Latest CVE Feed
-
3.7
LOWCVE-2010-1323
MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution... Read more
- Published: Dec. 02, 2010
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2011-1658
ld.so in the GNU C Library (aka glibc or libc6) 2.13 and earlier expands the $ORIGIN dynamic string token when RPATH is composed entirely of this token, which might allow local users to gain privileges by creating a hard link in an arbitrary directory to ... Read more
Affected Products : glibc- Published: Apr. 08, 2011
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2016-1551
ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same s... Read more
- Published: Jan. 27, 2017
- Modified: Apr. 20, 2025
-
3.7
LOWCVE-2013-7347
Luci in Red Hat Conga does not properly enforce the user session timeout, which might allow attackers to gain access to the session by reading the __ac session cookie. NOTE: this issue has been SPLIT due to different vulnerability types. Use CVE-2012-335... Read more
- Published: Mar. 31, 2014
- Modified: Apr. 12, 2025
-
3.7
LOWCVE-2024-21211
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Compiler). Supported versions that are affected are Oracle Java SE: 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Orac... Read more
- Published: Oct. 15, 2024
- Modified: Jun. 23, 2025
-
3.7
LOWCVE-2015-1841
The Web Admin interface in Red Hat Enterprise Virtualization Manager (RHEV-M) allows local users to bypass the timeout function by selecting a VM in the VM grid view.... Read more
Affected Products : enterprise_virtualization- Published: Sep. 08, 2015
- Modified: Apr. 12, 2025
-
3.7
LOWCVE-2010-4450
Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Solaris and Linux; 5.0 Update 27 and earlier for Solaris and Linux; and 1.4.2_29 and earlier for Solaris and Linux allows l... Read more
- Published: Feb. 17, 2011
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2007-0235
Stack-based buffer overflow in the glibtop_get_proc_map_s function in libgtop before 2.14.6 (libgtop2) allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a process with a long filename that is mapped in its add... Read more
Affected Products : libgtop- Published: Jan. 16, 2007
- Modified: Apr. 09, 2025
-
3.7
LOWCVE-2015-4834
Unspecified vulnerability in Oracle Sun Solaris 11.2 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Utility/Zones.... Read more
Affected Products : solaris- Published: Oct. 21, 2015
- Modified: Apr. 12, 2025
-
3.7
LOWCVE-2011-2503
The insert_module function in runtime/staprun/staprun_funcs.c in the systemtap runtime tool (staprun) in SystemTap before 1.6 does not properly validate a module when loading it, which allows local users to gain privileges via a race condition between the... Read more
Affected Products : systemtap- Published: Jul. 26, 2012
- Modified: Apr. 11, 2025
-
3.7
LOWCVE-2007-0472
Multiple race conditions in Smb4K before 0.8.0 allow local users to (1) modify arbitrary files via unspecified manipulations of Smb4K's lock file, which is not properly handled by the remove_lock_file function in core/smb4kfileio.cpp, and (2) add lines to... Read more
Affected Products : smb4k- Published: Feb. 03, 2007
- Modified: Apr. 09, 2025
-
3.7
LOWCVE-2025-8556
A flaw was found in CIRCL's implementation of the FourQ elliptic curve. This vulnerability allows an attacker to compromise session security via low-order point injection and incorrect point validation during Diffie-Hellman key exchange.... Read more
Affected Products : circl- Published: Aug. 06, 2025
- Modified: Aug. 06, 2025
- Vuln Type: Cryptography
-
3.7
LOWCVE-2025-54787
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. There is a vulnerability in SuiteCRM version 7.14.6 which allows unauthenticated downloads of any file from the upload-directory, as long as it is na... Read more
Affected Products : suitecrm- Published: Aug. 07, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Authorization
-
3.7
LOWCVE-2025-54999
OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, when using OpenBao's userpass auth method, user enumeration was possible due to timin... Read more
Affected Products : openbao- Published: Aug. 09, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Authentication
-
3.7
LOWCVE-2025-32943
The vulnerability allows any authenticated user to leak the contents of arbitrary “.m3u8” files from the PeerTube server due to a path traversal in the HLS endpoint.... Read more
Affected Products :- Published: Apr. 15, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Path Traversal
-
3.7
LOWCVE-2019-14850
A denial of service vulnerability was discovered in nbdkit 1.12.7, 1.14.1 and 1.15.1. An attacker could connect to the nbdkit service and cause it to perform a large amount of work in initializing backend plugins, by simply opening a connection to the ser... Read more
- Published: Mar. 18, 2021
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2007-0775
Multiple unspecified vulnerabilities in the layout engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allow remote attackers to cause a denial of service (crash) and potentially execut... Read more
- Published: Feb. 26, 2007
- Modified: Apr. 09, 2025
-
3.7
LOWCVE-2008-0883
acroread in Adobe Acrobat Reader 8.1.2 allows local users to overwrite arbitrary files via a symlink attack on temporary files related to SSL certificate handling.... Read more
- Published: Mar. 06, 2008
- Modified: Apr. 09, 2025
-
3.7
LOWCVE-2023-41306
Vulnerability of mutex management in the bone voice ID trusted application (TA) module. Successful exploitation of this vulnerability may cause the bone voice ID feature to be unavailable.... Read more
- Published: Sep. 27, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2005-1751
Race condition in shtool 2.0.1 and earlier allows local users to create or modify arbitrary files via a symlink attack on the .shtool.$$ temporary file, a different vulnerability than CVE-2005-1759.... Read more
Affected Products : shtool- Published: May. 25, 2005
- Modified: Apr. 03, 2025