Latest CVE Feed
-
3.9
LOWCVE-2020-29443
ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.... Read more
- Published: Jan. 26, 2021
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2021-2381
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes... Read more
- Published: Jul. 21, 2021
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2019-9700
Norton Password Manager, prior to 6.3.0.2082, may be susceptible to an address spoofing issue. This type of issue may allow an attacker to disguise their origin IP address in order to obfuscate the source of network traffic.... Read more
- Published: Jul. 16, 2019
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2020-6653
Eaton's Secure connect mobile app v1.7.3 & prior stores the user login credentials in logcat file when user create or register the account on the Mobile app. A malicious app or unauthorized user can harvest the information and later on can use the informa... Read more
Affected Products : secureconnect- Published: Aug. 12, 2020
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2023-37540
Sametime Connect desktop chat client includes, but does not use or require, the use of an Eclipse feature called Secure Storage. Using this Eclipse feature to store sensitive data can lead to exposure of that data. ... Read more
Affected Products :- Published: Feb. 23, 2024
- Modified: Nov. 29, 2024
-
3.9
LOWCVE-2015-0849
pycode-browser before version 1.0 is prone to a predictable temporary file vulnerability.... Read more
Affected Products : pycode-browser- Published: Jun. 26, 2025
- Modified: Aug. 06, 2025
-
3.9
LOWCVE-2018-20896
cPanel before 71.9980.37 allows code injection in the WHM cPAddons interface (SEC-394).... Read more
Affected Products : cpanel- Published: Aug. 01, 2019
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2023-22656
Out-of-bounds read in Intel(R) Media SDK and some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable escalation of privilege via local access.... Read more
Affected Products :- Published: May. 16, 2024
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2020-2731
Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows low privileged attacker having Local Logon privilege with logon to the i... Read more
- Published: Jan. 15, 2020
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2024-23563
HCL Connections Docs is vulnerable to a sensitive information disclosure which could allow a user to obtain sensitive information they are not entitled to, caused by improper handling of request data.... Read more
Affected Products :- Published: Feb. 12, 2025
- Modified: Feb. 12, 2025
- Vuln Type: Information Disclosure
-
3.9
LOWCVE-2022-1230
This vulnerability allows local attackers to execute arbitrary code on affected installations of Samsung Galaxy S21 prior to 4.5.40.5 phones. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit... Read more
- Published: Mar. 28, 2023
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2017-5686
The BIOS in Intel NUC systems based on 6th Gen Intel Core processors prior to version SY0059 may allow may allow an attacker with physical access to the system to gain access to personal information.... Read more
- Published: Apr. 03, 2017
- Modified: Apr. 20, 2025
-
3.9
LOWCVE-2019-0127
Logic error in the installer for Intel(R) OpenVINO(TM) 2018 R3 and before for Linux may allow a privileged user to potentially enable information disclosure via local access.... Read more
- Published: Feb. 18, 2019
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2022-23999
PendingIntent hijacking vulnerability in CpaReceiver prior to SMR Feb-2022 Release 1 allows local attackers to access media files without permission in KnoxPrivacyNoticeReceiver via implicit Intent.... Read more
- Published: Feb. 11, 2022
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2022-20226
In finishDrawingWindow of WindowManagerService.java, there is a possible tapjacking due to improper input validation. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Produ... Read more
Affected Products : android- Published: Jul. 13, 2022
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2023-0654
Due to a misconfiguration, the WARP Mobile Client (< 6.29) for Android was susceptible to a tapjacking attack. In the event that an attacker built a malicious application and managed to install it on a victim's device, the attacker would be able to trick ... Read more
Affected Products : warp- Published: Aug. 29, 2023
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2025-1693
The MongoDB Shell may be susceptible to control character injection where an attacker with control over the database cluster contents can inject control characters into the shell output. This may result in the display of falsified messages that appear to ... Read more
Affected Products : mongosh- Published: Feb. 27, 2025
- Modified: Feb. 27, 2025
- Vuln Type: Injection
-
3.9
LOWCVE-2024-32667
Out-of-bounds read for some OpenCL(TM) software may allow an authenticated user to potentially enable denial of service via local access.... Read more
Affected Products :- Published: Nov. 13, 2024
- Modified: Nov. 15, 2024
-
3.9
LOWCVE-2023-6690
A race condition in GitHub Enterprise Server allowed an existing admin to maintain permissions on transferred repositories by making a GraphQL mutation to alter repository permissions during the transfer. This vulnerability affected GitHub Enterprise Serv... Read more
Affected Products : enterprise_server- Published: Dec. 21, 2023
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2019-5296
Mate20 Huawei smartphones versions earlier than HMA-AL00C00B175 have an out-of-bounds read vulnerability. An attacker with a high permission runs some specific commands on the smartphone. Due to insufficient input verification, successful exploit may caus... Read more
- Published: Jun. 04, 2019
- Modified: Nov. 21, 2024