Latest CVE Feed
-
2.7
LOWCVE-2024-51671
Missing Authorization vulnerability in ThemeIsle Otter - Gutenberg Block allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Otter - Gutenberg Block: from n/a through 3.0.3.... Read more
Affected Products : otter_blocks- Published: Nov. 19, 2024
- Modified: Nov. 19, 2024
-
2.7
LOWCVE-2022-40199
Directory traversal vulnerability in EC-CUBE 3 series (EC-CUBE 3.0.0 to 3.0.18-p4 ) and EC-CUBE 4 series (EC-CUBE 4.0.0 to 4.1.2) allows a remote authenticated attacker with an administrative privilege to obtain the product's directory structure informati... Read more
Affected Products : ec-cube- Published: Sep. 27, 2022
- Modified: May. 21, 2025
-
2.7
LOWCVE-2025-49549
Adobe Commerce versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12, 2.4.4-p13 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. A high-privileged attacker could leverage this vulnerability to b... Read more
- Published: Jun. 25, 2025
- Modified: Jul. 24, 2025
- Vuln Type: Authorization
-
2.7
LOWCVE-2024-47190
Northern.tech Hosted Mender before 2024.07.11 allows SSRF.... Read more
Affected Products :- Published: Nov. 08, 2024
- Modified: Nov. 08, 2024
-
2.7
LOWCVE-2024-30808
An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap-use-after-free in AP4_SubStream::~AP4_SubStream at Ap4ByteStream.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42ts.... Read more
Affected Products : bento4- Published: Apr. 02, 2024
- Modified: May. 27, 2025
-
2.7
LOWCVE-2025-30703
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via m... Read more
Affected Products : mysql_server- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Authorization
-
2.7
LOWCVE-2021-0991
In OnMetadataChangedListener of AdvancedBluetoothDetailsHeaderController.java, there is a possible leak of Bluetooth MAC addresses due to log information disclosure. This could lead to local information disclosure with System execution privileges needed. ... Read more
Affected Products : android- Published: Dec. 15, 2021
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2024-3177
A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the e... Read more
Affected Products : kubernetes- Published: Apr. 22, 2024
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2025-50098
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network a... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Denial of Service
-
2.7
LOWCVE-2023-48303
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, admins can change authentication details... Read more
- Published: Nov. 21, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2023-27410
A vulnerability has been identified in SCALANCE LPE9403 (All versions < V2.1). A heap-based buffer overflow vulnerability was found in the `edgebox_web_app` binary. The binary will crash if supplied with a backup password longer than 255 characters. This ... Read more
- Published: May. 09, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2023-29293
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Improper Input Validation vulnerability that could result in a Security feature bypass. An admin privileged attacker could leverage this vuln... Read more
- Published: Jun. 15, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2023-27266
Mattermost fails to honor the ShowEmailAddress setting when constructing a response to the /api/v4/users/me/teams API endpoint, allowing an attacker with team admin privileges to learn the team owner's email address in the response. ... Read more
- Published: Feb. 27, 2023
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2024-39353
Mattermost versions 9.5.x <= 9.5.5 and 9.8.0 fail to sanitize the RemoteClusterFrame payloads before audit logging them which allows a high privileged attacker with access to the audit logs to read message contents.... Read more
- Published: Jul. 03, 2024
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2024-4198
Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully validate role changes which allows an attacker authenticated as team admin to demote users to guest via crafted HTTP requests. ... Read more
Affected Products : mattermost_server- Published: Apr. 26, 2024
- Modified: May. 12, 2025
-
2.7
LOWCVE-2022-32756
IBM Security Verify Directory 10.0.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: ... Read more
Affected Products : security_verify_directory- Published: Mar. 22, 2024
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2024-47577
Webservice API endpoints for Assisted Service Module within SAP Commerce Cloud has information disclosure vulnerability. When an authorized agent searches for customer to manage their accounts, the request url includes customer data and it is recorded in ... Read more
Affected Products : commerce_cloud- Published: Dec. 10, 2024
- Modified: Dec. 10, 2024
-
2.7
LOWCVE-2023-2117
The Image Optimizer by 10web WordPress plugin before 1.0.27 does not sanitize the dir parameter when handling the get_subdirs ajax action, allowing a high privileged users such as admins to inspect names of files and directories outside of the sites root.... Read more
Affected Products : image_optimizer- Published: May. 30, 2023
- Modified: Jan. 10, 2025
-
2.7
LOWCVE-2024-40455
An arbitrary file deletion vulnerability in ThinkSAAS v3.7 allows attackers to delete arbitrary files via a crafted request.... Read more
Affected Products : thinksaas- Published: Jul. 16, 2024
- Modified: Apr. 28, 2025
-
2.7
LOWCVE-2013-5875
Unspecified vulnerability in Oracle Solaris 11.1 allows local users to affect integrity and availability via vectors related to Role Based Access Control (RBAC).... Read more
- Published: Jan. 15, 2014
- Modified: Apr. 11, 2025