Latest CVE Feed
-
2.3
LOWCVE-2023-22313
Improper buffer restrictions in some Intel(R) QAT Library software before version 22.07.1 may allow a privileged user to potentially enable information disclosure via local access.... Read more
- Published: Nov. 14, 2023
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2020-9252
HUAWEI Mate 20 versions earlier than 10.1.0.160(C00E160R3P8), HUAWEI Mate 20 X versions earlier than 10.1.0.135(C00E135R2P8), HUAWEI Mate 20 RS versions earlier than 10.1.0.160(C786E160R3P8), and Honor Magic2 smartphones versions earlier than 10.1.0.160(C... Read more
Affected Products : mate_20_firmware mate_20_rs_firmware mate_20_x_firmware magic2_firmware mate_20 mate_20_x mate_20_rs magic2- Published: Jul. 17, 2020
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2020-16230
All version of Ewon Flexy and Cosy prior to 14.1 use wildcards such as (*) under which domains can request resources. An attacker with local access and high privileges could inject scripts into the Cross-origin Resource Sharing (CORS) configuration that c... Read more
- Published: Sep. 18, 2020
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2007-3442
Format string vulnerability on the Research in Motion BlackBerry 7270 before 4.0 SP1 Bundle 108 allows remote attackers to cause a denial of service (blocked call reception and calling) via format string specifiers in an SIP INVITE message that lacks a ho... Read more
Affected Products : blackberry_7270- Published: Jun. 27, 2007
- Modified: Apr. 09, 2025
-
2.3
LOWCVE-2024-51539
The Dell Secure Connect Gateway (SCG) Application and Appliance, versions prior to 5.28, contains a SQL injection vulnerability due to improper neutralization of special elements used in an SQL command. This vulnerability can only be exploited locally on ... Read more
Affected Products :- Published: Feb. 25, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Injection
-
2.3
LOWCVE-2019-10165
OpenShift Container Platform before version 4.1.3 writes OAuth tokens in plaintext to the audit logs for the Kubernetes API server and OpenShift API server. A user with sufficient privileges could recover OAuth tokens from these audit logs and use them to... Read more
- Published: Jul. 30, 2019
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2025-4754
Insufficient Session Expiration vulnerability in ash-project ash_authentication_phoenix allows Session Hijacking. This vulnerability is associated with program files lib/ash_authentication_phoenix/controller.ex. This issue affects ash_authentication_phoe... Read more
Affected Products : ash_authentication_phoenix- Published: Jun. 17, 2025
- Modified: Jul. 04, 2025
- Vuln Type: Authentication
-
2.3
LOWCVE-2025-9071
Erroneously using an all-zero seed for RSA-OEAP padding instead of the generated random bytes, in Oberon microsystems AG’s Oberon PSA Crypto library in all versions up to 1.5.1, results in deterministic RSA and thus in a loss of confidentiality for guessa... Read more
Affected Products :- Published: Aug. 29, 2025
- Modified: Aug. 29, 2025
- Vuln Type: Cryptography
-
2.3
LOWCVE-2020-11932
It was discovered that the Subiquity installer for Ubuntu Server logged the LUKS full disk encryption password if one was entered.... Read more
Affected Products : subiquity- Published: May. 13, 2020
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2021-41808
In M-Files Server product with versions before 21.11.10775.0, enabling logging of Federated authentication to event log wrote sensitive information to log. Mitigating factors are logging is disabled by default.... Read more
Affected Products : m-files_server- Published: Jan. 18, 2022
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2020-0382
In RunInternal of dumpstate.cpp, there is a possible user consent bypass due to an uncaught exception. This could lead to local information disclosure of bug report data with System execution privileges needed. User interaction is not needed for exploitat... Read more
Affected Products : android- Published: Sep. 17, 2020
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2025-2545
Vulnerability in Best Practical Solutions, LLC's Request Tracker prior to v5.0.8, where the Triple DES (3DES) cryptographic algorithm is used to protect emails sent with S/MIME encryption. Triple DES is considered obsolete and insecure due to its suscepti... Read more
Affected Products :- Published: May. 05, 2025
- Modified: May. 29, 2025
- Vuln Type: Cryptography
-
2.3
LOWCVE-2025-1795
During an address list folding when a separating comma ends up on a folded line and that line is to be unicode-encoded then the separator itself is also unicode-encoded. Expected behavior is that the separating comma remains a plan comma. This can result ... Read more
Affected Products : python- Published: Feb. 28, 2025
- Modified: Feb. 28, 2025
-
2.3
LOWCVE-2025-24369
Anubis is a tool that allows administrators to protect bots against AI scrapers through bot-checking heuristics and a proof-of-work challenge to discourage scraping from multiple IP addresses. Anubis allows attackers to bypass the bot protection by reques... Read more
Affected Products :- Published: Jan. 27, 2025
- Modified: Jan. 27, 2025
- Vuln Type: Authentication
-
2.3
LOWCVE-2025-22853
Improper synchronization in the firmware for some Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.... Read more
Affected Products :- Published: Aug. 12, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Authorization
-
2.3
LOWCVE-2023-45152
Engelsystem is a shift planning system for chaos events. A Blind SSRF in the "Import schedule" functionality makes it possible to perform a port scan against the local environment. This vulnerability has been fixed in commit ee7d30b33. If a patch cannot b... Read more
Affected Products : engelsystem- Published: Oct. 17, 2023
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2022-20240
In sOpAllowSystemRestrictionBypass of AppOpsManager.java, there is a possible leak of location information due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not... Read more
Affected Products : android- Published: Dec. 13, 2022
- Modified: Apr. 22, 2025
-
2.3
LOWCVE-2019-12756
Symantec Endpoint Protection (SEP), prior to 14.2 RU2 may be susceptible to a password protection bypass vulnerability whereby the secondary layer of password protection could by bypassed for individuals with local administrator rights.... Read more
Affected Products : endpoint_protection- Published: Nov. 15, 2019
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2021-21726
Some ZTE products have an input verification vulnerability in the diagnostic function interface. Due to insufficient verification of some parameters input by users, an attacker with high privileges can cause process exception by repeatedly inputting illeg... Read more
Affected Products : zxone_9700_firmware zxone_8700_firmware zxone_19700_firmware zxone_9700 zxone_8700 zxone_19700- Published: Mar. 12, 2021
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2021-22887
A vulnerability in the BIOS of Pulse Secure (PSA-Series Hardware) models PSA5000 and PSA7000 could allow an attacker to compromise BIOS firmware. This vulnerability can be exploited only as part of an attack chain. Before an attacker can compromise the BI... Read more
Affected Products : psa-5000_firmware psa-7000_firmware x10slh-f_firmware x10sll-f_firmware x10slm-f_firmware x10sll\+f_firmware x10slm\+-f_firmware x10slm\+ln4f_firmware x10sla-f_firmware x10sl7-f_firmware +14 more products- Published: Mar. 16, 2021
- Modified: Nov. 21, 2024