Latest CVE Feed
-
3.7
LOWCVE-1999-0141
Java Bytecode Verifier allows malicious applets to execute arbitrary commands as the user of the applet.... Read more
Affected Products : navigator- Published: Mar. 29, 1996
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-1999-0123
Race condition in Linux mailx command allows local users to read user files.... Read more
Affected Products : slackware_linux- Published: Dec. 01, 1995
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2021-20455
IBM Cognos Controller 11.0.0 through 11.0.1 and IBM Controller 11.1.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks again... Read more
- Published: Jan. 07, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Information Disclosure
-
3.7
LOWCVE-2024-3302
There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10... Read more
- Published: Apr. 16, 2024
- Modified: Apr. 01, 2025
-
3.7
LOWCVE-2002-2092
Race condition in exec in OpenBSD 4.0 and earlier, NetBSD 1.5.2 and earlier, and FreeBSD 4.4 and earlier allows local users to gain privileges by attaching a debugger to a process before the kernel has determined that the process is setuid or setgid.... Read more
- Published: Dec. 31, 2002
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2001-0317
Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process.... Read more
Affected Products : linux_kernel- Published: May. 03, 2001
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2004-1445
A race condition in nessus-adduser in Nessus 2.0.11 and possibly earlier versions, if the TMPDIR environment variable is not set, allows local users to gain privileges.... Read more
Affected Products : nessus- Published: Dec. 31, 2004
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2025-23165
In Node.js, the `ReadFileUtf8` internal binding leaks memory due to a corrupted pointer in `uv_fs_s.file`: a UTF-16 path buffer is allocated but subsequently overwritten when the file descriptor is set. This results in an unrecoverable memory leak on ever... Read more
Affected Products : node.js- Published: May. 19, 2025
- Modified: May. 19, 2025
- Vuln Type: Memory Corruption
-
3.7
LOWCVE-2023-28322
An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the s... Read more
Affected Products : fedora curl macos h300s_firmware h500s_firmware h700s_firmware h410s_firmware clustered_data_ontap ontap_antivirus_connector h300s +3 more products- Published: May. 26, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2023-32251
A vulnerability has been identified in the Linux kernel's ksmbd component (kernel SMB/CIFS server). A security control designed to prevent dictionary attacks, which introduces a 5-second delay during session setup, can be bypassed through the use of async... Read more
Affected Products : linux_kernel- Published: Jul. 31, 2025
- Modified: Aug. 04, 2025
- Vuln Type: Authentication
-
3.7
LOWCVE-2024-30110
HCL DRYiCE AEX product is impacted by lack of input validation vulnerability in a particular web application. A malicious script can be injected into a system which can cause the system to behave in unexpected ways.... Read more
Affected Products :- Published: Jun. 28, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2024-39302
BigBlueButton is an open-source virtual classroom designed to help teachers teach and learners learn. An attacker may be able to exploit the overly elevated file permissions in the `/usr/local/bigbluebutton/core/vendor/bundle/ruby/2.7.0/gems/resque-2.6.0`... Read more
Affected Products : bigbluebutton- Published: Jun. 28, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2024-2355
A vulnerability has been found in keerti1924 Secret-Coder-PHP-Project 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /secret_coder.sql. The manipulation leads to inclusion of sensitive information... Read more
Affected Products : secret-coder-php-project- Published: Mar. 10, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2024-30109
HCL DRYiCE AEX is impacted by a lack of clickjacking protection in the AEX web application. An attacker can use multiple transparent or opaque layers to trick a user into clicking on a button or link on another page than the one intended.... Read more
Affected Products :- Published: Jun. 28, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2023-48711
google-translate-api-browser is an npm package which interfaces with the google translate web api. A Server-Side Request Forgery (SSRF) Vulnerability is present in applications utilizing the `google-translate-api-browser` package and exposing the `transla... Read more
Affected Products : google_translate_api_browser- Published: Nov. 24, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2024-10920
A vulnerability was found in mariazevedo88 travels-java-api up to 5.0.1 and classified as problematic. Affected by this issue is the function doFilterInternal of the file travels-java-api-master\src\main\java\io\github\mariazevedo88\travelsjavaapi\filters... Read more
Affected Products : travels-java-api- Published: Nov. 06, 2024
- Modified: Nov. 22, 2024
-
3.7
LOWCVE-2024-12300
The AR for WordPress plugin for WordPress is vulnerable to unauthorized double extension file upload due to a missing capability check on the set_ar_featured_image() function in all versions up to, and including, 7.3. This makes it possible for unauthenti... Read more
Affected Products : ar- Published: Dec. 13, 2024
- Modified: Dec. 13, 2024
-
3.7
LOWCVE-2000-0579
IRIX crontab creates temporary files with predictable file names and with the umask of the user, which could allow local users to modify another user's crontab file as it is being edited.... Read more
Affected Products : irix- Published: Jun. 21, 2000
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2004-2643
Directory traversal vulnerability in Microsoft cabarc allows remote attackers to overwrite files via "../" sequences in file names in a CAB archive.... Read more
Affected Products : cabarc- Published: Dec. 31, 2004
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2000-0578
SGI MIPSPro compilers C, C++, F77 and F90 generate temporary files in /tmp with predictable file names, which could allow local users to insert malicious contents into these files as they are being compiled by another user.... Read more
Affected Products : mipspro_compilers- Published: Jun. 21, 2000
- Modified: Apr. 03, 2025