Latest CVE Feed
-
3.6
LOWCVE-2007-0007
gnucash 2.0.4 and earlier allows local users to overwrite arbitrary files via a symlink attack on the (1) gnucash.trace, (2) qof.trace, and (3) qof.trace.[PID] temporary files.... Read more
Affected Products : gnucash- Published: Feb. 20, 2007
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2005-4779
verifiedexecioctl in verified_exec.c in NetBSD 2.0.2 calls NDINIT with UIO_USERSPACE rather than UID_SYSSPACE, which removes the functionality of the verified exec kernel subsystem and might allow local users to execute Trojan horse programs.... Read more
Affected Products : netbsd- Published: Dec. 31, 2005
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2006-4266
Symantec Norton Personal Firewall 2006 9.1.0.33, and possibly earlier, does not properly protect Norton registry keys, which allows local users to provide Trojan horse libraries to Norton by using RegSaveKey and RegRestoreKey to modify HKLM\SOFTWARE\Syman... Read more
Affected Products : norton_personal_firewall- Published: Aug. 21, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2006-2288
Avahi before 0.6.10 allows local users to cause a denial of service (mDNS/DNS-SD service disconnect) via unspecified mDNS name conflicts.... Read more
Affected Products : avahi- Published: May. 10, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2025-30731
Vulnerability in the Oracle Applications Technology Stack product of Oracle E-Business Suite (component: Configuration). Supported versions that are affected are 12.2.3-12.2.14. Difficult to exploit vulnerability allows unauthenticated attacker with logo... Read more
Affected Products : applications_technology_stack- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Authorization
-
3.6
LOWCVE-2025-27613
Gitk is a Tcl/Tk based Git history browser. Starting with 1.7.0, when a user clones an untrusted repository and runs gitk without additional command arguments, files for which the user has write permission can be created and truncated. The option Support ... Read more
Affected Products : git- Published: Jul. 10, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Misconfiguration
-
3.6
LOWCVE-2016-3155
Siemens APOGEE Insight uses weak permissions for the application folder, which allows local users to obtain sensitive information or modify data via unspecified vectors.... Read more
Affected Products : apogee_insight- Published: Mar. 18, 2016
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2017-3235
Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Core). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0 and 12.2.0. Easily exploitable vulnera... Read more
Affected Products : flexcube_universal_banking- Published: Jan. 27, 2017
- Modified: Apr. 20, 2025
-
3.6
LOWCVE-2017-10308
Vulnerability in the Oracle Agile PLM component of Oracle Supply Chain Products Suite (subcomponent: Performance). Supported versions that are affected are 9.3.5 and 9.3.6. Easily exploitable vulnerability allows physical access to compromise Oracle Agile... Read more
Affected Products : agile_product_lifecycle_management_framework agile_plm agile_product_lifecycle_management- Published: Oct. 19, 2017
- Modified: May. 08, 2025
-
3.6
LOWCVE-2006-5163
IBM Informix Dynamic Server 10.UC3RC1 Trial for Linux and possibly other versions creates /tmp/installserver.txt with insecure permissions, which allows local users to append data to arbitrary files via a symlink attack.... Read more
Affected Products : informix_dynamic_server- Published: Oct. 05, 2006
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2002-0429
The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall).... Read more
Affected Products : linux_kernel- Published: Aug. 12, 2002
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2008-1371
Absolute path traversal vulnerability in install/index.php in Drake CMS 0.4.11 RC8 allows remote attackers to read and execute arbitrary files via a full pathname in the d_root parameter. NOTE: the provenance of this information is unknown; the details a... Read more
Affected Products : drake_cms- Published: Mar. 18, 2008
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2018-1842
IBM Cognos Analytics 11 Configuration tool, under certain circumstances, will bypass OIDC namespace signature verification on its id_token. IBM X-Force ID: 150902.... Read more
- Published: Nov. 09, 2018
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2018-12446
An issue was discovered in the com.dropbox.android application 98.2.2 for Android. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method's return value to true. In other words, an attacker could authentica... Read more
Affected Products : dropbox- Published: Jun. 20, 2018
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2021-35465
Certain Arm products before 2021-08-23 do not properly consider the effect of exceptions on a VLLDM instruction. A Non-secure handler may have read or write access to part of a Secure context. This affects Arm Cortex-M33 r0p0 through r1p0, Arm Cortex-M35P... Read more
- Published: Aug. 23, 2021
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2011-4339
ipmievd (aka the IPMI event daemon) in OpenIPMI, as used in the ipmitool package 1.8.11 in Red Hat Enterprise Linux (RHEL) 6, Debian GNU/Linux, Fedora 16, and other products uses 0666 permissions for its ipmievd.pid PID file, which allows local users to k... Read more
- Published: Dec. 15, 2011
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2011-1021
drivers/acpi/debugfs.c in the Linux kernel before 3.0 allows local users to modify arbitrary kernel memory locations by leveraging root privileges to write to the /sys/kernel/debug/acpi/custom_method file. NOTE: this vulnerability exists because of an inc... Read more
Affected Products : linux_kernel- Published: Jun. 21, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2025-4878
A vulnerability was found in libssh, where an uninitialized variable exists under certain conditions in the privatekey_from_file() function. This flaw can be triggered if the file specified by the filename doesn't exist and may lead to possible signing fa... Read more
Affected Products : libssh- Published: Jul. 22, 2025
- Modified: Jul. 29, 2025
- Vuln Type: Memory Corruption
-
3.6
LOWCVE-2025-55188
7-Zip before 25.01 does not always properly handle symbolic links during extraction.... Read more
Affected Products : 7-zip- Published: Aug. 08, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Path Traversal
-
3.6
LOWCVE-2004-0698
4D WebSTAR 5.3.2 and earlier allows local users to read and modify arbitrary files via a symlink attack.... Read more
Affected Products : webstar- Published: Jul. 27, 2004
- Modified: Apr. 03, 2025