Latest CVE Feed
-
2.7
LOWCVE-2024-10098
The ApplyOnline WordPress plugin before 2.6.3 does not protect uploaded files during the application process, allowing unauthenticated users to access them and any private information they contain... Read more
Affected Products : applyonline_-_application_form_builder_and_manager- Published: May. 15, 2025
- Modified: Jun. 09, 2025
- Vuln Type: Information Disclosure
-
2.7
LOWCVE-2025-48059
PowSyBl (Power System Blocks) is a framework to build power system oriented software. In com.powsybl:powsybl-iidm-criteria versions 6.3.0 to before 6.7.2 and com.powsybl:powsybl-contingency-api versions 5.0.0 to before 6.3.0, there is a a potential polyno... Read more
Affected Products :- Published: Jun. 20, 2025
- Modified: Jun. 23, 2025
- Vuln Type: Denial of Service
-
2.7
LOWCVE-2025-27192
Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Insufficiently Protected Credentials vulnerability that could lead to a security feature bypass. A high privileged attacker could exploit this vul... Read more
- Published: Apr. 08, 2025
- Modified: May. 20, 2025
- Vuln Type: Authentication
-
2.7
LOWCVE-2025-24474
An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiManager 7.6.0 through 7.6.1, 7.4.0 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions; FortiManager Cloud 7.4.1 through... Read more
- Published: Jul. 08, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Injection
-
2.7
LOWCVE-2019-2872
Vulnerability in the Oracle Retail Xstore Point of Service product of Oracle Retail Applications (component: Point of Sale). Supported versions that are affected are 17.0.3, 18.0.1 and 19.0.0. Difficult to exploit vulnerability allows physical access to c... Read more
Affected Products : retail_xstore_point_of_service- Published: Oct. 16, 2019
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2019-3729
RSA BSAFE Micro Edition Suite versions prior to 4.4 (in 4.0.x, 4.1.x, 4.2.x and 4.3.x) are vulnerable to a Heap-based Buffer Overflow vulnerability when parsing ECDSA signature. A malicious user with adjacent network access could potentially exploit this ... Read more
- Published: Sep. 30, 2019
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2025-49843
conda-smithy is a tool for combining a conda recipe with configurations to build using freely hosted CI services into a single repository. Prior to version 3.47.1, the travis_headers function in the conda-smithy repository creates files with permissions e... Read more
Affected Products :- Published: Jun. 17, 2025
- Modified: Jun. 18, 2025
- Vuln Type: Misconfiguration
-
2.7
LOWCVE-2025-53113
GLPI, which stands for Gestionnaire Libre de Parc Informatique, is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions 0.65 through 10.0.18, a technician can use t... Read more
Affected Products : glpi- Published: Jul. 30, 2025
- Modified: Aug. 04, 2025
- Vuln Type: Authorization
-
2.7
LOWCVE-2025-2988
IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.7, 6.2.0.0 through 6.2.0.4, and 6.2.1.0 could disclose sensitive server information to an unauthorized user that could aid in further attacks against the system.... Read more
- Published: Aug. 19, 2025
- Modified: Aug. 20, 2025
- Vuln Type: Information Disclosure
-
2.7
LOWCVE-2009-3406
Unspecified vulnerability in the JD Edwards Tools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.98.2.1 allows remote authenticated users to affect confidentiality via unknown vectors.... Read more
- Published: Oct. 22, 2009
- Modified: Apr. 09, 2025
-
2.7
LOWCVE-2024-10672
The Multiple Page Generator Plugin – MPG plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the mpg_upsert_project_source_block() function in all versions up to, and including, 4.0.2. This makes it po... Read more
Affected Products : multiple_page_generator- Published: Nov. 12, 2024
- Modified: Nov. 14, 2024
-
2.7
LOWCVE-2013-0167
VDSM in Red Hat Enterprise Virtualization 3 and 3.2 allows privileged guest users to cause the host to become "unavailable to the managment server" via guestInfo dictionaries with "unexpected fields."... Read more
Affected Products : enterprise_virtualization- Published: Aug. 19, 2013
- Modified: Apr. 11, 2025
-
2.7
LOWCVE-2006-6607
The Java Key Store (JKS) for WebSphere Application Server (WAS) for IBM Tivoli Identity Manager (ITIM) 4.6 places the JKS password in a -Djavax.net.ssl.trustStorePassword command line argument, which allows local users to obtain the password by listing th... Read more
Affected Products : tivoli_identity_manager- Published: Dec. 18, 2006
- Modified: Apr. 09, 2025
-
2.7
LOWCVE-2023-48429
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). The Web UI of affected devices does not check the length of parameters in certain conditions. This allows a malicious admin to crash the server by sending a crafted reque... Read more
Affected Products : sinec_ins- Published: Dec. 12, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2023-48430
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). The REST API of affected devices does not check the length of parameters in certain conditions. This allows a malicious admin to crash the server by sending a crafted req... Read more
Affected Products : sinec_ins- Published: Dec. 12, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2023-45809
Wagtail is an open source content management system built on Django. A user with a limited-permission editor account for the Wagtail admin can make a direct URL request to the admin view that handles bulk actions on user accounts. While authentication rul... Read more
- Published: Oct. 19, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2023-21882
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protoco... Read more
- Published: Jan. 18, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2023-21874
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple pr... Read more
- Published: Jan. 18, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2024-30507
Authorization Bypass Through User-Controlled Key vulnerability in Molongui.This issue affects Molongui: from n/a through 4.7.7. ... Read more
Affected Products :- Published: Mar. 29, 2024
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2024-3034
The BackUpWordPress plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.13 via the hmbkp_directory_browse parameter. This makes it possible for authenticated attackers, with administrator-level access and abov... Read more
Affected Products : backupwordpress- Published: Apr. 27, 2024
- Modified: Nov. 21, 2024