Latest CVE Feed
-
2.7
LOWCVE-2025-26698
Incorrect resource transfer between spheres issue exists in RevoWorks SCVX and RevoWorks Browser. If exploited, malicious files may be downloaded to the system where using the product.... Read more
Affected Products : revoworks_browser- Published: Feb. 26, 2025
- Modified: Feb. 26, 2025
- Vuln Type: Misconfiguration
-
2.7
LOWCVE-2024-41156
Profile files from TRO600 series radios are extracted in plain-text and encrypted file formats. Profile files provide potential attackers valuable configuration information about the Tropos network. Profiles can only be exported by authenticated users wit... Read more
- Published: Oct. 29, 2024
- Modified: Dec. 05, 2024
-
2.7
LOWCVE-2025-46748
An authenticated user attempting to change their password could do so without using the current password.... Read more
Affected Products :- Published: May. 12, 2025
- Modified: May. 12, 2025
- Vuln Type: Authentication
-
2.7
LOWCVE-2022-31120
Nextcloud server is an open source personal cloud solution. The audit log is used to get a full trail of the actions which has been incompletely populated. In affected versions federated share events were not properly logged which would allow brute force ... Read more
- Published: Aug. 04, 2022
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2022-31177
Flask-AppBuilder is an application development framework built on top of Flask python framework. In versions prior to 4.1.3 an authenticated Admin user could query other users by their salted and hashed passwords strings. These filters could be made by us... Read more
- Published: Aug. 01, 2022
- Modified: Mar. 07, 2025
-
2.7
LOWCVE-2023-2400
Improper deletion of resource in the user management feature in Devolutions Server 2023.1.8 and earlier allows an administrator to view users vaults of deleted users via database access. ... Read more
Affected Products : devolutions_server- Published: Jun. 20, 2023
- Modified: Dec. 09, 2024
-
2.7
LOWCVE-2023-4216
The Orders Tracking for WooCommerce WordPress plugin before 1.2.6 doesn't validate the file_url parameter when importing a CSV file, allowing high privilege users with the manage_woocommerce capability to access any file on the web server via a Traversal ... Read more
Affected Products : orders_tracking_for_woocommerce- Published: Sep. 04, 2023
- Modified: Apr. 23, 2025
-
2.7
LOWCVE-2023-21882
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protoco... Read more
- Published: Jan. 18, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2023-22113
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multi... Read more
- Published: Oct. 17, 2023
- Modified: Jun. 12, 2025
-
2.7
LOWCVE-2023-21874
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple pr... Read more
- Published: Jan. 18, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2023-29293
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Improper Input Validation vulnerability that could result in a Security feature bypass. An admin privileged attacker could leverage this vuln... Read more
- Published: Jun. 15, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2013-4236
VDSM in Red Hat Enterprise Virtualization 3 and 3.2 allows privileged guest users to cause the host to become "unavailable to the managment server" via invalid XML characters in a guest agent response. NOTE: this issue is due to an incomplete fix for CVE... Read more
Affected Products : enterprise_virtualization- Published: Aug. 19, 2013
- Modified: Apr. 11, 2025
-
2.7
LOWCVE-2023-45809
Wagtail is an open source content management system built on Django. A user with a limited-permission editor account for the Wagtail admin can make a direct URL request to the admin view that handles bulk actions on user accounts. While authentication rul... Read more
- Published: Oct. 19, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2006-6607
The Java Key Store (JKS) for WebSphere Application Server (WAS) for IBM Tivoli Identity Manager (ITIM) 4.6 places the JKS password in a -Djavax.net.ssl.trustStorePassword command line argument, which allows local users to obtain the password by listing th... Read more
Affected Products : tivoli_identity_manager- Published: Dec. 18, 2006
- Modified: Apr. 09, 2025
-
2.7
LOWCVE-2025-27192
Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Insufficiently Protected Credentials vulnerability that could lead to a security feature bypass. A high privileged attacker could exploit this vul... Read more
- Published: Apr. 08, 2025
- Modified: May. 20, 2025
- Vuln Type: Authentication
-
2.7
LOWCVE-2025-30258
In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "ve... Read more
Affected Products : gnupg- Published: Mar. 19, 2025
- Modified: Mar. 19, 2025
- Vuln Type: Denial of Service
-
2.7
LOWCVE-2024-45134
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Information Exposure vulnerability that could result in a security feature bypass. An admin attacker could leverage this vulnerability to have a low impact on c... Read more
- Published: Oct. 10, 2024
- Modified: Oct. 11, 2024
-
2.7
LOWCVE-2013-0167
VDSM in Red Hat Enterprise Virtualization 3 and 3.2 allows privileged guest users to cause the host to become "unavailable to the managment server" via guestInfo dictionaries with "unexpected fields."... Read more
Affected Products : enterprise_virtualization- Published: Aug. 19, 2013
- Modified: Apr. 11, 2025
-
2.7
LOWCVE-2025-9821
SummaryUsers with webhook permissions can conduct SSRF via webhooks. If they have permission to view the webhook logs, the (partial) request response is also disclosed DetailsWhen sending webhooks, the destination is not validated, causing SSRF. Impact... Read more
Affected Products : mautic- Published: Sep. 03, 2025
- Modified: Sep. 04, 2025
- Vuln Type: Server-Side Request Forgery
-
2.7
LOWCVE-2025-36576
Dell Wyse Management Suite, versions prior to WMS 5.2, contain a Cross-Site Request Forgery (CSRF) vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Server-side request forgery.... Read more
Affected Products : wyse_management_suite- Published: Jun. 10, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Cross-Site Request Forgery