Latest CVE Feed
-
2.6
LOWCVE-2012-6502
Microsoft Internet Explorer before 10 allows remote attackers to obtain sensitive information about the existence of files, and read certain data from files, via a UNC share pathname in the SRC attribute of a SCRIPT element, as demonstrated by reading a n... Read more
Affected Products : internet_explorer- Published: Jan. 22, 2013
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2008-5460
Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, and 9.0 allows remote attackers to affect confidentiality via unknown vectors.... Read more
Affected Products : bea_product_suite- Published: Jan. 14, 2009
- Modified: Apr. 09, 2025
-
2.6
LOWCVE-2012-4929
The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext ... Read more
- Published: Sep. 15, 2012
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2008-3962
The from_format function in ssmtp.c in ssmtp 2.61 and 2.62, in certain configurations, uses uninitialized memory for the From: field of an e-mail message, which might allow remote attackers to obtain sensitive information (memory contents) in opportunisti... Read more
Affected Products : ssmtp- Published: Sep. 11, 2008
- Modified: Apr. 09, 2025
-
2.6
LOWCVE-2012-4037
Multiple cross-site scripting (XSS) vulnerabilities in the web client in Transmission before 2.61 allow remote attackers to inject arbitrary web script or HTML via the (1) comment, (2) created by, or (3) name field in a torrent file.... Read more
Affected Products : transmission- Published: Aug. 15, 2012
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2012-5559
Cross-site scripting (XSS) vulnerability in the page manager node view task in the Chaos tool suite (ctools) module 6.x-1.x before 6.x-1.10 for Drupal allows remote authenticated users with permissions to submit or edit nodes to inject arbitrary web scrip... Read more
Affected Products : ctools- Published: Dec. 03, 2012
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2009-0591
The CMS_verify function in OpenSSL 0.9.8h through 0.9.8j, when CMS is enabled, does not properly handle errors associated with malformed signed attributes, which allows remote attackers to repudiate a signature that originally appeared to be valid but was... Read more
Affected Products : openssl- Published: Mar. 27, 2009
- Modified: Apr. 09, 2025
-
2.6
LOWCVE-2024-41984
A vulnerability has been identified in SmartClient modules Opcenter QL Home (SC) (All versions >= V13.2 < V2506), SOA Audit (All versions >= V13.2 < V2506), SOA Cockpit (All versions >= V13.2 < V2506). The affected application improperly handles error whi... Read more
Affected Products :- Published: Aug. 12, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Information Disclosure
-
2.6
LOWCVE-2016-1185
The Cybozu kintone mobile application 1.x before 1.0.6 for Android allows attackers to discover an authentication token via a crafted application.... Read more
Affected Products : kintone- Published: Apr. 25, 2016
- Modified: Apr. 12, 2025
-
2.6
LOWCVE-2015-2987
Type74 ED before 4.0 misuses 128-bit ECB encryption for small files, which makes it easier for attackers to obtain plaintext data via differential cryptanalysis of a file with an original length smaller than 128 bits.... Read more
Affected Products : ed- Published: Aug. 28, 2015
- Modified: Apr. 12, 2025
-
2.6
LOWCVE-2021-29473
Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading,... Read more
- Published: Apr. 26, 2021
- Modified: Nov. 21, 2024
-
2.6
LOWCVE-2013-2988
Absolute path traversal vulnerability in the server in IBM Cognos Business Intelligence (BI) 8.4.1, 10.1, 10.1.1, 10.2, and 10.2.1 allows remote authenticated users to read files by leveraging the Report Author privilege, a different vulnerability than CV... Read more
Affected Products : cognos_business_intelligence- Published: Aug. 27, 2013
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2011-3872
Puppet 2.6.x before 2.6.12 and 2.7.x before 2.7.6, and Puppet Enterprise (PE) Users 1.0, 1.1, and 1.2 before 1.2.4, when signing an agent certificate, adds the Puppet master's certdnsnames values to the X.509 Subject Alternative Name field of the certific... Read more
- Published: Oct. 27, 2011
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2013-4954
Multiple cross-site scripting (XSS) vulnerabilities in wp-login.php in the Genetech Solutions Pie-Register plugin before 1.31 for WordPress, when "Allow New Registrations to set their own Password" is enabled, allow remote attackers to inject arbitrary we... Read more
- Published: Jul. 29, 2013
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2013-4944
Cross-site scripting (XSS) vulnerability in the BuddyPress Extended Friendship Request plugin before 1.0.2 for WordPress, when the "Friend Connections" component is enabled, allows remote attackers to inject arbitrary web script or HTML via the friendship... Read more
- Published: Jul. 29, 2013
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2013-5587
Cross-site scripting (XSS) vulnerability in Request Tracker (RT) 4.x before 4.0.13, when MakeClicky is configured, allows remote attackers to inject arbitrary web script or HTML via a URL in a ticket. NOTE: this issue has been SPLIT from CVE-2013-3371 du... Read more
- Published: Aug. 23, 2013
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2013-5183
Mail in Apple Mac OS X before 10.9, when Kerberos authentication is enabled and TLS is disabled, sends invalid cleartext data, which allows remote attackers to obtain sensitive information by sniffing the network.... Read more
- Published: Oct. 24, 2013
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2010-1157
Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm f... Read more
Affected Products : tomcat- Published: Apr. 23, 2010
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2010-0650
WebKit, as used in Google Chrome before 4.0.249.78 and Apple Safari, allows remote attackers to bypass intended restrictions on popup windows via crafted use of a mouse click event.... Read more
- Published: Feb. 18, 2010
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2006-0898
Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.... Read more
Affected Products : crypt_cbc- Published: Feb. 25, 2006
- Modified: Apr. 03, 2025