Latest CVE Feed
-
2.3
LOWCVE-2022-33699
Exposure of Sensitive Information in getDsaSimImsi in TelephonyUI prior to SMR Jul-2022 Release 1 allows local attacker to access imsi via log.... Read more
- Published: Jul. 12, 2022
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2024-52800
veraPDF is an open source PDF/A validation library. Executing policy checks using custom schematron files via the CLI invokes an XSL transformation that may theoretically lead to a remote code execution (RCE) vulnerability. This doesn't affect the standar... Read more
Affected Products :- Published: Nov. 29, 2024
- Modified: Nov. 29, 2024
-
2.3
LOWCVE-2024-23591
ThinkSystem SR670V2 servers manufactured from approximately June 2021 to July 2023 were left in Manufacturing Mode which could allow an attacker with privileged logical access to the host or physical access to server internals to modify or disable Intel... Read more
- Published: Feb. 16, 2024
- Modified: Jul. 23, 2025
-
2.3
LOWCVE-2025-8448
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists that could cause unauthorized access to sensitive credential data when an attacker is able to capture local SMB traffic between a valid user within the BMS network an... Read more
Affected Products :- Published: Aug. 20, 2025
- Modified: Sep. 09, 2025
- Vuln Type: Information Disclosure
-
2.3
LOWCVE-2025-43733
A reflected cross-site scripting (XSS) vulnerability in the Liferay Portal 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.7 allows a remote authenticated attacker to inject JavaScript code via the content page's name field. This malicious payload is... Read more
- Published: Aug. 18, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Cross-Site Scripting
-
2.3
LOWCVE-2022-33700
Exposure of Sensitive Information in putDsaSimImsi in TelephonyUI prior to SMR Jul-2022 Release 1 allows local attacker to access imsi via log.... Read more
- Published: Jul. 12, 2022
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2018-20893
cPanel before 74.0.0 allows file-rename operations during account renames (SEC-442).... Read more
Affected Products : cpanel- Published: Aug. 01, 2019
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2017-8118
The UMA product with software V200R001 and V300R001 has an information leak vulnerability. An attacker could exploit them to obtain some sensitive information, causing information leak.... Read more
Affected Products : uma- Published: Nov. 22, 2017
- Modified: Apr. 20, 2025
-
2.3
LOWCVE-2018-2923
Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: Core Services). The supported version that is affected is Prior to 8.7.20. Easily exploitable vulnerability allows high privileged attack... Read more
- Published: Jul. 18, 2018
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2017-15307
Huawei Honor 8 smartphone with software versions earlier than FRD-L04C567B389 and earlier than FRD-L14C567B389 have a permission control vulnerability due to improper authorization configuration on specific device information.... Read more
- Published: Dec. 22, 2017
- Modified: Apr. 20, 2025
-
2.3
LOWCVE-2024-51758
Filament is a collection of full-stack components for accelerated Laravel development. All Filament features that interact with storage use the `default_filesystem_disk` config option. This allows the user to easily swap their storage driver to something ... Read more
Affected Products : filament- Published: Nov. 07, 2024
- Modified: Nov. 21, 2024
-
2.2
LOWCVE-2024-21232
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with net... Read more
- Published: Oct. 15, 2024
- Modified: Mar. 13, 2025
-
2.2
LOWCVE-2024-21237
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication GCS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileg... Read more
- Published: Oct. 15, 2024
- Modified: Oct. 16, 2024
-
2.2
LOWCVE-2025-29991
Yubico YubiKey 5.4.1 through 5.7.3 before 5.7.4 has an incorrect FIDO CTAP PIN/UV Auth Protocol Two implementation. It uses the signature length from CTAP PIN/UV Auth Protocol One, even when CTAP PIN/UV Auth Protocol Two was chosen, resulting in a partial... Read more
Affected Products :- Published: Apr. 03, 2025
- Modified: Apr. 07, 2025
- Vuln Type: Authentication
-
2.2
LOWCVE-2024-32482
The Tillitis TKey signer device application is an ed25519 signing tool. A vulnerability has been found that makes it possible to disclose portions of the TKey’s data in RAM over the USB interface. To exploit the vulnerability an attacker needs to use a cu... Read more
Affected Products :- Published: Apr. 23, 2024
- Modified: Nov. 21, 2024
-
2.2
LOWCVE-2023-23349
Kaspersky has fixed a security issue in Kaspersky Password Manager (KPM) for Windows that allowed a local user to recover the auto-filled credentials from a memory dump when the KPM extension for Google Chrome is used. To exploit the issue, an attacker mu... Read more
Affected Products :- Published: Mar. 22, 2024
- Modified: Nov. 21, 2024
-
2.2
LOWCVE-2025-50100
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with ne... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Denial of Service
-
2.2
LOWCVE-2025-40571
A vulnerability has been identified in Mendix OIDC SSO (Mendix 10 compatible) (All versions < V4.1.0), Mendix OIDC SSO (Mendix 10.12 compatible) (All versions < V4.0.1), Mendix OIDC SSO (Mendix 9 compatible) (All versions). The Mendix OIDC SSO module gran... Read more
Affected Products :- Published: May. 13, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Authorization
-
2.2
LOWCVE-2024-4811
In affected versions of Octopus Server under certain conditions, a user with specific role assignments can access restricted project artifacts.... Read more
- Published: Jul. 25, 2024
- Modified: Jul. 02, 2025
-
2.2
LOWCVE-2024-53861
pyjwt is a JSON Web Token implementation in Python. An incorrect string comparison is run for `iss` checking, resulting in `"acb"` being accepted for `"_abc_"`. This is a bug introduced in version 2.10.0: checking the "iss" claim changed from `isinstance(... Read more
Affected Products : pyjwt- Published: Nov. 29, 2024
- Modified: Dec. 02, 2024