Latest CVE Feed
-
1.9
LOWCVE-2012-6140
pam_google_authenticator.c in the PAM module in Google Authenticator before 1.0 requires user-readable permissions for the secret file, which allows local users to bypass intended access restrictions and discover a shared secret via standard filesystem op... Read more
Affected Products : authenticator- Published: Apr. 24, 2013
- Modified: Apr. 11, 2025
-
1.9
LOWCVE-2007-2580
Unspecified vulnerability in Apple Safari allows local users to obtain sensitive information (saved keychain passwords) via the document.loginform.password.value JavaScript parameter loaded from an AppleScript script.... Read more
Affected Products : safari- Published: May. 09, 2007
- Modified: Apr. 09, 2025
-
1.9
LOWCVE-2012-4693
Invensys Wonderware InTouch 2012 R2 and earlier and Siemens ProcessSuite use a weak encryption algorithm for data in Ps_security.ini, which makes it easier for local users to discover passwords by reading this file.... Read more
- Published: Dec. 18, 2012
- Modified: Apr. 11, 2025
-
1.9
LOWCVE-2011-1074
crontab.c in crontab in FreeBSD allows local users to determine the existence of arbitrary directories via a command-line argument composed of a directory name concatenated with a directory traversal sequence that leads to the /etc/crontab pathname.... Read more
Affected Products : freebsd- Published: Mar. 04, 2011
- Modified: Apr. 11, 2025
-
1.9
LOWCVE-2014-8923
The (1) IBM Tivoli Identity Manager Active Directory adapter before 5.1.24 and (2) IBM Security Identity Manager Active Directory adapter before 6.0.14 for IBM Security Identity Manager on Windows, when certain log and trace levels are configured, store t... Read more
- Published: Mar. 25, 2015
- Modified: Apr. 12, 2025
-
1.9
LOWCVE-2015-1901
The installer in IBM InfoSphere Information Server 8.5 through 11.3 before 11.3.1.2 allows local users to obtain sensitive information via unspecified commands.... Read more
Affected Products : infosphere_information_server- Published: Jun. 28, 2015
- Modified: Apr. 12, 2025
-
1.9
LOWCVE-2011-3693
NetSaro Enterprise Messenger Server 2.0 allows local users to discover cleartext server credentials by reading the NetSaro.fdb file.... Read more
Affected Products : enterprise_messenger_server- Published: Sep. 27, 2011
- Modified: Apr. 11, 2025
-
1.8
LOWCVE-2025-30166
Pimcore's Admin Classic Bundle provides a Backend UI for Pimcore. An HTML injection issue allows users with access to the email sending functionality to inject arbitrary HTML code into emails sent via the admin interface, potentially leading to session co... Read more
Affected Products : admin_classic_bundle- Published: Apr. 08, 2025
- Modified: Apr. 08, 2025
- Vuln Type: Cross-Site Scripting
-
1.8
LOWCVE-2025-32382
Metabase is an open source Business Intelligence and Embedded Analytics tool. When admins change Snowflake connection details in Metabase (either updating a password or changing password to private key or vice versa), Metabase would not always purge older... Read more
Affected Products : metabase- Published: Apr. 10, 2025
- Modified: Apr. 11, 2025
- Vuln Type: Information Disclosure
-
1.8
LOWCVE-2023-21928
Vulnerability in the Oracle Solaris product of Oracle Systems (component: IPS repository daemon). The supported version that is affected is 11. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Ora... Read more
- Published: Apr. 18, 2023
- Modified: Nov. 21, 2024
-
1.8
LOWCVE-2007-2999
Microsoft Windows Server 2003, when time restrictions are in effect for user accounts, generates different error messages for failed login attempts with a valid user name than for those with an invalid user name, which allows context-dependent attackers t... Read more
- Published: Jun. 04, 2007
- Modified: Apr. 09, 2025
-
1.8
LOWCVE-2018-3270
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is affected is 11.3. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where S... Read more
- Published: Oct. 17, 2018
- Modified: Nov. 21, 2024
-
1.8
LOWCVE-2019-3008
Vulnerability in the Oracle Solaris product of Oracle Systems (component: LDAP Library). The supported version that is affected is 11. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris... Read more
- Published: Oct. 16, 2019
- Modified: Nov. 21, 2024
-
1.8
LOWCVE-2017-10122
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure whe... Read more
- Published: Aug. 08, 2017
- Modified: Apr. 20, 2025
-
1.8
LOWCVE-2011-3561
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.... Read more
- Published: Oct. 19, 2011
- Modified: Apr. 11, 2025
-
1.8
LOWCVE-2025-47278
Flask is a web server gateway interface (WSGI) web application framework. In Flask 3.1.0, the way fallback key configuration was handled resulted in the last fallback key being used for signing, rather than the current signing key. Signing is provided by ... Read more
Affected Products : flask- Published: May. 13, 2025
- Modified: May. 13, 2025
- Vuln Type: Cryptography
-
1.8
LOWCVE-2024-51746
Gitsign is a keyless Sigstore to signing tool for Git commits with your a GitHub / OIDC identity. gitsign may select the wrong Rekor entry to use during online verification when multiple entries are returned by the log. gitsign uses Rekor's search API to ... Read more
Affected Products : gitsign- Published: Nov. 05, 2024
- Modified: Nov. 06, 2024
-
1.8
LOWCVE-2021-35618
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communicati... Read more
Affected Products : active_iq_unified_manager oncommand_insight oncommand_workflow_automation snapcenter mysql_cluster- Published: Oct. 20, 2021
- Modified: Nov. 21, 2024
-
1.8
LOWCVE-2013-0179
The process_bin_delete function in memcached.c in memcached 1.4.4 and other versions before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (segmentation fault) via a request to delete a key, which does not accou... Read more
Affected Products : memcached- Published: Jan. 13, 2014
- Modified: Apr. 11, 2025
-
1.8
LOWCVE-2015-0875
The Ogaki Kyoritsu Bank Smartphone Passbook application 1.0.0 for Android creates a log file containing input data from the user, which allows attackers to obtain sensitive information by reading a file.... Read more
- Published: Feb. 15, 2015
- Modified: Apr. 12, 2025