Latest CVE Feed
-
2.2
LOWCVE-2025-29991
Yubico YubiKey 5.4.1 through 5.7.3 before 5.7.4 has an incorrect FIDO CTAP PIN/UV Auth Protocol Two implementation. It uses the signature length from CTAP PIN/UV Auth Protocol One, even when CTAP PIN/UV Auth Protocol Two was chosen, resulting in a partial... Read more
Affected Products :- Published: Apr. 03, 2025
- Modified: Apr. 07, 2025
- Vuln Type: Authentication
-
2.2
LOWCVE-2023-23349
Kaspersky has fixed a security issue in Kaspersky Password Manager (KPM) for Windows that allowed a local user to recover the auto-filled credentials from a memory dump when the KPM extension for Google Chrome is used. To exploit the issue, an attacker mu... Read more
Affected Products :- Published: Mar. 22, 2024
- Modified: Nov. 21, 2024
-
2.2
LOWCVE-2024-23843
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Genians Genian NAC V5.0, Genians Genian NAC LTS V5.0.This issue affects Genian NAC V5.0: from V5.0.0 through V5.0.60; Genian NAC LTS V5.0: from 5.0.0 LTS... Read more
Affected Products :- Published: Oct. 28, 2024
- Modified: Oct. 28, 2024
-
2.2
LOWCVE-2025-47818
Flock Safety Gunshot Detection devices before 1.3 have a hard-coded password for a connection.... Read more
Affected Products :- Published: Jun. 27, 2025
- Modified: Sep. 02, 2025
- Vuln Type: Misconfiguration
-
2.2
LOWCVE-2025-47821
Flock Safety Gunshot Detection devices before 1.3 have a hardcoded password for a system.... Read more
Affected Products :- Published: Jun. 27, 2025
- Modified: Sep. 02, 2025
- Vuln Type: Authentication
-
2.2
LOWCVE-2025-0250
HCL IEM is affected by an authorization token sent in cookie vulnerability. A token used for authentication and authorization is being handled in a manner that may increase its exposure to security risks.... Read more
Affected Products :- Published: Jul. 25, 2025
- Modified: Jul. 25, 2025
- Vuln Type: Authorization
-
2.2
LOWCVE-2025-52916
Yealink RPS before 2025-06-04 lacks SN verification attempt limits, enabling brute-force enumeration (last five digits).... Read more
Affected Products :- Published: Jun. 21, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Authentication
-
2.2
LOWCVE-2025-47823
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have a hardcoded password for a system.... Read more
Affected Products :- Published: Jun. 27, 2025
- Modified: Sep. 02, 2025
- Vuln Type: Misconfiguration
-
2.2
LOWCVE-2024-29206
An Improper Access Control could allow a malicious actor authenticated in the API to enable Android Debug Bridge (ADB) and make unsupported changes to the system. Affected Products: UniFi Connect EV Station (Version 1.1.18 and earlier) UniFi Connec... Read more
Affected Products :- Published: May. 07, 2024
- Modified: Nov. 21, 2024
-
2.2
LOWCVE-2024-51755
Twig is a template language for PHP. In a sandbox, an attacker can access attributes of Array-like objects as they were not checked by the security policy. They are now checked via the property policy and the `__isset()` method is now called after the sec... Read more
Affected Products : twig- Published: Nov. 06, 2024
- Modified: Nov. 08, 2024
-
2.2
LOWCVE-2024-51754
Twig is a template language for PHP. In a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or... Read more
Affected Products : twig- Published: Nov. 06, 2024
- Modified: May. 29, 2025
-
2.2
LOWCVE-2024-21244
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Telemetry). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network acces... Read more
- Published: Oct. 15, 2024
- Modified: Oct. 16, 2024
-
2.2
LOWCVE-2025-6227
Mattermost versions 10.5.x <= 10.5.7, 9.11.x <= 9.11.16 fail to negotiate a new token when accepting the invite which allows a user that intercepts both invite and password to send synchronization payloads to the server that originally created the invite ... Read more
Affected Products : mattermost_server- Published: Jul. 18, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Authentication
-
2.2
LOWCVE-2017-1000401
The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being lo... Read more
Affected Products : jenkins- Published: Jan. 26, 2018
- Modified: Nov. 21, 2024
-
2.1
LOWCVE-2006-5173
Linux kernel does not properly save or restore EFLAGS during a context switch, or reset the flags when creating new threads, which allows local users to cause a denial of service (process crash), as demonstrated using a process that sets the Alignment Che... Read more
- Published: Oct. 17, 2006
- Modified: Apr. 09, 2025
-
2.1
LOWCVE-2006-0512
PADL MigrationTools 46 creates temporary files insecurely, which allows local users to overwrite arbitrary files via a symlink attack on the temporary files, which are not properly created by (1) migrate_all_online.sh, (2) migrate_all_offline.sh, (3) migr... Read more
Affected Products : migrationtools- Published: Feb. 02, 2006
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-1999-0105
finger allows recursive searches by using a long string of @ symbols.... Read more
Affected Products :- Published: Mar. 01, 1997
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2006-2071
Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue wit... Read more
- Published: Apr. 27, 2006
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2002-0881
Cisco IP Phone (VoIP) models 7910, 7940, and 7960 use a default administrative password, which allows attackers with physical access to the phone to modify the configuration settings.... Read more
- Published: Oct. 04, 2002
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2005-1841
The control for Adobe Reader 5.0.9 and 5.0.10 on Linux, Solaris, HP-UX, and AIX creates temporary files with the permissions as specified in a user's umask, which could allow local users to read PDF documents of that user if the umask allows it.... Read more
Affected Products : acrobat_reader- Published: Jul. 07, 2005
- Modified: Apr. 03, 2025