Latest CVE Feed
-
3.0
LOWCVE-2009-1981
Unspecified vulnerability in the Highly Interactive Client component in Siebel Product Suite 7.5.3, 7.7.2, 7.8.2, 8.0.0.5, and 8.1.0 allows local users to affect confidentiality and integrity via unknown vectors.... Read more
Affected Products : siebel_enterprise_suite- Published: Jul. 14, 2009
- Modified: Apr. 09, 2025
-
3.0
LOWCVE-2025-52136
In EMQX before 5.8.6, administrators can install arbitrary novel plugins via the Dashboard web interface. NOTE: the Supplier's position is that this is the intended behavior; however, 5.8.6 adds a defense-in-depth feature in which a plugin's acceptability... Read more
Affected Products : emqx- Published: Aug. 10, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Authentication
-
3.0
LOWCVE-2024-21257
Vulnerability in the Oracle Hyperion BI+ product of Oracle Hyperion (component: UI and Visualization). The supported version that is affected is 11.2.18.0.000. Easily exploitable vulnerability allows low privileged attacker with access to the physical c... Read more
Affected Products : hyperion_bi\+- Published: Oct. 15, 2024
- Modified: Nov. 06, 2024
-
3.0
LOWCVE-2013-2391
Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows local users to affect confidentiality and integrity via unknown vectors related to Server Install.... Read more
- Published: Apr. 17, 2013
- Modified: Apr. 11, 2025
-
3.0
LOWCVE-2020-14818
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). The supported version that is affected is 11. Difficult to exploit vulnerability allows low privileged attacker with network access via SSH to compromise Oracle Solaris. S... Read more
- Published: Oct. 21, 2020
- Modified: Nov. 21, 2024
-
3.0
LOWCVE-2024-24901
Dell PowerScale OneFS 8.2.x through 9.6.0.x contain an insufficient logging vulnerability. A local malicious user with high privileges could potentially exploit this vulnerability, causing audit messages lost and not recorded for a specific time period.... Read more
Affected Products : powerscale_onefs- Published: Mar. 04, 2024
- Modified: Jan. 08, 2025
-
3.0
LOWCVE-2011-0821
Unspecified vulnerability in Oracle Solaris 8, 9, and 10 allows local users to affect confidentiality and integrity via unknown vectors related to uucp.... Read more
- Published: Apr. 20, 2011
- Modified: Apr. 11, 2025
-
3.0
LOWCVE-2010-2374
Unspecified vulnerability in Solaris Studio 12 update 1 allows local users to affect confidentiality and integrity via unknown vectors.... Read more
Affected Products : solaris_studio- Published: Jul. 13, 2010
- Modified: Apr. 11, 2025
-
3.0
LOWCVE-2023-6950
An Improper Input Validation vulnerability affecting the FTP service running on the DJI Mavic Mini 3 Pro could allow an attacker to craft a malicious packet containing a malformed path provided to the FTP SIZE command that leads to a denial-of-service att... Read more
Affected Products :- Published: Apr. 02, 2024
- Modified: Nov. 21, 2024
-
3.0
LOWCVE-2022-33994
The Gutenberg plugin through 13.7.3 for WordPress allows stored XSS by the Contributor role via an SVG document to the "Insert from URL" feature. NOTE: the XSS payload does not execute in the context of the WordPress instance's domain; however, analogous ... Read more
Affected Products : gutenberg- Published: Jul. 30, 2022
- Modified: Nov. 21, 2024
-
3.0
LOWCVE-2024-42350
Biscuit is an authorization token with decentralized verification, offline attenuation and strong security policy enforcement based on a logic language. Third-party blocks can be generated without transferring the whole token to the third-party authority.... Read more
Affected Products :- Published: Aug. 05, 2024
- Modified: Aug. 06, 2024
-
3.0
LOWCVE-2024-45744
TopQuadrant TopBraid EDG stores external credentials insecurely. An authenticated attacker with file system access can read edg-setup.properites and obtain the secret to decrypt external passwords stored in edg-vault.properties. An authenticated attacker ... Read more
Affected Products : topbraid_edg- Published: Sep. 27, 2024
- Modified: Feb. 18, 2025
-
3.0
LOWCVE-2010-2378
Unspecified vulnerability in the PeopleSoft Enterprise CRM component in Oracle PeopleSoft and JDEdwards Suite CRM 9.0 Bundle #28 and CRM 9.1 Bundle #4 allows local users to affect confidentiality and integrity via unknown vectors.... Read more
Affected Products : peoplesoft_and_jdedwards_suite_crm- Published: Jul. 13, 2010
- Modified: Apr. 11, 2025
-
3.0
LOWCVE-2021-34396
Bootloader contains a vulnerability in access permission settings where unauthorized software may be able to overwrite NVIDIA MB2 code, which would result in limited denial of service.... Read more
- Published: Jun. 22, 2021
- Modified: Nov. 21, 2024
-
3.0
LOWCVE-2021-25743
kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events.... Read more
Affected Products : kubernetes- Published: Jan. 07, 2022
- Modified: Aug. 22, 2025
-
3.0
LOW- Published: Jun. 14, 2023
- Modified: Nov. 21, 2024
-
3.0
LOWCVE-2025-53018
Lychee is a free, open-source photo-management tool. Prior to version 6.6.13, a critical Server-Side Request Forgery (SSRF) vulnerability exists in the `/api/v2/Photo::fromUrl` endpoint. This flaw lets an attacker instruct the application’s backend to mak... Read more
Affected Products : lychee- Published: Jun. 27, 2025
- Modified: Jun. 30, 2025
- Vuln Type: Server-Side Request Forgery
-
3.0
LOWCVE-2014-2486
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 3.2.24, 4.0.26, 4.1.34, 4.2.26, and 4.3.12 allows local users to affect integrity and availability via unknown vectors related to Core, a different ... Read more
Affected Products : vm_virtualbox- Published: Jul. 17, 2014
- Modified: Apr. 12, 2025
-
3.0
LOWCVE-2014-0361
The default configuration of IBM 4690 OS, as used in Toshiba Global Commerce Solutions 4690 POS and other products, hashes passwords with the ADXCRYPT algorithm, which makes it easier for context-dependent attackers to obtain sensitive information via uns... Read more
- Published: Apr. 21, 2014
- Modified: Apr. 12, 2025
-
3.0
LOWCVE-2025-31363
Mattermost versions 10.4.x <= 10.4.2, 10.5.x <= 10.5.0, 9.11.x <= 9.11.9 fail to restrict domains the LLM can request to contact upstream which allows an authenticated user to exfiltrate data from an arbitrary server accessible to the victim via performin... Read more
Affected Products : mattermost_server- Published: Apr. 16, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Server-Side Request Forgery