products : agile_product_lifecycle_management_framework agile_plm agile_product_lifecycle_management- Published: Oct. 19, 2017
- Modified: May. 08, 2025
-
3.6
LOWCVE-2003-1460
Worker Filemanager 1.0 through 2.7 sets the permissions on the destination directory to world-readable and executable while copying data, which could allow local users to obtain sensitive information.... Read more
Affected Products : worker_filemanager- Published: Dec. 31, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2019-5252
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the ap... Read more
Affected Products : y6_pro_firmware honor_8x_firmware honor_9_lite_firmware honor_9i_firmware enjoy_8_plus_firmware y9_firmware honor_9i honor_8x y6_pro honor_9_lite +2 more products- Published: Dec. 14, 2019
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2009-3409
Unspecified vulnerability in the PeopleSoft Enterprise HCM (TAM) component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 9.0 Bundle 10 allows remote authenticated users to affect confidentiality and integrity via unknown vectors.... Read more
- Published: Oct. 22, 2009
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2023-44129
The vulnerability is that the Messaging ("com.android.mms") app patched by LG forwards attacker-controlled intents back to the attacker in the exported "com.android.mms.ui.QClipIntentReceiverActivity" activity. The attacker can abuse this functionality by... Read more
- Published: Sep. 27, 2023
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2006-4092
Simpliciti Locked Browser does not properly limit a user's actions to ones within the intended Internet Explorer environment, which allows local users to perform unauthorized actions by visiting a web site that executes a JavaScript window.blur loop to re... Read more
Affected Products : locked_browser- Published: Aug. 11, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2024-2918
Improper input validation in PAM JIT elevation feature in Devolutions Server 2024.1.6 and earlier allows an attacker with access to the PAM JIT elevation feature to forge the displayed group in the PAM JIT elevation checkout request via a specially crafte... Read more
Affected Products : devolutions_server- Published: Apr. 09, 2024
- Modified: Mar. 28, 2025
-
3.6
LOWCVE-2006-3786
Symantec pcAnywhere 12.5 uses weak integrity protection for .cif (aka caller or CallerID) files, which allows local users to generate a custom .cif file and modify the superuser flag.... Read more
Affected Products : pcanywhere- Published: Jul. 24, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2000-0121
The Recycle Bin utility in Windows NT and Windows 2000 allows local users to read or modify files by creating a subdirectory with the victim's SID in the recycler directory, aka the "Recycle Bin Creation" vulnerability.... Read more
Affected Products : windows_nt- Published: Feb. 01, 2000
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-0828
UnixWare pkg commands such as pkginfo, pkgcat, and pkgparam allow local users to read arbitrary files via the dacread permission.... Read more
Affected Products : unixware- Published: Dec. 02, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1519
RunAs (runas.exe) in Windows 2000 allows local users to create a spoofed named pipe when the service is stopped, then capture cleartext usernames and passwords when clients connect to the service. NOTE: the vendor disputes this issue, saying that adminis... Read more
Affected Products : windows_2000- Published: Dec. 31, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2002-2270
Unspecified vulnerability in the ied command in HP-UX 10.10, 10.20, and 11.0 allows local users to view "normally invisible data" via unknown attack vectors.... Read more
Affected Products : hp-ux- Published: Dec. 31, 2002
- Modified: Apr. 03, 2025