Vulnerabilities > Low

DATE CVE VULNERABILITY TITLE RISK
2024-06-14 CVE-2024-36287 Unspecified vulnerability in Mattermost Desktop
Mattermost Desktop App versions <=5.7.0 fail to disable certain Electron debug flags which allows for bypassing TCC restrictions on macOS.
local
low complexity
mattermost
3.3
2024-06-14 CVE-2024-5464 Unspecified vulnerability in Huawei Emui and Harmonyos
Vulnerability of insufficient permission verification in the NearLink module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
local
low complexity
huawei
3.3
2024-06-13 CVE-2024-22333 Exposure of Resource to Wrong Sphere vulnerability in IBM Maximo Application Suite and Maximo Asset Management
IBM Maximo Asset Management 7.6.1.3 and IBM Maximo Application Suite 8.10 and 8.11 allows web pages to be stored locally which can be read by another user on the system.
local
low complexity
ibm CWE-668
3.3
2024-06-12 CVE-2024-29181 Authorization Bypass Through User-Controlled Key vulnerability in Strapi
Strapi is an open-source content management system.
network
low complexity
strapi CWE-639
3.5
2024-06-10 CVE-2024-27799 Unspecified vulnerability in Apple Macos
This issue was addressed with additional entitlement checks.
local
low complexity
apple
3.3
2024-06-10 CVE-2024-27814 Unspecified vulnerability in Apple Watchos
This issue was addressed through improved state management.
low complexity
apple
2.4
2024-06-10 CVE-2024-27819 Unspecified vulnerability in Apple Ipados
The issue was addressed by restricting options offered on a locked device.
low complexity
apple
2.4
2024-06-10 CVE-2024-27845 Unspecified vulnerability in Apple Ipados
A privacy issue was addressed with improved handling of temporary files.
local
low complexity
apple
3.3
2024-06-06 CVE-2024-5307 Out-of-bounds Read vulnerability in Tungstenautomation Kofax Power PDF 5.0.0.57
Kofax Power PDF AcroForm Annotation Out-Of-Bounds Read Information Disclosure Vulnerability.
local
low complexity
tungstenautomation CWE-125
3.3
2024-06-06 CVE-2024-2032 Race Condition vulnerability in Zenml
A race condition vulnerability exists in zenml-io/zenml versions up to and including 0.55.3, which allows for the creation of multiple users with the same username when requests are sent in parallel.
network
high complexity
zenml CWE-362
3.1