Latest CVE Feed
-
3.9
LOWCVE-2024-27086
The MSAL library enabled acquisition of security tokens to call protected APIs. MSAL.NET applications targeting Xamarin Android and .NET Android (e.g., MAUI) using the library from versions 4.48.0 to 4.60.0 are impacted by a low severity vulnerability. ... Read more
Affected Products :- Published: Apr. 16, 2024
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2020-2569
Vulnerability in the Oracle Applications DBA component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows low privileged attacker having Local Logon privil... Read more
Affected Products : applications_dba- Published: Jan. 15, 2020
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2023-48184
QuickJS before 7414e5f has a quickjs.h JS_FreeValueRT use-after-free because of incorrect garbage collection of async functions with closures.... Read more
Affected Products :- Published: Apr. 23, 2024
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2022-20226
In finishDrawingWindow of WindowManagerService.java, there is a possible tapjacking due to improper input validation. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Produ... Read more
Affected Products : android- Published: Jul. 13, 2022
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2021-25350
Information Exposure vulnerability in Samsung Account prior to version 12.1.1.3 allows physically proximate attackers to access user information via log.... Read more
- Published: Mar. 25, 2021
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2017-17149
Huawei HiWallet App with the versions before 8.0.4 has an arbitrary lock pattern change vulnerability. It needs to verify the user's Huawei ID during lock pattern change. An attacker with root privilege who gets a user's smart phone may bypass Huawei ID v... Read more
Affected Products : hiwallet- Published: Mar. 09, 2018
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2025-1693
The MongoDB Shell may be susceptible to control character injection where an attacker with control over the database cluster contents can inject control characters into the shell output. This may result in the display of falsified messages that appear to ... Read more
Affected Products : mongosh- Published: Feb. 27, 2025
- Modified: Feb. 27, 2025
- Vuln Type: Injection
-
3.9
LOWCVE-2023-0654
Due to a misconfiguration, the WARP Mobile Client (< 6.29) for Android was susceptible to a tapjacking attack. In the event that an attacker built a malicious application and managed to install it on a victim's device, the attacker would be able to trick ... Read more
Affected Products : warp- Published: Aug. 29, 2023
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2021-46772
Insufficient input validation in the ABL may allow a privileged attacker with access to the BIOS menu or UEFI shell to tamper with the structure headers in SPI ROM causing an out of bounds memory read and write, potentially resulting in memory corruption ... Read more
Affected Products :- Published: Aug. 13, 2024
- Modified: Nov. 05, 2024
-
3.9
LOWCVE-2020-11736
fr-archive-libarchive.c in GNOME file-roller through 3.36.1 allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.... Read more
- Published: Apr. 13, 2020
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2022-39403
Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: Core Client). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MyS... Read more
- Published: Oct. 18, 2022
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2021-21598
Dell Wyse ThinOS, versions 9.0, 9.1, and 9.1 MR1, contain a Sensitive Information Disclosure Vulnerability. An authenticated attacker with physical access to the system could exploit this vulnerability to read sensitive Smartcard data in log files.... Read more
- Published: Aug. 10, 2021
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2023-20867
A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine.... Read more
- Actively Exploited
- Published: Jun. 13, 2023
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2024-38806
Failure to properly synchronize user's permissions in UAA in Cloud Foundry Foundation v40.17.0 https://github.com/cloudfoundry/cf-deployment/releases/tag/v40.17.0 , potentially resulting in users retaining access rights they should not have. This can ... Read more
Affected Products :- Published: Jul. 18, 2024
- Modified: Nov. 21, 2024
-
3.8
LOWCVE-2016-3158
The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by lever... Read more
- Published: Apr. 13, 2016
- Modified: Apr. 12, 2025
-
3.8
LOWCVE-2019-2501
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to t... Read more
Affected Products : vm_virtualbox- Published: Jan. 16, 2019
- Modified: Nov. 21, 2024
-
3.8
LOWCVE-2018-2831
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.1.36 and Prior to 5.2.10. Easily exploitable vulnerability allows low privileged attacker with logon to ... Read more
Affected Products : vm_virtualbox- Published: Apr. 19, 2018
- Modified: Nov. 21, 2024
-
3.8
LOWCVE-2025-47938
TYPO3 is an open source, PHP based web content management system. Starting in version 9.0.0 and prior to versions 9.5.51 ELTS, 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, and 13.4.12 LTS, the backend user management interface allows password changes without ... Read more
Affected Products : typo3- Published: May. 20, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Authentication
-
3.8
LOWCVE-2025-8013
The Quttera Web Malware Scanner plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.5.1.41 via the 'RunExternalScan' function. This makes it possible for authenticated attackers, with Administrator-lev... Read more
Affected Products : quttera_web_malware_scanner- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Server-Side Request Forgery
-
3.8
LOWCVE-2025-5715
A vulnerability was found in Signal App 7.41.4 on Android. It has been declared as problematic. This vulnerability affects unknown code of the component Biometric Authentication Handler. The manipulation leads to missing critical step in authentication. I... Read more
Affected Products :- Published: Jun. 06, 2025
- Modified: Jun. 09, 2025
- Vuln Type: Authentication