Latest CVE Feed
-
2.8
LOWCVE-2023-3674
A flaw was found in the keylime attestation verifier, which fails to flag a device's submitted TPM quote as faulty when the quote's signature does not validate for some reason. Instead, it will only emit an error in the log without flagging the device as ... Read more
- Published: Jul. 19, 2023
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2025-54314
Thor before 1.4.0 can construct an unsafe shell command from library input. NOTE: this is disputed by the Supplier because "the method that was fixed can only be used with arguments that are controlled by Thor, and there is no way an attacker can take con... Read more
Affected Products :- Published: Jul. 20, 2025
- Modified: Aug. 10, 2025
- Vuln Type: Injection
-
2.8
LOWCVE-2025-1699
An incorrect default permissions vulnerability was reported in the MotoSignature application that could result in unauthorized access.... Read more
Affected Products :- Published: Jun. 11, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Authorization
-
2.8
LOWCVE-2020-6824
Initially, a user opens a Private Browsing Window and generates a password for a site, then closes the Private Browsing Window but leaves Firefox open. Subsequently, if the user had opened a new Private Browsing Window, revisited the same site, and genera... Read more
Affected Products : firefox- Published: Apr. 24, 2020
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2015-4836
Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.... Read more
Affected Products : ubuntu_linux fedora debian_linux enterprise_linux_desktop enterprise_linux_server enterprise_linux_workstation leap enterprise_linux_server_aus enterprise_linux_server_tus mysql +5 more products- Published: Oct. 21, 2015
- Modified: Apr. 12, 2025
-
2.8
LOWCVE-2016-0607
Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to replication.... Read more
- Published: Jan. 21, 2016
- Modified: Apr. 12, 2025
-
2.8
LOWCVE-2024-4786
An improper validation vulnerability was reported in the Lenovo Tab K10 that could allow a specially crafted application to keep the device on.... Read more
Affected Products :- Published: Jul. 26, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2024-2313
If kernel headers need to be extracted, bpftrace will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are ... Read more
Affected Products : bpftrace- Published: Mar. 10, 2024
- Modified: Mar. 13, 2025
-
2.8
LOWCVE-2014-4243
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to ENFED.... Read more
- Published: Jul. 17, 2014
- Modified: Apr. 12, 2025
-
2.8
LOWCVE-2024-42186
BigFix Patch Download Plug-ins are affected by an insecure protocol support. The application can allow improper handling of SSL certificates validation.... Read more
Affected Products :- Published: Jan. 23, 2025
- Modified: Jan. 23, 2025
- Vuln Type: Misconfiguration
-
2.8
LOWCVE-2024-43167
DISPUTE NOTE: this issue does not pose a security risk as it (according to analysis by the original software developer, NLnet Labs) falls within the expected functionality and security controls of the application. Red Hat has made a claim that there is a ... Read more
Affected Products :- Published: Aug. 12, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2024-2314
If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not a... Read more
- Published: Mar. 10, 2024
- Modified: Aug. 26, 2025
-
2.8
LOWCVE-2023-43745
Improper input validation in some Intel(R) CBI software before version 1.1.0 may allow an authenticated user to potentially enable denial of service via local access.... Read more
Affected Products :- Published: May. 16, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2023-41824
An implicit intent vulnerability was reported in the Motorola Phone Calls application that could allow a local attacker to read the calling phone number and calling data. ... Read more
Affected Products :- Published: May. 03, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2025-48930
The TeleMessage service through 2025-05-05 stores certain cleartext information in memory, even though memory content may be accessible to an adversary through various avenues.... Read more
Affected Products : telemessage- Published: May. 28, 2025
- Modified: Jul. 01, 2025
- Vuln Type: Information Disclosure
-
2.8
LOWCVE-2024-0080
NVIDIA nvTIFF Library for Windows and Linux contains a vulnerability where improper input validation might enable an attacker to use a specially crafted input file. A successful exploit of this vulnerability might lead to a partial denial of service. ... Read more
Affected Products :- Published: Apr. 05, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2018-3084
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Shell: Core / Client). Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure w... Read more
Affected Products : mysql oncommand_insight oncommand_workflow_automation snapcenter storage_automation_store mysql_server- Published: Jul. 18, 2018
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2023-29293
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Improper Input Validation vulnerability that could result in a Security feature bypass. An admin privileged attacker could leverage this vuln... Read more
- Published: Jun. 15, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2025-59047
matrix-sdk-base is the base component to build a Matrix client library. In matrix-sdk-base before 0.14.1, calling the `RoomMember::normalized_power_level()` method can cause a panic if a room member has a power level of `Int::Min`. The issue is fixed in m... Read more
Affected Products : matrix-rust-sdk- Published: Sep. 11, 2025
- Modified: Sep. 11, 2025
- Vuln Type: Memory Corruption
-
2.7
LOWCVE-2024-8350
The Uncanny Groups for LearnDash plugin for WordPress is vulnerable to user group add due to a missing capability check on the /wp-json/ulgm_management/v1/add_user/ REST API endpoint in all versions up to, and including, 6.1.0.1. This makes it possible fo... Read more
Affected Products : uncanny_groups_for_learndash- Published: Sep. 25, 2024
- Modified: Oct. 02, 2024