Latest CVE Feed
-
3.7
LOWCVE-2000-0578
SGI MIPSPro compilers C, C++, F77 and F90 generate temporary files in /tmp with predictable file names, which could allow local users to insert malicious contents into these files as they are being compiled by another user.... Read more
Affected Products : mipspro_compilers- Published: Jun. 21, 2000
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2023-22045
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u371, 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle Gra... Read more
- Published: Jul. 18, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2004-1683
A race condition in crrtrap for QNX RTP 6.1 allows local users to gain privileges by modifying the PATH environment variable to reference a malicious io-graphics program before is executed by crrtrap.... Read more
Affected Products : rtos- Published: Sep. 13, 2004
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2000-1096
crontab by Paul Vixie uses predictable file names for a temporary file and does not properly ensure that the file is owned by the user executing the crontab -e command, which allows local users with write access to the crontab spool directory to execute a... Read more
Affected Products : vixie_cron- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2001-1085
Lmail 2.7 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file.... Read more
Affected Products : lmail- Published: Jul. 05, 2001
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2003-0480
VMware Workstation 4.0 for Linux allows local users to overwrite arbitrary files and gain privileges via "symlink manipulation."... Read more
Affected Products : workstation- Published: Aug. 07, 2003
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2016-0688
Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6, 12.1.2, and 12.1.3 allows remote attackers to affect integrity via vectors related to Core Components.... Read more
Affected Products : weblogic_server- Published: Apr. 21, 2016
- Modified: Apr. 12, 2025
-
3.7
LOWCVE-2025-23165
In Node.js, the `ReadFileUtf8` internal binding leaks memory due to a corrupted pointer in `uv_fs_s.file`: a UTF-16 path buffer is allocated but subsequently overwritten when the file descriptor is set. This results in an unrecoverable memory leak on ever... Read more
Affected Products : node.js- Published: May. 19, 2025
- Modified: May. 19, 2025
- Vuln Type: Memory Corruption
-
3.7
LOWCVE-2023-26084
The armv8_dec_aes_gcm_full() API of Arm AArch64cryptolib before 86065c6 fails to the verify the authentication tag of AES-GCM protected data, leading to a man-in-the-middle attack. This occurs because of an improperly initialized variable.... Read more
Affected Products : aarch64cryptolib- Published: Mar. 15, 2023
- Modified: Feb. 27, 2025
-
3.7
LOWCVE-2025-29923
go-redis is the official Redis client library for the Go programming language. Prior to 9.5.5, 9.6.3, and 9.7.3, go-redis potentially responds out of order when `CLIENT SETINFO` times out during connection establishment. This can happen when the client is... Read more
Affected Products :- Published: Mar. 20, 2025
- Modified: Mar. 20, 2025
- Vuln Type: Race Condition
-
3.7
LOWCVE-2025-24912
hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authent... Read more
Affected Products :- Published: Mar. 12, 2025
- Modified: Mar. 12, 2025
- Vuln Type: Denial of Service
-
3.7
LOWCVE-2023-43814
Discourse is an open source platform for community discussion. Attackers with details specific to a poll in a topic can use the `/polls/grouped_poll_results` endpoint to view the content of options in the poll and the number of votes for groups of poll pa... Read more
Affected Products : discourse- Published: Oct. 16, 2023
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2006-1830
Sun Java Studio Enterprise 8, when installed as root, creates certain files with world-writable permissions, which allows local users to execute arbitrary commands via unspecified vectors.... Read more
Affected Products : java_studio_enterprise- Published: Apr. 19, 2006
- Modified: Apr. 03, 2025
-
3.7
LOWCVE-2024-30480
Authentication Bypass by Spoofing vulnerability in Pippin Williamson CGC Maintenance Mode allows Functionality Bypass.This issue affects CGC Maintenance Mode: from n/a through 1.2.... Read more
Affected Products :- Published: May. 17, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2025-8204
A vulnerability classified as problematic was found in Comodo Dragon up to 134.0.6998.179. Affected by this vulnerability is an unknown functionality of the component HSTS Handler. The manipulation leads to security check for standard. The attack can be l... Read more
Affected Products : dragon- Published: Jul. 26, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Misconfiguration
-
3.7
LOWCVE-2025-7039
A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vuln... Read more
Affected Products :- Published: Sep. 03, 2025
- Modified: Sep. 04, 2025
- Vuln Type: Path Traversal
-
3.7
LOWCVE-2025-54568
Akamai Rate Control alpha before 2025 allows attackers to send requests above the stipulated thresholds because the rate is measured separately for each edge node.... Read more
Affected Products :- Published: Jul. 25, 2025
- Modified: Jul. 25, 2025
- Vuln Type: Denial of Service
-
3.7
LOWCVE-2025-8283
A vulnerability was found in the netavark package, a network stack for containers used with Podman. Due to dns.podman search domain being removed, netavark may return external servers if a valid A/AAAA record is sent as a response. When creating a contain... Read more
- Published: Jul. 28, 2025
- Modified: Aug. 11, 2025
- Vuln Type: Misconfiguration
-
3.7
LOWCVE-2024-32708
Authentication Bypass by Spoofing vulnerability in helderk Maintenance Mode allows Functionality Bypass.This issue affects Maintenance Mode: from n/a through 3.0.1.... Read more
Affected Products : maintenance_mode- Published: May. 17, 2024
- Modified: Nov. 21, 2024
-
3.7
LOWCVE-2024-47869
Gradio is an open-source Python package designed for quick prototyping. This vulnerability involves a **timing attack** in the way Gradio compares hashes for the `analytics_dashboard` function. Since the comparison is not done in constant time, an attacke... Read more
Affected Products : gradio- Published: Oct. 10, 2024
- Modified: Oct. 17, 2024