Latest CVE Feed
-
2.8
LOWCVE-2014-4243
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to ENFED.... Read more
- Published: Jul. 17, 2014
- Modified: Apr. 12, 2025
-
2.8
LOWCVE-2015-0511
Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : SP.... Read more
Affected Products : mysql- Published: Apr. 16, 2015
- Modified: Apr. 12, 2025
-
2.8
LOWCVE-2025-44021
OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during image handling (if a deployment was performed via the API). A malicious project assigned as a node owner can provide a path to any local file (readable by ironic-conduc... Read more
Affected Products : ironic- Published: May. 08, 2025
- Modified: May. 12, 2025
- Vuln Type: Path Traversal
-
2.8
LOWCVE-2023-41824
An implicit intent vulnerability was reported in the Motorola Phone Calls application that could allow a local attacker to read the calling phone number and calling data. ... Read more
Affected Products :- Published: May. 03, 2024
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2022-20327
In Wi-Fi, there is a possible way to retrieve the WiFi SSID without location permissions due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.... Read more
Affected Products : android- Published: Aug. 12, 2022
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2025-54314
Thor before 1.4.0 can construct an unsafe shell command from library input. NOTE: this is disputed by the Supplier because "the method that was fixed can only be used with arguments that are controlled by Thor, and there is no way an attacker can take con... Read more
Affected Products :- Published: Jul. 20, 2025
- Modified: Aug. 10, 2025
- Vuln Type: Injection
-
2.8
LOWCVE-2018-3084
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Shell: Core / Client). Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure w... Read more
Affected Products : mysql oncommand_insight oncommand_workflow_automation snapcenter storage_automation_store mysql_server- Published: Jul. 18, 2018
- Modified: Nov. 21, 2024
-
2.8
LOWCVE-2020-14740
Vulnerability in the SQL Developer Install component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1 and 18c. Easily exploitable vulnerability allows low privileged attacker having Client Computer User Acco... Read more
Affected Products : sql_developer- Published: Oct. 21, 2020
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2022-35931
Nextcloud Password Policy is an app that enables a Nextcloud server admin to define certain rules for passwords. Prior to versions 22.2.10, 23.0.7, and 24.0.3 the random password generator may, in very rare cases, generate common passwords that the valida... Read more
- Published: Sep. 06, 2022
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2024-31040
Buffer Overflow vulnerability in the get_var_integer function in mqtt_parser.c in NanoMQ 0.21.7 allows remote attackers to cause a denial of service via a series of specially crafted hexstreams.... Read more
Affected Products : nanomq- Published: Apr. 17, 2024
- Modified: Jun. 10, 2025
-
2.7
LOWCVE-2025-30369
Zulip is an open-source team collaboration tool. The API for deleting an organization custom profile field is supposed to be restricted to organization administrators, but its handler failed to check that the field belongs to the same organization as the ... Read more
- Published: Mar. 31, 2025
- Modified: Aug. 27, 2025
- Vuln Type: Authorization
-
2.7
LOWCVE-2024-47266
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in share file list functionality in Synology Active Backup for Business before 2.7.1-13234, 2.7.1-23234 and 2.7.1-3234 allows remote authenticated users with admi... Read more
Affected Products :- Published: Feb. 13, 2025
- Modified: Feb. 13, 2025
- Vuln Type: Path Traversal
-
2.7
LOWCVE-2019-0307
Diagnostics Agent in Solution Manager, version 7.2, stores several credentials such as SLD user connection as well as Solman user communication in the SAP Secure Storage file which is not encrypted by default. By decoding these credentials, an attacker wi... Read more
Affected Products : solution_manager- Published: Jun. 12, 2019
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2022-31120
Nextcloud server is an open source personal cloud solution. The audit log is used to get a full trail of the actions which has been incompletely populated. In affected versions federated share events were not properly logged which would allow brute force ... Read more
- Published: Aug. 04, 2022
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2022-31177
Flask-AppBuilder is an application development framework built on top of Flask python framework. In versions prior to 4.1.3 an authenticated Admin user could query other users by their salted and hashed passwords strings. These filters could be made by us... Read more
- Published: Aug. 01, 2022
- Modified: Mar. 07, 2025
-
2.7
LOWCVE-2024-10102
The Photo Gallery, Images, Slider in Rbs Image Gallery WordPress plugin before 3.2.22 does not sanitise and escape some of its Gallery settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks... Read more
- Published: Jan. 07, 2025
- Modified: May. 14, 2025
- Vuln Type: Cross-Site Scripting
-
2.7
LOWCVE-2025-59047
matrix-sdk-base is the base component to build a Matrix client library. In matrix-sdk-base before 0.14.1, calling the `RoomMember::normalized_power_level()` method can cause a panic if a room member has a power level of `Int::Min`. The issue is fixed in m... Read more
Affected Products : matrix-rust-sdk- Published: Sep. 11, 2025
- Modified: Sep. 11, 2025
- Vuln Type: Memory Corruption
-
2.7
LOWCVE-2024-40455
An arbitrary file deletion vulnerability in ThinkSAAS v3.7 allows attackers to delete arbitrary files via a crafted request.... Read more
Affected Products : thinksaas- Published: Jul. 16, 2024
- Modified: Apr. 28, 2025
-
2.7
LOWCVE-2023-27410
A vulnerability has been identified in SCALANCE LPE9403 (All versions < V2.1). A heap-based buffer overflow vulnerability was found in the `edgebox_web_app` binary. The binary will crash if supplied with a backup password longer than 255 characters. This ... Read more
- Published: May. 09, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2022-2841
A vulnerability was found in CrowdStrike Falcon 6.31.14505.0/6.42.15610/6.44.15806. It has been classified as problematic. Affected is an unknown function of the component Uninstallation Handler. The manipulation leads to missing authorization. It is poss... Read more
Affected Products : falcon- Published: Aug. 22, 2022
- Modified: Nov. 21, 2024