Latest CVE Feed
-
2.2
LOWCVE-2025-52916
Yealink RPS before 2025-06-04 lacks SN verification attempt limits, enabling brute-force enumeration (last five digits).... Read more
Affected Products :- Published: Jun. 21, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Authentication
-
2.2
LOWCVE-2024-4811
In affected versions of Octopus Server under certain conditions, a user with specific role assignments can access restricted project artifacts.... Read more
- Published: Jul. 25, 2024
- Modified: Jul. 02, 2025
-
2.2
LOWCVE-2024-53861
pyjwt is a JSON Web Token implementation in Python. An incorrect string comparison is run for `iss` checking, resulting in `"acb"` being accepted for `"_abc_"`. This is a bug introduced in version 2.10.0: checking the "iss" claim changed from `isinstance(... Read more
Affected Products : pyjwt- Published: Nov. 29, 2024
- Modified: Dec. 02, 2024
-
2.2
LOWCVE-2024-28051
Out-of-bounds read in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable information disclosure via local access.... Read more
Affected Products :- Published: Nov. 13, 2024
- Modified: Nov. 15, 2024
-
2.2
LOWCVE-2024-51754
Twig is a template language for PHP. In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or... Read more
Affected Products : twig- Published: Nov. 06, 2024
- Modified: May. 29, 2025
-
2.2
LOWCVE-2024-51755
Twig is a template language for PHP. In a sandbox, an attacker can access attributes of Array-like objects as they were not checked by the security policy. They are now checked via the property policy and the `__isset()` method is now called after the sec... Read more
Affected Products : twig- Published: Nov. 06, 2024
- Modified: Nov. 08, 2024
-
2.2
LOWCVE-2025-0250
HCL IEM is affected by an authorization token sent in cookie vulnerability. A token used for authentication and authorization is being handled in a manner that may increase its exposure to security risks.... Read more
Affected Products :- Published: Jul. 25, 2025
- Modified: Jul. 25, 2025
- Vuln Type: Authorization
-
2.2
LOWCVE-2025-47818
Flock Safety Gunshot Detection devices before 1.3 have a hard-coded password for a connection.... Read more
Affected Products :- Published: Jun. 27, 2025
- Modified: Sep. 02, 2025
- Vuln Type: Misconfiguration
-
2.2
LOWCVE-2025-47821
Flock Safety Gunshot Detection devices before 1.3 have a hardcoded password for a system.... Read more
Affected Products :- Published: Jun. 27, 2025
- Modified: Sep. 02, 2025
- Vuln Type: Authentication
-
2.2
LOWCVE-2025-50100
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with ne... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Denial of Service
-
2.2
LOWCVE-2024-21244
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Telemetry). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network acces... Read more
- Published: Oct. 15, 2024
- Modified: Oct. 16, 2024
-
2.2
LOWCVE-2024-21243
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Telemetry). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network acces... Read more
- Published: Oct. 15, 2024
- Modified: Oct. 16, 2024
-
2.2
LOWCVE-2025-29991
Yubico YubiKey 5.4.1 through 5.7.3 before 5.7.4 has an incorrect FIDO CTAP PIN/UV Auth Protocol Two implementation. It uses the signature length from CTAP PIN/UV Auth Protocol One, even when CTAP PIN/UV Auth Protocol Two was chosen, resulting in a partial... Read more
Affected Products :- Published: Apr. 03, 2025
- Modified: Apr. 07, 2025
- Vuln Type: Authentication
-
2.2
LOWCVE-2025-27538
Mattermost versions 10.5.x <= 10.5.1, 9.11.x <= 9.11.9 fail to enforce MFA checks in PUT /api/v4/users/user-id/mfa when the requesting user differs from the target user ID, which allows users with edit_other_users permission to activate or deactivate MFA ... Read more
Affected Products : mattermost_server- Published: Apr. 16, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Authentication
-
2.1
LOWCVE-2010-2157
Unspecified vulnerability in CA ARCserve Backup r11.5 SP4, r12.0 SP2, and r12.5 SP1 on Windows allows local users to obtain sensitive information via unknown vectors.... Read more
Affected Products : windows- Published: Jun. 07, 2010
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2010-2224
The snapshot merging functionality in Red Hat Enterprise Virtualization Manager (aka RHEV-M) before 2.2 does not properly pass the postzero parameter during operations on deleted volumes, which allows guest OS users to obtain sensitive information by exam... Read more
- Published: Jun. 24, 2010
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2010-2223
Virtual Desktop Server Manager (VDSM) in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H or rhev-hypervisor) before 5.5-2.2 does not properly perform VM post-zeroing after the removal of a virtual machine's data, which allows guest OS users to ob... Read more
Affected Products : enterprise_virtualization_hypervisor- Published: Jun. 24, 2010
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2010-1539
Cross-site scripting (XSS) vulnerability in the Workflow module 5.x-2.x before 5.x-2.6 and 6.x-1.x before 6.x-1.4 for Drupal, when used with the Token module, might allow remote authenticated users to inject arbitrary web script or HTML via a certain Comm... Read more
- Published: Apr. 26, 2010
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2010-2123
Multiple cross-site scripting (XSS) vulnerabilities in the Storm module 5.x and 6.x before 6.x-1.33 for Drupal allow remote authenticated users, with certain module privileges, to inject arbitrary web script or HTML via the (1) fullname, (2) address, (3) ... Read more
- Published: Jun. 01, 2010
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a... Read more
- Published: Jun. 14, 2011
- Modified: Apr. 11, 2025