Latest CVE Feed
-
2.3
LOWCVE-2025-24369
Anubis is a tool that allows administrators to protect bots against AI scrapers through bot-checking heuristics and a proof-of-work challenge to discourage scraping from multiple IP addresses. Anubis allows attackers to bypass the bot protection by reques... Read more
Affected Products :- Published: Jan. 27, 2025
- Modified: Jan. 27, 2025
- Vuln Type: Authentication
-
2.3
LOWCVE-2025-22853
Improper synchronization in the firmware for some Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.... Read more
Affected Products :- Published: Aug. 12, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Authorization
-
2.3
LOWCVE-2024-52966
An exposure of sensitive information to an unauthorized actor in Fortinet FortiAnalyzer 6.4.0 through 7.6.0 allows attacker to cause information disclosure via filter manipulation.... Read more
- Published: Feb. 11, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Information Disclosure
-
2.3
LOWCVE-2014-2495
Unspecified vulnerability in the PeopleSoft Enterprise SCM Purchasing component in Oracle PeopleSoft Products 9.1 and 9.2 allows remote authenticated users to affect confidentiality via unknown vectors related to Purchasing.... Read more
Affected Products : peoplesoft_products- Published: Jul. 17, 2014
- Modified: Apr. 12, 2025
-
2.3
LOWCVE-2021-34397
Bootloader contains a vulnerability in NVIDIA MB2, which may cause free-the-wrong-heap, which may lead to limited denial of service.... Read more
- Published: Jun. 22, 2021
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2022-33700
Exposure of Sensitive Information in putDsaSimImsi in TelephonyUI prior to SMR Jul-2022 Release 1 allows local attacker to access imsi via log.... Read more
- Published: Jul. 12, 2022
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2024-20914
Vulnerability in the Oracle ZFS Storage Appliance Kit product of Oracle Systems (component: Core). The supported version that is affected is 8.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Ora... Read more
Affected Products : zfs_storage_appliance_kit- Published: Jan. 16, 2024
- Modified: Jun. 03, 2025
-
2.3
LOWCVE-2022-33699
Exposure of Sensitive Information in getDsaSimImsi in TelephonyUI prior to SMR Jul-2022 Release 1 allows local attacker to access imsi via log.... Read more
- Published: Jul. 12, 2022
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2018-2923
Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: Core Services). The supported version that is affected is Prior to 8.7.20. Easily exploitable vulnerability allows high privileged attack... Read more
- Published: Jul. 18, 2018
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2017-8118
The UMA product with software V200R001 and V300R001 has an information leak vulnerability. An attacker could exploit them to obtain some sensitive information, causing information leak.... Read more
Affected Products : uma- Published: Nov. 22, 2017
- Modified: Apr. 20, 2025
-
2.3
LOWCVE-2025-22482
A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow remote attackers who have gained user access to obtain secret data or modify memory. We have already fixed t... Read more
Affected Products : qsync_central- Published: Jun. 06, 2025
- Modified: Jun. 09, 2025
- Vuln Type: Information Disclosure
-
2.3
LOWCVE-2025-2545
Vulnerability in Best Practical Solutions, LLC's Request Tracker prior to v5.0.8, where the Triple DES (3DES) cryptographic algorithm is used to protect emails sent with S/MIME encryption. Triple DES is considered obsolete and insecure due to its suscepti... Read more
Affected Products :- Published: May. 05, 2025
- Modified: May. 29, 2025
- Vuln Type: Cryptography
-
2.3
LOWCVE-2025-25299
CKEditor 5 is a modern JavaScript rich-text editor with an MVC architecture. During a recent internal audit, a Cross-Site Scripting (XSS) vulnerability was discovered in the CKEditor 5 real-time collaboration package. This vulnerability affects user marke... Read more
Affected Products : ckeditor5- Published: Feb. 20, 2025
- Modified: Feb. 20, 2025
- Vuln Type: Cross-Site Scripting
-
2.3
LOWCVE-2025-54799
Let's Encrypt client and ACME library written in Go (Lego). In versions 4.25.1 and below, the github.com/go-acme/lego/v4/acme/api package (thus the lego library and the lego cli as well) don't enforce HTTPS when talking to CAs as an ACME client. Unlike th... Read more
Affected Products :- Published: Aug. 07, 2025
- Modified: Aug. 07, 2025
- Vuln Type: Misconfiguration
-
2.3
LOWCVE-2025-24806
Authelia is an open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for applications via a web portal. If users are allowed to sign in via both username and email the regulation system treats the... Read more
Affected Products : authelia- Published: Feb. 19, 2025
- Modified: Feb. 19, 2025
- Vuln Type: Authentication
-
2.3
LOWCVE-2024-20045
In audio, there is a possible out of bounds read due to an incorrect calculation of buffer size. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS080247... Read more
- Published: Apr. 01, 2024
- Modified: Apr. 23, 2025
-
2.3
LOWCVE-2025-40710
Host Header Injection (HHI) vulnerability in the Hotspot Shield VPN client, which can induce unexpected behaviour when accessing third-party web applications through the VPN tunnel. Although such applications do not present this vulnerability per se, the ... Read more
Affected Products :- Published: Jun. 30, 2025
- Modified: Jun. 30, 2025
- Vuln Type: Misconfiguration
-
2.3
LOWCVE-2021-41527
An error related to the 2-factor authorization (2FA) on the RISC Platform prior to the saas-2021-12-29 release can potentially be exploited to bypass the 2FA. The vulnerability requires that the 2FA setup hasn’t been completed.... Read more
Affected Products :- Published: Feb. 07, 2025
- Modified: Mar. 13, 2025
- Vuln Type: Authentication
-
2.3
LOWCVE-2019-2926
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.34 and prior to 6.0.14. Easily exploitable vulnerability allows high privileged attacker with logon to the ... Read more
Affected Products : vm_virtualbox- Published: Oct. 16, 2019
- Modified: Nov. 21, 2024
-
2.3
LOWCVE-2014-2573
The VMWare driver in OpenStack Compute (Nova) 2013.2 through 2013.2.2 does not properly put VMs into RESCUE status, which allows remote authenticated users to bypass the quota limit and cause a denial of service (resource consumption) by requesting the VM... Read more
- Published: Mar. 25, 2014
- Modified: Apr. 12, 2025