Latest CVE Feed
-
2.7
LOWCVE-2025-27192
Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Insufficiently Protected Credentials vulnerability that could lead to a security feature bypass. A high privileged attacker could exploit this vul... Read more
- Published: Apr. 08, 2025
- Modified: May. 20, 2025
- Vuln Type: Authentication
-
2.7
LOWCVE-2025-4972
An issue has been discovered in GitLab EE affecting all versions from 18.0 before 18.0.4 and 18.1 before 18.1.2 that could have allowed authenticated users with invitation privileges to bypass group-level user invitation restrictions by manipulating group... Read more
Affected Products : gitlab- Published: Jul. 10, 2025
- Modified: Jul. 25, 2025
- Vuln Type: Authorization
-
2.7
LOWCVE-2012-0091
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.52.05 allows remote authenticated users to affect integrity and availability via unknown vectors related to Upgrade Change Assistance.... Read more
Affected Products : peoplesoft_products- Published: Jan. 18, 2012
- Modified: Apr. 11, 2025
-
2.7
LOWCVE-2023-50785
Zoho ManageEngine ADAudit Plus before 7270 allows admin users to view names of arbitrary directories via path traversal.... Read more
Affected Products : manageengine_adaudit_plus- Published: Jan. 25, 2024
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2013-0167
VDSM in Red Hat Enterprise Virtualization 3 and 3.2 allows privileged guest users to cause the host to become "unavailable to the managment server" via guestInfo dictionaries with "unexpected fields."... Read more
Affected Products : enterprise_virtualization- Published: Aug. 19, 2013
- Modified: Apr. 11, 2025
-
2.7
LOWCVE-2025-53113
GLPI, which stands for Gestionnaire Libre de Parc Informatique, is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions 0.65 through 10.0.18, a technician can use t... Read more
Affected Products : glpi- Published: Jul. 30, 2025
- Modified: Aug. 04, 2025
- Vuln Type: Authorization
-
2.7
LOWCVE-2025-4563
A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim status... Read more
Affected Products : kubernetes- Published: Jun. 23, 2025
- Modified: Jun. 23, 2025
- Vuln Type: Authorization
-
2.7
LOWCVE-2024-5967
A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm)... Read more
- Published: Jun. 18, 2024
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2006-6607
The Java Key Store (JKS) for WebSphere Application Server (WAS) for IBM Tivoli Identity Manager (ITIM) 4.6 places the JKS password in a -Djavax.net.ssl.trustStorePassword command line argument, which allows local users to obtain the password by listing th... Read more
Affected Products : tivoli_identity_manager- Published: Dec. 18, 2006
- Modified: Apr. 09, 2025
-
2.7
LOWCVE-2024-2616
To harden ICU against exploitation, the behavior for out-of-memory conditions was changed to crash instead of attempt to continue. This vulnerability affects Firefox ESR < 115.9 and Thunderbird < 115.9.... Read more
- Published: Mar. 19, 2024
- Modified: Feb. 25, 2025
-
2.7
LOWCVE-2012-2696
The backend in Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1 does not properly check privileges, which allows remote authenticated users to query arbitrary information via a (1) SOAP or (2) GWT request.... Read more
Affected Products : enterprise_virtualization_manager- Published: Jan. 04, 2013
- Modified: Apr. 11, 2025
-
2.7
LOWCVE-2024-23600
Improper Input Validation of query search results for private field data in PingIDM (Query Filter module) allows for a potentially efficient brute forcing approach leading to information disclosure.... Read more
Affected Products :- Published: Aug. 01, 2024
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2012-2625
The PyGrub boot loader in Xen unstable before changeset 25589:60f09d1ab1fe, 4.2.x, and 4.1.x allows local para-virtualized guest users to cause a denial of service (memory consumption) via a large (1) bzip2 or (2) lzma compressed kernel image.... Read more
- Published: Oct. 31, 2012
- Modified: Apr. 11, 2025
-
2.7
LOWCVE-2024-10672
The Multiple Page Generator Plugin – MPG plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the mpg_upsert_project_source_block() function in all versions up to, and including, 4.0.2. This makes it po... Read more
Affected Products : multiple_page_generator- Published: Nov. 12, 2024
- Modified: Nov. 14, 2024
-
2.7
LOWCVE-2013-4678
The NDMP protocol implementation in Symantec Backup Exec 2010 R3 before 2010 R3 SP3 and 2012 before SP2 allows remote authenticated users to obtain sensitive host-version information via unspecified vectors.... Read more
Affected Products : backup_exec- Published: Aug. 05, 2013
- Modified: Apr. 11, 2025
-
2.7
LOWCVE-2019-0307
Diagnostics Agent in Solution Manager, version 7.2, stores several credentials such as SLD user connection as well as Solman user communication in the SAP Secure Storage file which is not encrypted by default. By decoding these credentials, an attacker wi... Read more
Affected Products : solution_manager- Published: Jun. 12, 2019
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2023-21963
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling). Supported versions that are affected are 5.7.40 and prior and 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with net... Read more
- Published: Apr. 18, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2024-29177
Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a disclosure of temporary sensitive information vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the re... Read more
Affected Products : data_domain_operating_system- Published: Jun. 26, 2024
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2024-10452
Organization admins can delete pending invites created in an organization they are not part of.... Read more
Affected Products : grafana- Published: Oct. 29, 2024
- Modified: Nov. 08, 2024
-
2.7
LOWCVE-2023-2252
The Directorist WordPress plugin before 7.5.4 is vulnerable to Local File Inclusion as it does not validate the file parameter when importing CSV files.... Read more
Affected Products : directorist- Published: Jan. 16, 2024
- Modified: Jun. 02, 2025