Latest CVE Feed
-
2.6
LOWCVE-2025-32435
Hydra is a Continuous Integration service for Nix based projects. Evaluation of untrusted non-flake nix code could potentially access secrets that are accessible by the hydra user/group. This should not affect the signing keys, that are owned by the hydra... Read more
Affected Products :- Published: Apr. 15, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Authorization
-
2.6
LOWCVE-2004-2219
Microsoft Internet Explorer 6 allows remote attackers to spoof the address bar to facilitate phishing attacks via Javascript that uses an invalid URI, modifies the Location field, then uses history.back to navigate to the previous domain, aka NullyFake.... Read more
- Published: Dec. 31, 2004
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2004-2083
Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."... Read more
Affected Products : opera_browser- Published: Feb. 11, 2004
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2004-2014
Wget 1.9 and 1.9.1 allows local users to overwrite arbitrary files via a symlink attack on the name of the file being downloaded.... Read more
Affected Products : wget- Published: Dec. 31, 2004
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2006-0836
Mozilla Thunderbird 1.5 allows user-assisted attackers to cause an unspecified denial of service by tricking the user into importing an LDIF file with a long field into the address book, as demonstrated by a long homePhone field.... Read more
Affected Products : thunderbird- Published: Feb. 22, 2006
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-1999-0487
The DHTML Edit ActiveX control in Internet Explorer allows remote attackers to read arbitrary files.... Read more
Affected Products : internet_explorer- Published: May. 01, 1999
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2008-4164
cron.php in MemHT Portal 3.9.0 and earlier allows remote attackers to obtain sensitive information via a direct request, which reveals the installation path in an error message.... Read more
Affected Products : memht_portal- Published: Sep. 22, 2008
- Modified: Apr. 09, 2025
-
2.6
LOWCVE-2008-3634
Apple iTunes before 8.0 on Mac OS X 10.4.11, when iTunes Music Sharing is enabled but blocked by the host-based firewall, presents misleading information about firewall security, which might allow remote attackers to leverage an exposure that would be abs... Read more
- Published: Sep. 11, 2008
- Modified: Apr. 09, 2025
-
2.6
LOWCVE-1999-0396
A race condition between the select() and accept() calls in NetBSD TCP servers allows remote attackers to cause a denial of service.... Read more
- Published: Feb. 17, 1999
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-1999-0749
Buffer overflow in Microsoft Telnet client in Windows 95 and Windows 98 via a malformed Telnet argument.... Read more
- Published: Aug. 16, 1999
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-1999-0717
A remote attacker can disable the virus warning mechanism in Microsoft Excel 97.... Read more
- Published: May. 07, 1999
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-1999-0793
Internet Explorer allows remote attackers to read files by redirecting data to a Javascript applet.... Read more
Affected Products : internet_explorer- Published: Nov. 17, 1999
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2006-0926
Multiple directory traversal vulnerabilities in Allume StuffIt Standard and Deluxe 9.0, ZipMagic Deluxe 9.0, and StuffIt Expander 9.0.0.21 Engine 9.0.0.21 allow remote attackers to create and overwrite arbitrary files via certain crafted pathnames in a (1... Read more
- Published: Feb. 28, 2006
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2008-3270
yum-rhn-plugin in Red Hat Enterprise Linux (RHEL) 5 does not verify the SSL certificate for a file download from a Red Hat Network (RHN) server, which makes it easier for remote man-in-the-middle attackers to cause a denial of service (loss of updates) or... Read more
Affected Products : enterprise_linux- Published: Aug. 18, 2008
- Modified: Apr. 09, 2025
-
2.6
LOWCVE-1999-0762
When Javascript is embedded within the TITLE tag, Netscape Communicator allows a remote attacker to use the "about" protocol to gain access to browser information.... Read more
- Published: May. 24, 1999
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2006-0950
unalz 0.53 allows user-assisted attackers to overwrite arbitrary files via an ALZ archive with ".." (dot dot) sequences in a filename.... Read more
Affected Products : unalz- Published: Mar. 13, 2006
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2008-2140
Cross-site request forgery (CSRF) vulnerability in the rootpw plugin in rPath Appliance Platform Agent 2 and 3 allows remote attackers to reset the root password as the administrator via a crafted URL.... Read more
Affected Products : appliance_platform_agent- Published: May. 12, 2008
- Modified: Apr. 09, 2025
-
2.6
LOWCVE-2008-3574
Multiple cross-site scripting (XSS) vulnerabilities in Pluck 4.5.2, when register_globals is enabled, allow remote attackers to inject arbitrary web script or HTML via the (1) lang_footer parameter to (a) data/inc/footer.php; the (2) pluck_version, (3) la... Read more
- Published: Aug. 10, 2008
- Modified: Apr. 09, 2025
-
2.6
LOWCVE-2006-0927
Multiple cross-site scripting (XSS) vulnerabilities in the JGS-XA JGS-Gallery Addon 4.0.0 and earlier for Woltlab Burning Board (wBB) 2.x allow remote attackers to inject arbitrary web script or HTML via the (1) userid parameter in (a) jgs_galerie_slidesh... Read more
- Published: Feb. 28, 2006
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-1999-1453
Internet Explorer 4 allows remote attackers (malicious web site operators) to read the contents of the clipboard via the Internet WebBrowser ActiveX object.... Read more
Affected Products : internet_explorer- Published: Feb. 02, 1999
- Modified: Apr. 03, 2025