Latest CVE Feed
-
3.6
LOWCVE-2000-1127
registrar in the HP resource monitor service allows local users to read and modify arbitrary files by renaming the original registrar.log log file and creating a symbolic link to the target file, to which registrar appends log information and sets the per... Read more
Affected Products : hp-ux- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-1366
Pegasus e-mail client 3.0 and earlier uses weak encryption to store POP3 passwords in the pmail.ini file, which allows local users to easily decrypt the passwords and read e-mail.... Read more
Affected Products : pegasus_mail- Published: May. 15, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1519
RunAs (runas.exe) in Windows 2000 allows local users to create a spoofed named pipe when the service is stopped, then capture cleartext usernames and passwords when clients connect to the service. NOTE: the vendor disputes this issue, saying that adminis... Read more
Affected Products : windows_2000- Published: Dec. 31, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-1300
Vulnerability in accton in Cray UNICOS 6.1 and 6.0 allows local users to read arbitrary files and modify system accounting configuration.... Read more
Affected Products : unicos- Published: Dec. 31, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-1224
IMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password informati... Read more
Affected Products : imapd- Published: Oct. 08, 1997
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2007-5936
dvips in teTeX and TeXlive 2007 and earlier allows local users to obtain sensitive information and modify certain data by creating certain temporary files before they are processed by dviljk, which can then be read or modified in place.... Read more
- Published: Nov. 13, 2007
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2015-0794
modules.d/90crypt/module-setup.sh in the dracut package before 037-17.30.1 in openSUSE 13.2 allows local users to have unspecified impact via a symlink attack on /tmp/dracut_block_uuid.map.... Read more
- Published: Nov. 19, 2015
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2010-1172
DBus-GLib 0.73 disregards the access flag of exported GObject properties, which allows local users to bypass intended access restrictions and possibly cause a denial of service by modifying properties, as demonstrated by properties of the (1) DeviceKit-Po... Read more
Affected Products : dbus-glib- Published: Aug. 20, 2010
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-1999-0703
OpenBSD, BSDI, and other Unix operating systems allow users to set chflags and fchflags on character and block devices.... Read more
- Published: Aug. 03, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2002-2334
Joe text editor 2.8 through 2.9.7 does not remove the group and user setuid bits for backup files, which could allow local users to execute arbitrary setuid and setgid root programs when root edits scripts owned by other users.... Read more
Affected Products : joe- Published: Dec. 31, 2002
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2000-0487
The Protected Store in Windows 2000 does not properly select the strongest encryption when available, which causes it to use a default of 40-bit encryption instead of 56-bit DES encryption, aka the "Protected Store Key Length" vulnerability.... Read more
Affected Products : windows_2000- Published: Jun. 01, 2000
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2000-0667
Vulnerability in gpm in Caldera Linux allows local users to delete arbitrary files or conduct a denial of service.... Read more
Affected Products : linux- Published: Jul. 27, 2000
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2000-0270
The make-temp-name Lisp function in Emacs 20 creates temporary files with predictable names, which allows attackers to conduct a symlink attack.... Read more
Affected Products : emacs- Published: Apr. 18, 2000
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1079
create_keyfiles in PSSP 3.2 with DCE 3.1 authentication on AIX creates keyfile directories with world-writable permissions, which could allow a local user to delete key files and cause a denial of service.... Read more
Affected Products : aix- Published: Feb. 13, 2002
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-0259
ssh-keygen in ssh 1.2.27 - 1.2.30 with Secure-RPC can allow local attackers to recover a SUN-DES-1 magic phrase generated by another user, which the attacker can use to decrypt that user's private key file.... Read more
Affected Products : ssh- Published: Jun. 02, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2013-0964
The kernel in Apple iOS before 6.1 and Apple TV before 5.2 does not properly validate copyin and copyout arguments, which allows local users to bypass intended pointer restrictions and access locations in the first kernel-memory page by specifying a lengt... Read more
- Published: Jan. 29, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2013-4270
The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application.... Read more
Affected Products : linux_kernel- Published: Dec. 09, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2015-3202
fusermount in FUSE before 2.9.3-15 does not properly clear the environment before invoking (1) mount or (2) umount as root, which allows local users to write to arbitrary files via a crafted LIBMOUNT_MTAB environment variable that is used by mount's debug... Read more
- Published: Jul. 02, 2015
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2003-0018
Linux kernel 2.4.10 through 2.4.21-pre4 does not properly handle the O_DIRECT feature, which allows local attackers with write privileges to read portions of previously deleted files, or cause file system corruption.... Read more
- Published: Feb. 19, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2011-4434
Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 do not properly enforce AppLocker rules, which allows local users to bypass intended access restrictions via a (1) macro or (2) scripting feature in an application, as demonstrated by ... Read more
- Published: Nov. 11, 2011
- Modified: Apr. 11, 2025