Latest CVE Feed
-
2.8
LOWCVE-2023-43745
Improper input validation in some Intel(R) CBI software before version 1.1.0 may allow an authenticated user to potentially enable denial of service via local access.... Read more
Affected Products :- Published: May. 16, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2025-44021
OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during image handling (if a deployment was performed via the API). A malicious project assigned as a node owner can provide a path to any local file (readable by ironic-conduc... Read more
Affected Products : ironic- Published: May. 08, 2025
- Modified: May. 12, 2025
- Vuln Type: Path Traversal
-
2.8
LOWCVE-2024-3480
An Implicit intent vulnerability was reported in the Motorola framework that could allow an attacker to read telephony-related data.... Read more
Affected Products :- Published: May. 03, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2023-41824
An implicit intent vulnerability was reported in the Motorola Phone Calls application that could allow a local attacker to read the calling phone number and calling data. ... Read more
Affected Products :- Published: May. 03, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2022-20327
In Wi-Fi, there is a possible way to retrieve the WiFi SSID without location permissions due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.... Read more
Affected Products : android- Published: Aug. 12, 2022
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2024-2313
If kernel headers need to be extracted, bpftrace will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are ... Read more
Affected Products : bpftrace- Published: Mar. 10, 2024
- Modified: Mar. 13, 2025
-
2.8
LOWCVE-2016-3251
The GDI component in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to obtain sensiti... Read more
Affected Products : windows_10 windows_7 windows_8.1 windows_rt_8.1 windows_server_2008 windows_server_2012 windows_vista- Published: Jul. 13, 2016
- Modified: Apr. 12, 2025
-
2.8
LOWCVE-2015-2566
Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via vectors related to DML.... Read more
- Published: Apr. 16, 2015
- Modified: Apr. 12, 2025
-
2.8
LOWCVE-2015-7494
A vulnerability has been identified in IBM Cloud Orchestrator services/[action]/launch API. An authenticated domain admin user might modify cross domain resources via a /services/[action]/launch API call, provided it would have been possible for the domai... Read more
- Published: Feb. 08, 2017
- Modified: Apr. 20, 2025
-
2.8
LOWCVE-2016-3272
The kernel in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 mishandles page-fault system calls, which allows local users to obtain sensitive information from an arbitrary process via a crafted applica... Read more
- Published: Jul. 13, 2016
- Modified: Apr. 12, 2025
-
2.8
LOWCVE-2020-14740
Vulnerability in the SQL Developer Install component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1 and 18c. Easily exploitable vulnerability allows low privileged attacker having Client Computer User Acco... Read more
Affected Products : sql_developer- Published: Oct. 21, 2020
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2024-29210
A local privilege escalation (LPE) vulnerability has been identified in Phish Alert Button for Outlook (PAB), specifically within its configuration management functionalities. This vulnerability allows a regular user to modify the application's configurat... Read more
Affected Products :- Published: May. 07, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2023-3674
A flaw was found in the keylime attestation verifier, which fails to flag a device's submitted TPM quote as faulty when the quote's signature does not validate for some reason. Instead, it will only emit an error in the log without flagging the device as ... Read more
- Published: Jul. 19, 2023
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2023-41817
An improper export vulnerability was reported in the Motorola Phone Calls application that could allow a local attacker to read unauthorized information.... Read more
Affected Products :- Published: May. 03, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2024-53879
NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in the cuobjdump binary, where a user could cause a crash by passing a malformed ELF file to cuobjdump. A successful exploit of this vulnerability might lead to a partial denial of service... Read more
Affected Products : cuda_toolkit- Published: Feb. 25, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Denial of Service
-
2.8
LOWCVE-2025-54781
Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. When debugging is enabled for Himmelblau in version 1.0.0, the himmelblaud_tasks service leaks an Intune service access token to the system journal. This short-lived token ca... Read more
Affected Products :- Published: Aug. 02, 2025
- Modified: Aug. 04, 2025
- Vuln Type: Information Disclosure
-
2.8
LOWCVE-2025-24324
Integer overflow or wraparound in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable escalation of privilege via local access.... Read more
Affected Products :- Published: Aug. 12, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Authentication
-
2.8
LOWCVE-2022-4134
A flaw was found in openstack-glance. This issue could allow a remote, authenticated attacker to tamper with images, compromising the integrity of virtual machines created using these modified images.... Read more
- Published: Mar. 06, 2023
- Modified: Mar. 06, 2025
-
2.8
LOWCVE-2025-54314
Thor before 1.4.0 can construct an unsafe shell command from library input. NOTE: this is disputed by the Supplier because "the method that was fixed can only be used with arguments that are controlled by Thor, and there is no way an attacker can take con... Read more
Affected Products :- Published: Jul. 20, 2025
- Modified: Aug. 10, 2025
- Vuln Type: Injection
-
2.8
LOWCVE-2023-41825
A path traversal vulnerability was reported in the Motorola Ready For application that could allow a local attacker to access local files. ... Read more
Affected Products :- Published: May. 03, 2024
- Modified: Nov. 21, 2024