Latest CVE Feed
-
2.8
LOWCVE-2023-43745
Improper input validation in some Intel(R) CBI software before version 1.1.0 may allow an authenticated user to potentially enable denial of service via local access.... Read more
Affected Products :- Published: May. 16, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2024-43167
DISPUTE NOTE: this issue does not pose a security risk as it (according to analysis by the original software developer, NLnet Labs) falls within the expected functionality and security controls of the application. Red Hat has made a claim that there is a ... Read more
Affected Products :- Published: Aug. 12, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2016-3251
The GDI component in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to obtain sensiti... Read more
Affected Products : windows_10 windows_7 windows_8.1 windows_rt_8.1 windows_server_2008 windows_server_2012 windows_vista- Published: Jul. 13, 2016
- Modified: Apr. 12, 2025
-
2.8
LOWCVE-2019-2850
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to ... Read more
- Published: Jul. 23, 2019
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2023-31028
NVIDIA nvJPEG2000 Library for Windows and Linux contains a vulnerability where improper input validation might enable an attacker to use a specially crafted input file. A successful exploit of this vulnerability might lead to a partial denial of service.... Read more
Affected Products :- Published: Apr. 05, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2014-0420
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.34 and earlier, and 5.6.14 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Replication.... Read more
- Published: Jan. 15, 2014
- Modified: Apr. 11, 2025
-
2.8
LOWCVE-2013-6398
The virtual router in Apache CloudStack before 4.2.1 does not preserve the source restrictions in firewall rules after being restarted, which allows remote attackers to bypass intended restrictions via a request.... Read more
Affected Products : cloudstack- Published: Jan. 15, 2014
- Modified: Apr. 11, 2025
-
2.8
LOWCVE-2014-0430
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Performance Schema.... Read more
Affected Products : mysql- Published: Jan. 15, 2014
- Modified: Apr. 11, 2025
-
2.8
LOWCVE-2025-24324
Integer overflow or wraparound in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable escalation of privilege via local access.... Read more
Affected Products :- Published: Aug. 12, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Authentication
-
2.8
LOWCVE-2012-1743
Unspecified vulnerability in the Oracle Clinical Remote Data Capture Option component in Oracle Industry Applications 4.6.0.x, 4.6.2, and 4.6.3 allows remote authenticated users to affect confidentiality, related to HTML Surround.... Read more
Affected Products : industry_applications- Published: Jul. 17, 2012
- Modified: Apr. 11, 2025
-
2.8
LOWCVE-2011-3520
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.49, 8.50, and 8.51 allows remote authenticated users to affect integrity via unknown vectors related to Personalization.... Read more
- Published: Oct. 18, 2011
- Modified: Apr. 11, 2025
-
2.8
LOWCVE-2022-4134
A flaw was found in openstack-glance. This issue could allow a remote, authenticated attacker to tamper with images, compromising the integrity of virtual machines created using these modified images.... Read more
- Published: Mar. 06, 2023
- Modified: Mar. 06, 2025
-
2.8
LOWCVE-2014-2432
Unspecified vulnerability Oracle the MySQL Server component 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Federated.... Read more
- Published: Apr. 16, 2014
- Modified: Apr. 12, 2025
-
2.8
LOWCVE-2015-7494
A vulnerability has been identified in IBM Cloud Orchestrator services/[action]/launch API. An authenticated domain admin user might modify cross domain resources via a /services/[action]/launch API call, provided it would have been possible for the domai... Read more
- Published: Feb. 08, 2017
- Modified: Apr. 20, 2025
-
2.8
LOWCVE-2024-22194
cdo-local-uuid project provides a specialized UUID-generating function that can, on user request, cause a program to generate deterministic UUIDs. An information leakage vulnerability is present in `cdo-local-uuid` at version `0.4.0`, and in `case-utils` ... Read more
- Published: Jan. 11, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2015-0511
Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : SP.... Read more
Affected Products : mysql- Published: Apr. 16, 2015
- Modified: Apr. 12, 2025
-
2.8
LOWCVE-2015-4836
Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.... Read more
Affected Products : ubuntu_linux fedora debian_linux enterprise_linux_desktop enterprise_linux_server enterprise_linux_workstation leap enterprise_linux_server_aus enterprise_linux_server_tus mysql +5 more products- Published: Oct. 21, 2015
- Modified: Apr. 12, 2025
-
2.8
LOWCVE-2024-35122
IBM i 7.2, 7.3, 7.4, and 7.5 is vulnerable to a file level local denial of service caused by an insufficient authority requirement. A local non-privileged user can configure a referential constraint with the privileges of a user socially engineered to acc... Read more
- Published: Jan. 24, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Denial of Service
-
2.8
LOWCVE-2024-30204
In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments.... Read more
- Published: Mar. 25, 2024
- Modified: May. 01, 2025
-
2.8
LOWCVE-2020-27351
Various memory and file descriptor leaks were found in apt-python files python/arfile.cc, python/tag.cc, python/tarfile.cc, aka GHSL-2020-170. This issue affects: python-apt 1.1.0~beta1 versions prior to 1.1.0~beta1ubuntu0.16.04.10; 1.6.5ubuntu0 versions ... Read more
- Published: Dec. 10, 2020
- Modified: Nov. 21, 2024