Latest CVE Feed
-
2.4
LOWCVE-2020-9848
An authorization issue was addressed with improved state management. This issue is fixed in iOS 13.5 and iPadOS 13.5. A person with physical access to an iOS device may be able to view notification contents from the lockscreen.... Read more
- Published: Jun. 09, 2020
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2016-7765
An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "Clipboard" component, which allows physically proximate attackers to obtain sensitive information in the lockscreen state by viewing clipboard contents... Read more
Affected Products : iphone_os- Published: Feb. 20, 2017
- Modified: Apr. 20, 2025
-
2.4
LOWCVE-2013-7393
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2... Read more
Affected Products : subversion- Published: Jul. 28, 2014
- Modified: Apr. 12, 2025
-
2.4
LOWCVE-2016-7664
An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "Accessibility" component. which allows physically proximate attackers to obtain sensitive photo and contact information by leveraging the availability ... Read more
Affected Products : iphone_os- Published: Feb. 20, 2017
- Modified: Apr. 20, 2025
-
2.4
LOWCVE-2024-29338
Anchor CMS v0.12.7 was discovered to contain a Cross-Site Request Forgery (CSRF) via /anchor/admin/categories/delete/2.... Read more
Affected Products : anchor_cms- Published: Mar. 22, 2024
- Modified: Mar. 28, 2025
-
2.4
LOWCVE-2021-25348
Improper permission grant check in Samsung Internet prior to version 13.0.1.60 allows access to files in internal storage without authorized STORAGE permission.... Read more
Affected Products : internet- Published: Mar. 04, 2021
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2024-20855
Improper access control vulnerability in multitasking framework prior to SMR May-2024 Release 1 allows physical attackers to access unlocked screen for a while.... Read more
- Published: May. 07, 2024
- Modified: Feb. 07, 2025
-
2.4
LOWCVE-2024-22412
ClickHouse is an open-source column-oriented database management system. A bug exists in the cloud ClickHouse offering prior to version 24.0.2.54535 and in github.com/clickhouse/clickhouse version 23.1. Query caching bypasses the role based access control... Read more
Affected Products : clickhouse- Published: Mar. 18, 2024
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2024-48909
SpiceDB is an open source database for scalably storing and querying fine-grained authorization data. Starting in version 1.35.0 and prior to version 1.37.1, clients that have enabled `LookupResources2` and have caveats in the evaluation path for their re... Read more
Affected Products : spicedb- Published: Oct. 14, 2024
- Modified: Oct. 17, 2024
-
2.4
LOWCVE-2020-9073
Huawei P20 smartphones with versions earlier than 10.0.0.156(C00E156R1P4) have an improper authentication vulnerability. The vulnerability is due to that when an user wants to do certain operation, the software insufficiently validate the user's identity.... Read more
- Published: May. 15, 2020
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2020-8352
In some Lenovo Desktop models, the Configuration Change Detection BIOS setting failed to detect SATA configuration changes.... Read more
- Published: Nov. 11, 2020
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2019-8599
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 12.3. A person with physical access to an iOS device may be able to see the email address used for iTunes.... Read more
Affected Products : iphone_os- Published: Dec. 18, 2019
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2019-19533
In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.... Read more
Affected Products : linux_kernel- Published: Dec. 03, 2019
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2024-27314
Zoho ManageEngine ServiceDesk Plus versions below 14730, ServiceDesk Plus MSP below 14720 and SupportCenter Plus below 14720 are vulnerable to stored XSS in the Custom Actions menu on the request details. This vulnerability can be exploited only by the SD... Read more
- Published: May. 27, 2024
- Modified: Jun. 17, 2025
-
2.4
LOWCVE-2024-27835
This issue was addressed through improved state management. This issue is fixed in iOS 17.5 and iPadOS 17.5. An attacker with physical access to an iOS device may be able to access notes from the lock screen.... Read more
- Published: May. 14, 2024
- Modified: Dec. 12, 2024
-
2.4
LOWCVE-2010-3513
Unspecified vulnerability in Oracle Solaris 9 and 10, and OpenSolaris, allows local users to affect integrity and availability via unknown vectors related to Device Drivers.... Read more
- Published: Oct. 14, 2010
- Modified: Apr. 11, 2025
-
2.4
LOWCVE-2019-8682
The issue was addressed with improved UI handling. This issue is fixed in iOS 12.4, watchOS 5.3. A user may inadvertently complete an in-app purchase while on the lock screen.... Read more
- Published: Dec. 18, 2019
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2019-8775
The issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 13.1 and iPadOS 13.1. A person with physical access to an iOS device may be able to access contacts from the lock screen.... Read more
- Published: Dec. 18, 2019
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2019-8777
A lock screen issue allowed access to contacts on a locked device. This issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. A local attacke... Read more
- Published: Oct. 27, 2020
- Modified: Nov. 21, 2024
-
2.4
LOWCVE-2020-1797
HUAWEI Mate 20 smartphones with versions earlier than 10.0.0.185(C00E74R3P8) have an improper authorization vulnerability. The system does not properly restrict certain operation in ADB mode, successful exploit could allow certain user break the limit of ... Read more
- Published: May. 29, 2020
- Modified: Nov. 21, 2024