Latest CVE Feed
-
2.7
LOWCVE-2022-28815
In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 the Sentilo Proxy server was discovered to contain a SQL injection vulnerability allowing an attacker to query other tables of the Sentilo service.... Read more
- Published: Sep. 28, 2022
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2025-1088
In Grafana, an excessively long dashboard title or panel name will cause Chromium browsers to become unresponsive due to Improper Input Validation vulnerability in Grafana. This issue affects Grafana: before 11.6.2 and is fixed in 11.6.2 and higher.... Read more
Affected Products : grafana- Published: Jun. 18, 2025
- Modified: Jun. 18, 2025
- Vuln Type: Denial of Service
-
2.7
LOWCVE-2024-7296
An issue was discovered in GitLab EE affecting all versions from 16.5 prior to 17.7.7, 17.8 prior to 17.8.5, and 17.9 prior to 17.9.2 which allowed a user with a custom permission to approve pending membership requests beyond the maximum number of allowe... Read more
Affected Products : gitlab- Published: Mar. 13, 2025
- Modified: Aug. 06, 2025
- Vuln Type: Authorization
-
2.7
LOWCVE-2024-45135
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An admin attacker could leverage this vulnerability to bypass security mea... Read more
- Published: Oct. 10, 2024
- Modified: Oct. 11, 2024
-
2.7
LOWCVE-2024-45133
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Information Exposure vulnerability that could result in a security feature bypass. An admin attacker could leverage this vulnerability to have a low impact on c... Read more
- Published: Oct. 10, 2024
- Modified: Oct. 11, 2024
-
2.7
LOWCVE-2024-45149
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A high-privileged attacker could leverage this vulnerability to bypass sec... Read more
- Published: Oct. 10, 2024
- Modified: Dec. 12, 2024
-
2.7
LOWCVE-2024-23600
Improper Input Validation of query search results for private field data in PingIDM (Query Filter module) allows for a potentially efficient brute forcing approach leading to information disclosure.... Read more
Affected Products :- Published: Aug. 01, 2024
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2025-52968
xdg-open in xdg-utils through 1.2.1 can send requests containing SameSite=Strict cookies, which can facilitate CSRF. (For example, xdg-open could be modified to, by default, associate x-scheme-handler/https with the execution of a browser with command-lin... Read more
Affected Products : xdg-utils- Published: Jun. 23, 2025
- Modified: Jun. 23, 2025
- Vuln Type: Cross-Site Request Forgery
-
2.7
LOWCVE-2025-26698
Incorrect resource transfer between spheres issue exists in RevoWorks SCVX and RevoWorks Browser. If exploited, malicious files may be downloaded to the system where using the product.... Read more
Affected Products : revoworks_browser- Published: Feb. 26, 2025
- Modified: Feb. 26, 2025
- Vuln Type: Misconfiguration
-
2.7
LOWCVE-2023-28440
Discourse is an open source platform for community discussion. In affected versions a maliciously crafted request from a Discourse administrator can lead to a long-running request and eventual timeout. This has the greatest potential impact in shared host... Read more
Affected Products : discourse- Published: Apr. 18, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2025-46748
An authenticated user attempting to change their password could do so without using the current password.... Read more
Affected Products :- Published: May. 12, 2025
- Modified: May. 12, 2025
- Vuln Type: Authentication
-
2.7
LOWCVE-2022-31120
Nextcloud server is an open source personal cloud solution. The audit log is used to get a full trail of the actions which has been incompletely populated. In affected versions federated share events were not properly logged which would allow brute force ... Read more
- Published: Aug. 04, 2022
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2022-31177
Flask-AppBuilder is an application development framework built on top of Flask python framework. In versions prior to 4.1.3 an authenticated Admin user could query other users by their salted and hashed passwords strings. These filters could be made by us... Read more
- Published: Aug. 01, 2022
- Modified: Mar. 07, 2025
-
2.7
LOWCVE-2024-41156
Profile files from TRO600 series radios are extracted in plain-text and encrypted file formats. Profile files provide potential attackers valuable configuration information about the Tropos network. Profiles can only be exported by authenticated users wit... Read more
- Published: Oct. 29, 2024
- Modified: Dec. 05, 2024
-
2.7
LOWCVE-2024-23760
Cleartext Storage of Sensitive Information in Gambio 4.9.2.0 allows attackers to obtain sensitive information via error-handler.log.json and legacy-error-handler.log.txt under the webroot.... Read more
Affected Products : gambio- Published: Feb. 12, 2024
- Modified: Mar. 28, 2025
-
2.7
LOWCVE-2024-6694
The WP Mail SMTP plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 4.0.1. This is due to plugin providing the SMTP password in the SMTP Password field when viewing the settings. This makes it possible for aut... Read more
Affected Products :- Published: Jul. 20, 2024
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2025-30369
Zulip is an open-source team collaboration tool. The API for deleting an organization custom profile field is supposed to be restricted to organization administrators, but its handler failed to check that the field belongs to the same organization as the ... Read more
- Published: Mar. 31, 2025
- Modified: Aug. 27, 2025
- Vuln Type: Authorization
-
2.7
LOWCVE-2024-47266
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in share file list functionality in Synology Active Backup for Business before 2.7.1-13234, 2.7.1-23234 and 2.7.1-3234 allows remote authenticated users with admi... Read more
Affected Products :- Published: Feb. 13, 2025
- Modified: Feb. 13, 2025
- Vuln Type: Path Traversal
-
2.7
LOWCVE-2024-28830
Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p7, <2.2.0p28, <2.1.0p45 and <=2.0.0p39 (EOL) causes automation user secrets to be written to audit log files accessible to administrators.... Read more
- Published: Jun. 26, 2024
- Modified: Dec. 04, 2024
-
2.7
LOWCVE-2023-2252
The Directorist WordPress plugin before 7.5.4 is vulnerable to Local File Inclusion as it does not validate the file parameter when importing CSV files.... Read more
Affected Products : directorist- Published: Jan. 16, 2024
- Modified: Jun. 02, 2025