Latest CVE Feed
-
2.3
LOWCVE-2017-15307
Huawei Honor 8 smartphone with software versions earlier than FRD-L04C567B389 and earlier than FRD-L14C567B389 have a permission control vulnerability due to improper authorization configuration on specific device information.... Read more
- Published: Dec. 22, 2017
- Modified: Apr. 20, 2025
-
2.3
LOWCVE-2021-21726
Some ZTE products have an input verification vulnerability in the diagnostic function interface. Due to insufficient verification of some parameters input by users, an attacker with high privileges can cause process exception by repeatedly inputting illeg... Read more
Affected Products : zxone_9700_firmware zxone_8700_firmware zxone_19700_firmware zxone_9700 zxone_8700 zxone_19700- Published: Mar. 12, 2021
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2021-34397
Bootloader contains a vulnerability in NVIDIA MB2, which may cause free-the-wrong-heap, which may lead to limited denial of service.... Read more
- Published: Jun. 22, 2021
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2024-28238
Directus is a real-time API and App dashboard for managing SQL database content. When reaching the /files page, a JWT is passed via GET request. Inclusion of session tokens in URLs poses a security risk as URLs are often logged in various places (e.g., we... Read more
Affected Products : directus- Published: Mar. 12, 2024
- Modified: Jan. 03, 2025
-
2.3
LOWCVE-2020-29480
An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, mod... Read more
- Published: Dec. 15, 2020
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2020-2505
If exploited, this vulnerability could allow attackers to gain sensitive information via generation of error messages. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later.... Read more
Affected Products : qes- Published: Dec. 24, 2020
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2020-23250
GigaVUE-OS (GVOS) 5.4 - 5.9 uses a weak algorithm for a hash stored in internal database.... Read more
Affected Products : gigavue-os- Published: Jan. 05, 2021
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2013-4377
Use-after-free vulnerability in the virtio-pci implementation in Qemu 1.4.0 through 1.6.0 allows local users to cause a denial of service (daemon crash) by "hot-unplugging" a virtio device.... Read more
Affected Products : qemu- Published: Oct. 11, 2013
- Modified: Apr. 11, 2025
-
2.3
LOWCVE-2020-8991
vg_lookup in daemons/lvmetad/lvmetad-core.c in LVM2 2.02 mismanages memory, leading to an lvmetad memory leak, as demonstrated by running pvs. NOTE: RedHat disputes CVE-2020-8991 as not being a vulnerability since there’s no apparent route to either privi... Read more
Affected Products : lvm2- Published: Feb. 14, 2020
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2015-6556
EACommunicatorSrv.exe in the Framework Service in the client in Symantec Endpoint Encryption (SEE) before 11.1.0 allows remote authenticated users to discover credentials by triggering a memory dump.... Read more
Affected Products : endpoint_encryption- Published: Dec. 18, 2015
- Modified: Apr. 12, 2025
-
2.3
LOWCVE-2021-2207
Vulnerability in the Oracle Database - Enterprise Edition component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows high privileged attacker having RMAN executabl... Read more
- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2021-2042
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server ... Read more
- Published: Jan. 20, 2021
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2015-7885
The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.... Read more
Affected Products : linux_kernel- Published: Dec. 28, 2015
- Modified: Apr. 12, 2025
-
2.3
LOWCVE-2024-36032
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: qca: fix info leak when fetching fw build id Add the missing sanity checks and move the 255-byte build-id buffer off the stack to avoid leaking stack data through debugfs in ... Read more
Affected Products : linux_kernel- Published: May. 30, 2024
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2015-8569
The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mecha... Read more
Affected Products : linux_kernel- Published: Dec. 28, 2015
- Modified: Apr. 12, 2025
-
2.3
LOWCVE-2015-7884
The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application... Read more
Affected Products : linux_kernel- Published: Dec. 28, 2015
- Modified: Apr. 12, 2025
-
2.3
LOWCVE-2024-52966
An exposure of sensitive information to an unauthorized actor in Fortinet FortiAnalyzer 6.4.0 through 7.6.0 allows attacker to cause information disclosure via filter manipulation.... Read more
- Published: Feb. 11, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Information Disclosure
-
2.3
LOWCVE-2025-1795
During an address list folding when a separating comma ends up on a folded line and that line is to be unicode-encoded then the separator itself is also unicode-encoded. Expected behavior is that the separating comma remains a plan comma. This can result ... Read more
Affected Products : python- Published: Feb. 28, 2025
- Modified: Feb. 28, 2025
-
2.3
LOWCVE-2025-24369
Anubis is a tool that allows administrators to protect bots against AI scrapers through bot-checking heuristics and a proof-of-work challenge to discourage scraping from multiple IP addresses. Anubis allows attackers to bypass the bot protection by reques... Read more
Affected Products :- Published: Jan. 27, 2025
- Modified: Jan. 27, 2025
- Vuln Type: Authentication
-
2.3
LOWCVE-2022-23744
Check Point Endpoint before version E86.50 failed to protect against specific registry change which allowed to disable endpoint protection by a local administrator.... Read more
- Published: Jul. 07, 2022
- Modified: Nov. 21, 2024