Latest CVE Feed
-
3.9
LOWCVE-2023-22591
IBM Robotic Process Automation 21.0.1 through 21.0.7 and 23.0.0 through 23.0.1 could allow a user with physical access to the system due to session tokens for not being invalidated after a password reset. IBM X-Force ID: 243710.... Read more
- Published: Mar. 15, 2023
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2022-1697
Okta Active Directory Agent versions 3.8.0 through 3.11.0 installed the Okta AD Agent Update Service using an unquoted path. Note: To remediate this vulnerability, you must uninstall Okta Active Directory Agent and reinstall Okta Active Directory Agent 3.... Read more
Affected Products : active_directory_agent- Published: Sep. 06, 2022
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2017-5686
The BIOS in Intel NUC systems based on 6th Gen Intel Core processors prior to version SY0059 may allow may allow an attacker with physical access to the system to gain access to personal information.... Read more
- Published: Apr. 03, 2017
- Modified: Apr. 20, 2025
-
3.9
LOWCVE-2021-35549
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris execute... Read more
- Published: Oct. 20, 2021
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2024-31636
An issue in LIEF v.0.14.1 allows a local attacker to obtain sensitive information via the name parameter of the machd_reader.c component.... Read more
Affected Products : lief- Published: May. 03, 2024
- Modified: Aug. 21, 2025
-
3.9
LOWCVE-2023-22656
Out-of-bounds read in Intel(R) Media SDK and some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable escalation of privilege via local access.... Read more
Affected Products :- Published: May. 16, 2024
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2020-6653
Eaton's Secure connect mobile app v1.7.3 & prior stores the user login credentials in logcat file when user create or register the account on the Mobile app. A malicious app or unauthorized user can harvest the information and later on can use the informa... Read more
Affected Products : secureconnect- Published: Aug. 12, 2020
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2019-9700
Norton Password Manager, prior to 6.3.0.2082, may be susceptible to an address spoofing issue. This type of issue may allow an attacker to disguise their origin IP address in order to obfuscate the source of network traffic.... Read more
- Published: Jul. 16, 2019
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2022-23999
PendingIntent hijacking vulnerability in CpaReceiver prior to SMR Feb-2022 Release 1 allows local attackers to access media files without permission in KnoxPrivacyNoticeReceiver via implicit Intent.... Read more
- Published: Feb. 11, 2022
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2019-0127
Logic error in the installer for Intel(R) OpenVINO(TM) 2018 R3 and before for Linux may allow a privileged user to potentially enable information disclosure via local access.... Read more
- Published: Feb. 18, 2019
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2021-2381
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes... Read more
- Published: Jul. 21, 2021
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2023-40732
A vulnerability has been identified in QMS Automotive (All versions < V12.39). The QMS.Mobile module of the affected application does not invalidate the session token on logout. This could allow an attacker to perform session hijacking attacks.... Read more
Affected Products : qms_automotive- Published: Sep. 12, 2023
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2021-25266
An insecure data storage vulnerability allows a physical attacker with root privileges to retrieve TOTP secret keys from unlocked phones in Sophos Authenticator for Android version 3.4 and older, and Intercept X for Mobile (Android) before version 9.7.349... Read more
- Published: Apr. 27, 2022
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2022-20226
In finishDrawingWindow of WindowManagerService.java, there is a possible tapjacking due to improper input validation. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Produ... Read more
Affected Products : android- Published: Jul. 13, 2022
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2025-32004
Improper input validation in the Intel Edger8r Tool for some Intel(R) SGX SDK may allow an authenticated user to potentially enable escalation of privilege via local access.... Read more
Affected Products :- Published: Aug. 12, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Authorization
-
3.9
LOWCVE-2025-53177
Permission bypass vulnerability in the calendar storage module Impact: Successful exploitation of this vulnerability may affect the schedule syncing function of watches.... Read more
- Published: Jul. 07, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Authorization
-
3.9
LOWCVE-2019-5296
Mate20 Huawei smartphones versions earlier than HMA-AL00C00B175 have an out-of-bounds read vulnerability. An attacker with a high permission runs some specific commands on the smartphone. Due to insufficient input verification, successful exploit may caus... Read more
- Published: Jun. 04, 2019
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2017-17149
Huawei HiWallet App with the versions before 8.0.4 has an arbitrary lock pattern change vulnerability. It needs to verify the user's Huawei ID during lock pattern change. An attacker with root privilege who gets a user's smart phone may bypass Huawei ID v... Read more
Affected Products : hiwallet- Published: Mar. 09, 2018
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2022-39403
Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: Core Client). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MyS... Read more
- Published: Oct. 18, 2022
- Modified: Nov. 21, 2024
-
3.8
LOWCVE-2022-33747
Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation... Read more
- Published: Oct. 11, 2022
- Modified: Nov. 21, 2024