Latest CVE Feed
-
2.8
LOWCVE-2024-52814
Argo Helm is a collection of community maintained charts for `argoproj.github.io` projects. Prior to version 0.45.0, the `workflow-role`) lacks granularity in its privileges, giving permissions to `workflowtasksets` and `workflowartifactgctasks` to all wo... Read more
Affected Products :- Published: Nov. 22, 2024
- Modified: Nov. 22, 2024
-
2.8
LOWCVE-2016-5551
Vulnerability in the Solaris Cluster component of Oracle Sun Systems Products Suite (subcomponent: NAS device addition). The supported version that is affected is 4.3. Easily "exploitable" vulnerability allows unauthenticated attacker with logon to the in... Read more
Affected Products : solaris_cluster- Published: Apr. 24, 2017
- Modified: Apr. 20, 2025
-
2.8
LOWCVE-2018-3084
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Shell: Core / Client). Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure w... Read more
Affected Products : mysql oncommand_insight oncommand_workflow_automation snapcenter storage_automation_store mysql_server- Published: Jul. 18, 2018
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2020-14740
Vulnerability in the SQL Developer Install component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1 and 18c. Easily exploitable vulnerability allows low privileged attacker having Client Computer User Acco... Read more
Affected Products : sql_developer- Published: Oct. 21, 2020
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2022-20327
In Wi-Fi, there is a possible way to retrieve the WiFi SSID without location permissions due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.... Read more
Affected Products : android- Published: Aug. 12, 2022
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2024-3480
An Implicit intent vulnerability was reported in the Motorola framework that could allow an attacker to read telephony-related data.... Read more
Affected Products :- Published: May. 03, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2024-22384
Out-of-bounds read for some Intel(R) Trace Analyzer and Collector software before version 2022.0.0 published Nov 2023 may allow an authenticated user to potentially enable information disclosure via local access.... Read more
Affected Products : trace_analyzer_and_collector- Published: May. 16, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2024-0080
NVIDIA nvTIFF Library for Windows and Linux contains a vulnerability where improper input validation might enable an attacker to use a specially crafted input file. A successful exploit of this vulnerability might lead to a partial denial of service. ... Read more
Affected Products :- Published: Apr. 05, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2016-4511
ABB PCM600 before 2.7 uses an improper hash algorithm for the main application password, which makes it easier for local users to obtain sensitive cleartext information by leveraging read access to the ACTConfig configuration file.... Read more
Affected Products : pcm600- Published: Jun. 10, 2016
- Modified: Apr. 12, 2025
-
2.8
LOWCVE-2025-48930
The TeleMessage service through 2025-05-05 stores certain cleartext information in memory, even though memory content may be accessible to an adversary through various avenues.... Read more
Affected Products : telemessage- Published: May. 28, 2025
- Modified: Jul. 01, 2025
- Vuln Type: Information Disclosure
-
2.8
LOWCVE-2019-2850
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to ... Read more
- Published: Jul. 23, 2019
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2024-54558
A clickjacking issue was addressed with improved out-of-process view handling. This issue is fixed in iOS 18 and iPadOS 18, macOS Sequoia 15. An app may be able to trick a user into granting access to photos from the user's photo library.... Read more
- Published: Mar. 10, 2025
- Modified: Mar. 27, 2025
- Vuln Type: Misconfiguration
-
2.8
LOWCVE-2023-31326
Use of an uninitialized variable in the ASP could allow an attacker to access leftover data from a trusted execution environment (TEE) driver, potentially leading to loss of confidentiality.... Read more
Affected Products :- Published: Sep. 06, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Information Disclosure
-
2.8
LOWCVE-2024-30204
In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments.... Read more
- Published: Mar. 25, 2024
- Modified: May. 01, 2025
-
2.8
LOWCVE-2024-2313
If kernel headers need to be extracted, bpftrace will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are ... Read more
Affected Products : bpftrace- Published: Mar. 10, 2024
- Modified: Mar. 13, 2025
-
2.8
LOWCVE-2015-2566
Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via vectors related to DML.... Read more
- Published: Apr. 16, 2015
- Modified: Apr. 12, 2025
-
2.8
LOWCVE-2024-35122
IBM i 7.2, 7.3, 7.4, and 7.5 is vulnerable to a file level local denial of service caused by an insufficient authority requirement. A local non-privileged user can configure a referential constraint with the privileges of a user socially engineered to acc... Read more
- Published: Jan. 24, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Denial of Service
-
2.8
LOWCVE-2025-1698
Null pointer exception vulnerabilities were reported in the fingerprint sensor service that could allow a local attacker to cause a denial of service.... Read more
Affected Products :- Published: Jun. 11, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Denial of Service
-
2.8
LOWCVE-2022-4134
A flaw was found in openstack-glance. This issue could allow a remote, authenticated attacker to tamper with images, compromising the integrity of virtual machines created using these modified images.... Read more
- Published: Mar. 06, 2023
- Modified: Mar. 06, 2025
-
2.8
LOWCVE-2025-54314
Thor before 1.4.0 can construct an unsafe shell command from library input. NOTE: this is disputed by the Supplier because "the method that was fixed can only be used with arguments that are controlled by Thor, and there is no way an attacker can take con... Read more
Affected Products :- Published: Jul. 20, 2025
- Modified: Aug. 10, 2025
- Vuln Type: Injection