Latest CVE Feed
-
3.9
LOWCVE-2020-1879
There is an improper integrity checking vulnerability on some huawei products. The software of the affected product has an improper integrity check which may allow an attacker with high privilege to make malicious modifications.Affected product versions i... Read more
Affected Products : osca-550_firmware osca-550a_firmware osca-550ax_firmware osca-550x_firmware hege-560_firmware hege-570_firmware osca-550 osca-550a osca-550ax osca-550x +2 more products- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2020-6653
Eaton's Secure connect mobile app v1.7.3 & prior stores the user login credentials in logcat file when user create or register the account on the Mobile app. A malicious app or unauthorized user can harvest the information and later on can use the informa... Read more
Affected Products : secureconnect- Published: Aug. 12, 2020
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2025-44657
In Linksys EA6350 V2.1.2, the chroot_local_user option is enabled in the dynamically generated vsftpd configuration file. This could lead to unauthorized access to system files, privilege escalation, or use of the compromised server as a pivot point for i... Read more
- Published: Jul. 21, 2025
- Modified: Aug. 07, 2025
- Vuln Type: Misconfiguration
-
3.9
LOWCVE-2019-2807
Vulnerability in the Oracle Solaris component of Oracle Sun Systems Products Suite (subcomponent: Zones). The supported version that is affected is 11.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure wher... Read more
- Published: Jul. 23, 2019
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2020-2731
Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows low privileged attacker having Local Logon privilege with logon to the i... Read more
- Published: Jan. 15, 2020
- Modified: Nov. 21, 2024
-
3.9
LOWCVE-2022-1230
This vulnerability allows local attackers to execute arbitrary code on affected installations of Samsung Galaxy S21 prior to 4.5.40.5 phones. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit... Read more
- Published: Mar. 28, 2023
- Modified: Nov. 21, 2024
-
3.8
LOWCVE-2023-23814
Missing Authorization vulnerability in CodePeople CP Multi View Event Calendar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects CP Multi View Event Calendar : from n/a through 1.4.13.... Read more
Affected Products :- Published: Dec. 09, 2024
- Modified: Dec. 09, 2024
-
3.8
LOWCVE-2025-32971
XWiki is a generic wiki platform. In versions starting from 4.5.1 to before 15.10.13, from 16.0.0-rc-1 to before 16.4.4, and from 16.5.0-rc-1 to before 16.8.0-rc-1, the Solr script service doesn't take dropped programming rights into account. The Solr scr... Read more
Affected Products : xwiki- Published: Apr. 30, 2025
- Modified: May. 13, 2025
- Vuln Type: Misconfiguration
-
3.8
LOWCVE-2024-2972
The Floating Chat Widget: Contact Chat Icons, WhatsApp, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button WordPress plugin before 3.1.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin t... Read more
Affected Products : floating_chat_widget- Published: Apr. 24, 2024
- Modified: May. 08, 2025
-
3.8
LOWCVE-2018-15532
SynTP.sys in Synaptics Touchpad drivers before 2018-06-06 allows local users to obtain sensitive information about freed kernel addresses.... Read more
Affected Products : synaptics_touchpad_driver- Published: Mar. 21, 2019
- Modified: Nov. 21, 2024
-
3.8
LOWCVE-2024-5030
The CM Table Of Contents WordPress plugin before 1.2.3 does not have CSRF check in place when resetting its settings, which could allow attackers to make a logged in admin perform such action via a CSRF attack... Read more
Affected Products : cm_table_of_contents- Published: Nov. 18, 2024
- Modified: May. 15, 2025
-
3.8
LOWCVE-2023-5159
Mattermost fails to properly verify the permissions when managing/updating a bot allowing a User Manager role with user edit permissions to manage/update bots. ... Read more
- Published: Sep. 29, 2023
- Modified: Nov. 21, 2024
-
3.8
LOWCVE-2025-36581
Dell PowerEdge Platform version(s) 14G AMD BIOS v1.25.0 and prior, contain(s) an Access of Memory Location After End of Buffer vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information ... Read more
Affected Products :- Published: Aug. 14, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Memory Corruption
-
3.8
LOWCVE-2025-46094
LiquidFiles before 4.1.2 allows directory traversal by configuring the pathname of a local executable file as an Actionscript.... Read more
Affected Products : liquidfiles- Published: Aug. 04, 2025
- Modified: Aug. 07, 2025
- Vuln Type: Path Traversal
-
3.8
LOWCVE-2022-33747
Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation... Read more
- Published: Oct. 11, 2022
- Modified: Nov. 21, 2024
-
3.8
LOWCVE-2021-25527
Improper export of Android application components vulnerability in Samsung Pay (India only) prior to version 4.1.77 allows attacker to access Bill Pay and Recharge menu without authentication.... Read more
- Published: Dec. 08, 2021
- Modified: Nov. 21, 2024
-
3.8
LOWCVE-2021-3594
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue... Read more
- Published: Jun. 15, 2021
- Modified: Nov. 21, 2024
-
3.8
LOWCVE-2022-21488
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.34. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where... Read more
Affected Products : vm_virtualbox- Published: Apr. 19, 2022
- Modified: Nov. 21, 2024
-
3.8
LOWCVE-2025-6942
The distributed engine versions 8.4.39.0 and earlier of Secret Server versions 11.7.49 and earlier can be exploited during an initial authorization event that would allow an attacker to impersonate another distributed engine.... Read more
Affected Products : secret_server- Published: Jul. 02, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Authentication
-
3.8
LOWCVE-2023-41044
Graylog is a free and open log management platform. A partial path traversal vulnerability exists in Graylog's `Support Bundle` feature. The vulnerability is caused by incorrect user input validation in an HTTP API resource. Graylog's Support Bundle featu... Read more
Affected Products : graylog- Published: Aug. 31, 2023
- Modified: Nov. 21, 2024