Latest CVE Feed
-
3.6
LOWCVE-2011-1784
The pidfile_write function in core/pidfile.c in keepalived 1.2.2 and earlier uses 0666 permissions for the (1) keepalived.pid, (2) checkers.pid, and (3) vrrp.pid files in /var/run/, which allows local users to kill arbitrary processes by writing a PID to ... Read more
Affected Products : keepalived- Published: May. 20, 2011
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2006-4246
Usermin before 1.220 (20060629) allows remote attackers to read arbitrary files, possibly related to chfn/save.cgi not properly handling an empty shell parameter, which results in changing root's shell instead of the shell of a specified user.... Read more
Affected Products : usermin- Published: Sep. 19, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2010-4460
Unspecified vulnerability in Oracle Solaris 10 allows local users to affect confidentiality and integrity via unknown vectors related to Fault Manager Daemon.... Read more
- Published: Jan. 19, 2011
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2005-4618
Buffer overflow in sysctl in the Linux Kernel 2.6 before 2.6.15 allows local users to corrupt user memory and possibly cause a denial of service via a long string, which causes sysctl to write a zero byte outside the buffer. NOTE: since the sysctl is cal... Read more
Affected Products : linux_kernel- Published: Dec. 31, 2005
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2010-3586
Unspecified vulnerability in Oracle Solaris 9 allows local users to affect confidentiality and integrity via unknown vectors related to XScreenSaver.... Read more
- Published: Jan. 19, 2011
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2001-1396
Unknown vulnerabilities in strnlen_user for Linux kernel before 2.2.19, with unknown impact.... Read more
- Published: Apr. 17, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2012-2451
The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack. NOTE: some of these details are obtained from third party information. NOTE: it ... Read more
Affected Products : config-inifiles- Published: Jun. 27, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-1999-0885
Alibaba web server allows remote attackers to execute commands via a pipe character in a malformed URL.... Read more
Affected Products : alibaba- Published: Nov. 03, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1519
RunAs (runas.exe) in Windows 2000 allows local users to create a spoofed named pipe when the service is stopped, then capture cleartext usernames and passwords when clients connect to the service. NOTE: the vendor disputes this issue, saying that adminis... Read more
Affected Products : windows_2000- Published: Dec. 31, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2003-0536
Directory traversal vulnerability in phpSysInfo 2.1 and earlier allows attackers with write access to a local directory to read arbitrary files as the PHP user or cause a denial of service via .. (dot dot) sequences in the (1) template or (2) lng paramete... Read more
Affected Products : phpsysinfo- Published: Aug. 18, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2002-2270
Unspecified vulnerability in the ied command in HP-UX 10.10, 10.20, and 11.0 allows local users to view "normally invisible data" via unknown attack vectors.... Read more
Affected Products : hp-ux- Published: Dec. 31, 2002
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2006-0133
Multiple directory traversal vulnerabilities in AIX 5.3 ML03 allow local users to determine the existence of files and read partial contents of certain files via a .. (dot dot) in the argument to (1) getCommand.new (aka getCommand) and (2) getShell, a dif... Read more
Affected Products : aix- Published: Jan. 09, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-1300
Vulnerability in accton in Cray UNICOS 6.1 and 6.0 allows local users to read arbitrary files and modify system accounting configuration.... Read more
Affected Products : unicos- Published: Dec. 31, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-1224
IMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password informati... Read more
Affected Products : imapd- Published: Oct. 08, 1997
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2000-0472
Buffer overflow in innd 2.2.2 allows remote attackers to execute arbitrary commands via a cancel request containing a long message ID.... Read more
Affected Products : inn- Published: Feb. 06, 2000
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2011-0801
Unspecified vulnerability in Oracle Solaris 10 and 11 Express allows local users to affect confidentiality and integrity via unknown vectors related to cp.... Read more
- Published: Apr. 20, 2011
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2012-3454
eXtplorer 2.1.0b6 uses world writable permissions for the /var/lib/extplorer/ftp_tmp directory, which allows local users to delete or overwrite arbitrary files.... Read more
Affected Products : extplorer- Published: Aug. 07, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2020-29374
An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore ... Read more
Affected Products : linux_kernel debian_linux h410c_firmware solidfire_\&_hci_management_node hci_compute_node_bios solidfire_\&_hci_storage_node a250_firmware 500f_firmware h410c a250 +1 more products- Published: Nov. 28, 2020
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2012-3453
logol 1.5.0 uses world writable permissions for the /var/lib/logol/results directory, which allows local users to delete or overwrite arbitrary files.... Read more
Affected Products : logol- Published: Aug. 07, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2020-1807
HUAWEI Mate 20 smartphones with versions earlier than 10.0.0.188(C00E74R3P8) have an improper authorization vulnerability. The software does not properly restrict certain user's modification of certain configuration file, successful exploit could allow th... Read more
- Published: Apr. 27, 2020
- Modified: Nov. 21, 2024