Latest CVE Feed
-
2.4
LOWCVE-2021-30956
A lock screen issue allowed access to contacts on a locked device. This issue was addressed with improved state management. This issue is fixed in iOS 15.2 and iPadOS 15.2. An attacker with physical access to a device may be able to see private contact in... Read more
- Published: Aug. 24, 2021
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2021-27456
Philips Gemini PET/CT family software stores sensitive information in a removable media device that does not have built-in access control.... Read more
- Published: Mar. 23, 2022
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2017-7139
An issue was discovered in certain Apple products. iOS before 11 is affected. The issue involves the "Phone" component. It allows attackers to obtain sensitive information by leveraging a timing bug to read a secure-content screenshot that occurred during... Read more
Affected Products : iphone_os- Published: Oct. 23, 2017
- Modified: Apr. 20, 2025
-
2.4
LOWCVE-2017-7058
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. The issue involves the "Notifications" component. It allows physically proximate attackers to read unintended notifications on the lock screen.... Read more
Affected Products : iphone_os- Published: Jul. 20, 2017
- Modified: Apr. 20, 2025
-
2.4
LOWCVE-2017-8087
Information Leakage in PPPoE Packet Padding in AVM Fritz!Box 7490 with Firmware versions Fritz!OS 6.80 and 6.83 allows physically proximate attackers to view slices of previously transmitted packets or portions of memory via via unspecified vectors.... Read more
- Published: Oct. 22, 2019
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2024-20855
Improper access control vulnerability in multitasking framework prior to SMR May-2024 Release 1 allows physical attackers to access unlocked screen for a while.... Read more
- Published: May. 07, 2024
- Modified: Feb. 07, 2025
-
2.4
LOWCVE-2024-48909
SpiceDB is an open source database for scalably storing and querying fine-grained authorization data. Starting in version 1.35.0 and prior to version 1.37.1, clients that have enabled `LookupResources2` and have caveats in the evaluation path for their re... Read more
Affected Products : spicedb- Published: Oct. 14, 2024
- Modified: Oct. 17, 2024
-
2.4
LOWCVE-2022-32870
A logic issue was addressed with improved state management. This issue is fixed in iOS 16, macOS Ventura 13, watchOS 9. A user with physical access to a device may be able to use Siri to obtain some call history information.... Read more
- Published: Nov. 01, 2022
- Modified: May. 06, 2025
-
2.4
LOWCVE-2021-1756
A lock screen issue allowed access to contacts on a locked device. This issue was addressed with improved state management. This issue is fixed in iOS 14.4 and iPadOS 14.4. An attacker with physical access to a device may be able to see private contact in... Read more
- Published: Apr. 02, 2021
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2024-42496
Smart-tab Android app installed April 2023 or earlier contains an issue with plaintext storage of a password. If this vulnerability is exploited, an attacker with physical access to the device may retrieve the credential information and spoof the device t... Read more
Affected Products :- Published: Sep. 30, 2024
- Modified: Sep. 30, 2024
-
2.4
LOWCVE-2024-40851
This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18.1 and iPadOS 18.1. An attacker with physical access may be able to access contact photos from the lock screen.... Read more
- Published: Oct. 28, 2024
- Modified: Oct. 30, 2024
-
2.4
LOWCVE-2013-5762
Unspecified vulnerability in the Oracle Siebel CTMS component in Oracle Industry Applications 8.1.1.x allows local users to affect confidentiality and availability via unknown vectors related to SC-OC Integration.... Read more
Affected Products : industry_applications- Published: Oct. 16, 2013
- Modified: Apr. 11, 2025
-
2.4
LOWCVE-2024-32325
TOTOLINK EX200 V4.0.3c.7646_B20201211 contains a Cross-site scripting (XSS) vulnerability through the ssid parameter in the setWiFiExtenderConfig function.... Read more
- Published: Apr. 18, 2024
- Modified: May. 13, 2025
-
2.4
LOWCVE-2019-4266
IBM Maximo Anywhere 7.6.2.0, 7.6.2.1, 7.6.3.0, and 7.6.3.1 does not have device jailbreak detection which could result in an attacker gaining sensitive information about the device. IBM X-Force ID: 160199.... Read more
Affected Products : maximo_anywhere- Published: May. 06, 2020
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2019-4352
IBM Maximo Anywhere 7.6.4.0 applications could allow obfuscation of the application source code. IBM X-Force ID: 161494.... Read more
Affected Products : maximo_anywhere- Published: Feb. 16, 2022
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2019-5452
Bypass lock protection in the Nextcloud Android app prior to version 3.6.2 causes leaking of thumbnails when requesting the Android content provider although the lock protection was not solved.... Read more
Affected Products : nextcloud- Published: Jul. 30, 2019
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2019-5308
Mate 20 RS smartphones with versions earlier than 9.1.0.135(C786E133R3P1) have an improper authorization vulnerability. The software does not properly restrict certain operation in ADB mode, successful exploit could allow the attacker to switch to third d... Read more
- Published: Nov. 29, 2019
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2025-52687
Successful exploitation of the vulnerability could allow an attacker with administrator credentials for the access point to inject malicious JavaScript into the payload of web traffics, potentially leading to session hijacking and denial-of-service (DoS).... Read more
Affected Products :- Published: Jul. 16, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Injection
-
2.4
LOWCVE-2020-8352
In some Lenovo Desktop models, the Configuration Change Detection BIOS setting failed to detect SATA configuration changes.... Read more
- Published: Nov. 11, 2020
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2020-9251
HUAWEI Mate 20 smartphones with versions earlier than 10.1.0.160(C00E160R2P11) have an improper authorization vulnerability. The software does not properly restrict certain operation in certain scenario, the attacker should do certain configuration before... Read more
- Published: Jul. 27, 2020
- Modified: Nov. 21, 2024