Latest CVE Feed
-
2.4
LOWCVE-2020-1795
There is a logic error vulnerability in several smartphones. The software does not properly restrict certain operation when the Digital Balance function is on. Successful exploit could allow the attacker to bypass the Digital Balance limit after a series ... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2020-4071
In django-basic-auth-ip-whitelist before 0.3.4, a potential timing attack exists on websites where the basic authentication is used or configured, i.e. BASIC_AUTH_LOGIN and BASIC_AUTH_PASSWORD is set. Currently the string comparison between configured cre... Read more
Affected Products : django-basic-auth-ip-whitelist- Published: Jun. 24, 2020
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2019-20534
An issue was discovered on Samsung mobile devices with P(9.0) software. Attackers can view home-screen wallpaper by adjusting the brightness of a locked screen. The Samsung ID is SVE-2019-15540 (December 2019).... Read more
Affected Products : android- Published: Mar. 24, 2020
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2019-15622
Not strictly enough sanitization in the Nextcloud Android app 3.6.0 allowed an attacker to get content information from protected tables when using custom queries.... Read more
Affected Products : nextcloud- Published: Feb. 04, 2020
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2020-1791
HUAWEI Mate 20 smartphones with versions earlier than 10.0.0.185(C00E74R3P8) have an improper authorization vulnerability. The system has a logic judging error under certain scenario, successful exploit could allow the attacker to switch to third desktop ... Read more
- Published: Feb. 18, 2020
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2020-1833
Honor 9X smartphones with versions earlier than 9.1.1.172(C00E170R8P1) have an improper authentication vulnerability. A logic error occurs when handling clock function, an attacker should do a series of crafted operations quickly before the phone is unloc... Read more
- Published: May. 29, 2020
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2019-19557
A misconfiguration in the debug interface in Mercedes-Benz HERMES 1 allows an attacker with direct physical access to device hardware to obtain cellular modem information.... Read more
Affected Products : hermes- Published: Nov. 16, 2020
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2019-19561
A misconfiguration in the debug interface in Mercedes-Benz HERMES 1.5 allows an attacker with direct physical access to device hardware to obtain cellular modem information.... Read more
Affected Products : hermes- Published: Nov. 16, 2020
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2025-47274
ToolHive is a utility designed to simplify the deployment and management of Model Context Protocol (MCP) servers. Due to the ordering of code used to start an MCP server container, versions of ToolHive prior to 0.0.33 inadvertently store secrets in the ru... Read more
Affected Products :- Published: May. 12, 2025
- Modified: May. 12, 2025
- Vuln Type: Information Disclosure
-
2.4
LOWCVE-2010-2397
Unspecified vulnerability in Oracle Sun Java System Application Server 8.0, 8.1, and 8.2; and GlassFish Enterprise Server 2.1.1; allows local users to affect confidentiality and integrity, related to the GUI.... Read more
- Published: Jul. 13, 2010
- Modified: Apr. 11, 2025
-
2.4
LOWCVE-2016-1000002
gdm3 3.14.2 and possibly later has an information leak before screen lock... Read more
- Published: Nov. 05, 2019
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2023-39843
Missing encryption in the RFID tag of Suleve 5-in-1 Smart Door Lock v1.0 allows attackers to create a cloned tag via brief physical proximity to the original device.... Read more
- Published: Aug. 15, 2023
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2021-41181
Nextcloud talk is a self hosting messaging service. In versions prior to 12.3.0 the Nextcloud Android Talk application did not properly detect the lockscreen state when a call was incoming. If an attacker got physical access to the locked phone, and the v... Read more
- Published: Mar. 08, 2022
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2021-1755
A lock screen issue allowed access to contacts on a locked device. This issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1. A person with physical access to an iOS device may be able to access contacts from the... Read more
Affected Products : macos- Published: Apr. 02, 2021
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2023-39842
Missing encryption in the RFID tag of Digoo DG-HAMB Smart Home Security System v1.0 allows attackers to create a cloned tag via brief physical proximity to the original device.... Read more
- Published: Aug. 15, 2023
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2022-33720
Improper authentication vulnerability in AppLock prior to SMR Aug-2022 Release 1 allows physical attacker to access Chrome locked by AppLock via new tap shortcut.... Read more
- Published: Aug. 05, 2022
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2024-34649
Improper access control in new Dex Mode in multitasking framework prior to SMR Sep-2024 Release 1 allows physical attackers to temporarily access an unlocked screen.... Read more
- Published: Sep. 04, 2024
- Modified: Sep. 05, 2024
-
2.4
LOWCVE-2022-48506
A flawed pseudorandom number generator in Dominion Voting Systems ImageCast Precinct (ICP and ICP2) and ImageCast Evolution (ICE) scanners allows anyone to determine the order in which ballots were cast from public ballot-level data, allowing deanonymizat... Read more
Affected Products : democracy_suite- Published: Jun. 19, 2023
- Modified: Jan. 02, 2025
-
2.4
LOWCVE-2021-30815
A lock screen issue allowed access to contacts on a locked device. This issue was addressed with improved state management. This issue is fixed in iOS 15 and iPadOS 15. A local attacker may be able to view contacts from the lock screen.... Read more
- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2024-23240
The issue was addressed with improved checks. This issue is fixed in iOS 17.4 and iPadOS 17.4. Shake-to-undo may allow a deleted photo to be re-surfaced without authentication.... Read more
- Published: Mar. 08, 2024
- Modified: Dec. 06, 2024