Latest CVE Feed
-
2.7
LOWCVE-2025-36576
Dell Wyse Management Suite, versions prior to WMS 5.2, contain a Cross-Site Request Forgery (CSRF) vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Server-side request forgery.... Read more
Affected Products : wyse_management_suite- Published: Jun. 10, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Cross-Site Request Forgery
-
2.7
LOWCVE-2024-5967
A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm)... Read more
- Published: Jun. 18, 2024
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2025-48370
auth-js is an isomorphic Javascript library for Supabase Auth. Prior to version 2.69.1, the library functions getUserById, deleteUser, updateUserById, listFactors and deleteFactor did not require the user supplied values to be valid UUIDs. This could lead... Read more
Affected Products :- Published: May. 27, 2025
- Modified: May. 28, 2025
- Vuln Type: Path Traversal
-
2.7
LOWCVE-2024-55593
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiWeb versions 6.3.17 through 7.6.1 allows attacker to gain information disclosure via crafted SQL queries... Read more
Affected Products : fortiweb- Published: Jan. 14, 2025
- Modified: Feb. 03, 2025
- Vuln Type: Injection
-
2.7
LOWCVE-2025-46777
A insertion of sensitive information into log file in Fortinet FortiPortal versions 7.4.0, versions 7.2.0 through 7.2.5, and versions 7.0.0 through 7.0.9 may allow an authenticated attacker with at least read-only admin permissions to view encrypted secre... Read more
Affected Products : fortiportal- Published: May. 28, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Information Disclosure
-
2.7
LOWCVE-2025-4563
A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim status... Read more
Affected Products : kubernetes- Published: Jun. 23, 2025
- Modified: Jun. 23, 2025
- Vuln Type: Authorization
-
2.7
LOWCVE-2024-52589
Discourse is an open source platform for community discussion. Moderators can see the Screened emails list in the admin dashboard, and through that can learn the email of a user. This problem is patched in the latest version of Discourse. Users unable to ... Read more
Affected Products : discourse- Published: Dec. 19, 2024
- Modified: Aug. 26, 2025
-
2.7
LOWCVE-2025-53113
GLPI, which stands for Gestionnaire Libre de Parc Informatique, is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions 0.65 through 10.0.18, a technician can use t... Read more
Affected Products : glpi- Published: Jul. 30, 2025
- Modified: Aug. 04, 2025
- Vuln Type: Authorization
-
2.7
LOWCVE-2012-2625
The PyGrub boot loader in Xen unstable before changeset 25589:60f09d1ab1fe, 4.2.x, and 4.1.x allows local para-virtualized guest users to cause a denial of service (memory consumption) via a large (1) bzip2 or (2) lzma compressed kernel image.... Read more
- EPSS Score: %0.32
- Published: Oct. 31, 2012
- Modified: Apr. 11, 2025
-
2.7
LOWCVE-2022-21432
Vulnerability in the Oracle Database - Enterprise Edition RDBMS Security component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 19c and 21c. Easily exploitable vulnerability allows high privileged attacker having DBA role ... Read more
- EPSS Score: %0.08
- Published: Jul. 19, 2022
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2024-29852
Veeam Backup Enterprise Manager allows high-privileged users to read backup session logs.... Read more
Affected Products : veeam_backup_\&_replication- Published: May. 22, 2024
- Modified: Jul. 03, 2025
-
2.7
LOWCVE-2023-49652
Incorrect permission checks in Jenkins Google Compute Engine Plugin 4.550.vb_327fca_3db_11 and earlier allow attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate system-scoped credent... Read more
Affected Products : google_compute_engine- EPSS Score: %0.04
- Published: Nov. 29, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2023-50785
Zoho ManageEngine ADAudit Plus before 7270 allows admin users to view names of arbitrary directories via path traversal.... Read more
Affected Products : manageengine_adaudit_plus- EPSS Score: %0.73
- Published: Jan. 25, 2024
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2024-40884
Mattermost versions 9.5.x <= 9.5.7, 9.10.x <= 9.10.0 fail to properly enforce permissions which allows a team admin user without "Add Team Members" permission to disable the invite URL.... Read more
- Published: Aug. 22, 2024
- Modified: Oct. 17, 2024
-
2.7
LOWCVE-2025-54873
RISC Zero is a zero-knowledge verifiable general computing platform based on zk-STARKs and the RISC-V microarchitecture. RISC packages risc0-zkvm versions 2.0.0 through 2.1.0 and risc0-circuit-rv32im and risc0-circuit-rv32im-sys versions 2.0.0 through 2.0... Read more
Affected Products :- Published: Aug. 06, 2025
- Modified: Aug. 06, 2025
- Vuln Type: Misconfiguration
-
2.7
LOWCVE-2025-55193
Active Record connects classes to relational database tables. Prior to versions 7.1.5.2, 7.2.2.2, and 8.0.2.1, the ID passed to find or similar methods may be logged without escaping. If this is directly to the terminal it may include unescaped ANSI seque... Read more
Affected Products : rails- Published: Aug. 13, 2025
- Modified: Aug. 14, 2025
- Vuln Type: Information Disclosure
-
2.7
LOWCVE-2025-30258
In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "ve... Read more
Affected Products : gnupg- Published: Mar. 19, 2025
- Modified: Mar. 19, 2025
- Vuln Type: Denial of Service
-
2.7
LOWCVE-2025-5416
A vulnerability has been identified in Keycloak that could lead to unauthorized information disclosure. While it requires an already authenticated user, the /admin/serverinfo endpoint can inadvertently provide sensitive environment information.... Read more
Affected Products : keycloak- Published: Jun. 20, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Information Disclosure
-
2.7
LOWCVE-2024-10098
The ApplyOnline WordPress plugin before 2.6.3 does not protect uploaded files during the application process, allowing unauthenticated users to access them and any private information they contain... Read more
Affected Products : applyonline_-_application_form_builder_and_manager- Published: May. 15, 2025
- Modified: Jun. 09, 2025
- Vuln Type: Information Disclosure
-
2.7
LOWCVE-2025-22212
A SQL injection vulnerability in the Convert Forms component versions 1.0.0-1.0.0 - 4.4.9 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the submission management area in backend.... Read more
Affected Products : convert_forms- Published: Mar. 05, 2025
- Modified: May. 28, 2025
- Vuln Type: Injection