Latest CVE Feed
-
2.2
LOWCVE-2024-32482
The Tillitis TKey signer device application is an ed25519 signing tool. A vulnerability has been found that makes it possible to disclose portions of the TKey’s data in RAM over the USB interface. To exploit the vulnerability an attacker needs to use a cu... Read more
Affected Products :- Published: Apr. 23, 2024
- Modified: Nov. 21, 2024
-
2.2
LOWCVE-2024-21101
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.5.33 and prior, 7.6.29 and prior, 8.0.36 and prior and 8.3.0 and prior. Difficult to exploit vulnerability allows high p... Read more
- Published: Apr. 16, 2024
- Modified: Feb. 10, 2025
-
2.2
LOWCVE-2025-47821
Flock Safety Gunshot Detection devices before 1.3 have a hardcoded password for a system.... Read more
Affected Products :- Published: Jun. 27, 2025
- Modified: Sep. 02, 2025
- Vuln Type: Authentication
-
2.2
LOWCVE-2025-47823
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have a hardcoded password for a system.... Read more
Affected Products :- Published: Jun. 27, 2025
- Modified: Sep. 02, 2025
- Vuln Type: Misconfiguration
-
2.2
LOWCVE-2025-47818
Flock Safety Gunshot Detection devices before 1.3 have a hard-coded password for a connection.... Read more
Affected Products :- Published: Jun. 27, 2025
- Modified: Sep. 02, 2025
- Vuln Type: Misconfiguration
-
2.2
LOWCVE-2025-0250
HCL IEM is affected by an authorization token sent in cookie vulnerability. A token used for authentication and authorization is being handled in a manner that may increase its exposure to security risks.... Read more
Affected Products :- Published: Jul. 25, 2025
- Modified: Jul. 25, 2025
- Vuln Type: Authorization
-
2.2
LOWCVE-2024-28051
Out-of-bounds read in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable information disclosure via local access.... Read more
Affected Products :- Published: Nov. 13, 2024
- Modified: Nov. 15, 2024
-
2.2
LOWCVE-2024-53564
A vulnerability was discovered in FreePBX 17.0.19.17. It does not verify the type of uploaded (valid FreePBX module) files, allowing high-privilege administrators to insert unwanted files. NOTE: the Supplier's position is that there is no risk beyond what... Read more
Affected Products : freepbx- Published: Dec. 02, 2024
- Modified: Jan. 09, 2025
-
2.2
LOWCVE-2024-29208
An Unverified Password Change could allow a malicious actor with API access to the device to change the system password without knowing the previous password. Affected Products: UniFi Connect EV Station (Version 1.1.18 and earlier) UniFi Connect EV... Read more
Affected Products :- Published: May. 07, 2024
- Modified: Nov. 21, 2024
-
2.2
LOWCVE-2024-28030
NULL pointer dereference in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable denial of service via local access.... Read more
Affected Products :- Published: Nov. 13, 2024
- Modified: Nov. 15, 2024
-
2.2
LOWCVE-2024-53861
pyjwt is a JSON Web Token implementation in Python. An incorrect string comparison is run for `iss` checking, resulting in `"acb"` being accepted for `"_abc_"`. This is a bug introduced in version 2.10.0: checking the "iss" claim changed from `isinstance(... Read more
Affected Products : pyjwt- Published: Nov. 29, 2024
- Modified: Dec. 02, 2024
-
2.2
LOWCVE-2024-21232
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with net... Read more
- Published: Oct. 15, 2024
- Modified: Mar. 13, 2025
-
2.1
LOWCVE-2013-3043
Directory traversal vulnerability in the client in IBM Rational Software Architect Design Manager and Rhapsody Design Manager 3.x and 4.x before 4.0.5 allows local users to read arbitrary files via vectors involving temporary files.... Read more
- Published: Dec. 14, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2010-2539
Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files.... Read more
- Published: Aug. 02, 2010
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2008-5690
The Kerberos credential renewal feature in Sun Solaris 8, 9, and 10, and OpenSolaris build snv_01 through snv_104, allows local users to cause a denial of service (authentication failure) via unspecified vectors related to incorrect cache file permissions... Read more
- Published: Dec. 19, 2008
- Modified: Apr. 09, 2025
-
2.1
LOWCVE-2013-4614
English/pages_MacUS/wls_set_content.html on the Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922 printers shows the Wi-Fi PSK passphrase in cleartext, which allows physically proximate attackers to obtain sensitive information by... Read more
- Published: Jun. 21, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2012-1766
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than... Read more
Affected Products : fusion_middleware- Published: Jul. 17, 2012
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2013-4503
Cross-site scripting (XSS) vulnerability in the Feed Element Mapper module for Drupal allows remote authenticated users with the "administer taxonomy" permission to inject arbitrary web script or HTML via vectors related to options.... Read more
Affected Products : feed_element_mapper- Published: May. 13, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2013-3745
Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 allows local users to affect availability via unknown vectors related to Libraries/Libc.... Read more
- Published: Jul. 17, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2013-2978
Absolute path traversal vulnerability in the server in IBM Cognos Business Intelligence (BI) 8.4.1, 10.1, 10.1.1, 10.2, and 10.2.1 allows remote authenticated users to read files by leveraging the Report Author privilege, a different vulnerability than CV... Read more
Affected Products : cognos_business_intelligence- Published: Aug. 27, 2013
- Modified: Apr. 11, 2025