Latest CVE Feed
-
3.1
LOWCVE-2023-38158
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability... Read more
Affected Products : edge_chromium- Published: Aug. 21, 2023
- Modified: Feb. 28, 2025
-
3.1
LOWCVE-2025-22601
Discourse is an open source platform for community discussion. In affected versions an attacker can trick a target user to make changes to their own username via carefully crafted link using the `activate-account` route. This problem has been patched in t... Read more
Affected Products : discourse- Published: Feb. 04, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Authentication
-
3.1
LOWCVE-2025-52463
Cross-site request forgery vulnerability exists in Active! mail 6 BuildInfo: 6.60.06008562 and earlier. If this vulnerability is exploited, unintended E-mail may be sent when a user accesses a specially crafted URL while being logged in.... Read more
Affected Products : active\!_mail- Published: Jul. 02, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Cross-Site Request Forgery
-
3.1
LOWCVE-2023-6068
On affected 7130 Series FPGA platforms running MOS and recent versions of the MultiAccess FPGA, application of ACL’s may result in incorrect operation of the configured ACL for a port resulting in some packets that should be denied being permitted and som... Read more
Affected Products : mos- Published: Mar. 04, 2024
- Modified: Nov. 21, 2024
-
3.1
LOWCVE-2025-23415
An insufficient verification of data authenticity vulnerability exists in BIG-IP APM Access Policy endpoint inspection that may allow an attacker to bypass endpoint inspection checks for VPN connection initiated thru BIG-IP APM browser network access VPN ... Read more
Affected Products : big-ip_access_policy_manager- Published: Feb. 05, 2025
- Modified: Feb. 05, 2025
- Vuln Type: Authentication
-
3.1
LOWCVE-2019-2818
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple pro... Read more
- Published: Jul. 23, 2019
- Modified: Nov. 21, 2024
-
3.1
LOWCVE-2019-2766
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows un... Read more
- Published: Jul. 23, 2019
- Modified: Nov. 21, 2024
-
3.0
LOWCVE-2021-46750
Failure to validate the address and size in TEE (Trusted Execution Environment) may allow a malicious x86 attacker to send malformed messages to the graphics mailbox resulting in an overlap of a TMR (Trusted Memory Region) that was previously allocated by... Read more
Affected Products :- Published: Sep. 06, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Memory Corruption
-
3.0
LOWCVE-2009-1981
Unspecified vulnerability in the Highly Interactive Client component in Siebel Product Suite 7.5.3, 7.7.2, 7.8.2, 8.0.0.5, and 8.1.0 allows local users to affect confidentiality and integrity via unknown vectors.... Read more
Affected Products : siebel_enterprise_suite- Published: Jul. 14, 2009
- Modified: Apr. 09, 2025
-
3.0
LOWCVE-2023-51453
A Improper Input Validation issue affecting the v2_sdk_service running on a set of DJI drone devices on the port 10000 could allow an attacker to cause a crash of the service through a crafted payload triggering a missing input size check in the process_p... Read more
Affected Products :- Published: Apr. 02, 2024
- Modified: Nov. 21, 2024
-
3.0
LOWCVE-2024-45744
TopQuadrant TopBraid EDG stores external credentials insecurely. An authenticated attacker with file system access can read edg-setup.properites and obtain the secret to decrypt external passwords stored in edg-vault.properties. An authenticated attacker ... Read more
Affected Products : topbraid_edg- Published: Sep. 27, 2024
- Modified: Feb. 18, 2025
-
3.0
LOWCVE-2021-25743
kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events.... Read more
Affected Products : kubernetes- Published: Jan. 07, 2022
- Modified: Aug. 22, 2025
-
3.0
LOWCVE-2010-2374
Unspecified vulnerability in Solaris Studio 12 update 1 allows local users to affect confidentiality and integrity via unknown vectors.... Read more
Affected Products : solaris_studio- Published: Jul. 13, 2010
- Modified: Apr. 11, 2025
-
3.0
LOWCVE-2012-0114
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows local users to affect confidentiality and integrity via unknown vectors.... Read more
- Published: Jan. 18, 2012
- Modified: Apr. 11, 2025
-
3.0
LOWCVE-2013-2391
Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows local users to affect confidentiality and integrity via unknown vectors related to Server Install.... Read more
- Published: Apr. 17, 2013
- Modified: Apr. 11, 2025
-
3.0
LOWCVE-2020-14818
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). The supported version that is affected is 11. Difficult to exploit vulnerability allows low privileged attacker with network access via SSH to compromise Oracle Solaris. S... Read more
- Published: Oct. 21, 2020
- Modified: Nov. 21, 2024
-
3.0
LOWCVE-2025-53018
Lychee is a free, open-source photo-management tool. Prior to version 6.6.13, a critical Server-Side Request Forgery (SSRF) vulnerability exists in the `/api/v2/Photo::fromUrl` endpoint. This flaw lets an attacker instruct the application’s backend to mak... Read more
Affected Products : lychee- Published: Jun. 27, 2025
- Modified: Jun. 30, 2025
- Vuln Type: Server-Side Request Forgery
-
3.0
LOWCVE-2023-31331
Improper access control in the DRTM firmware could allow a privileged attacker to perform multiple driver initializations, resulting in stack memory corruption that could potentially lead to loss of integrity or availability.... Read more
Affected Products :- Published: Feb. 11, 2025
- Modified: Feb. 11, 2025
- Vuln Type: Memory Corruption
-
3.0
LOWCVE-2024-21257
Vulnerability in the Oracle Hyperion BI+ product of Oracle Hyperion (component: UI and Visualization). The supported version that is affected is 11.2.18.0.000. Easily exploitable vulnerability allows low privileged attacker with access to the physical c... Read more
Affected Products : hyperion_bi\+- Published: Oct. 15, 2024
- Modified: Nov. 06, 2024
-
3.0
LOW- Published: Jun. 14, 2023
- Modified: Nov. 21, 2024