Latest CVE Feed
-
3.6
LOWCVE-2006-2147
resmgrd in resmgr for SUSE Linux and other distributions does not properly handle when access to a USB device is granted by using "usb:<bus>,<dev>" notation, which grants access to all USB devices and allows local users to bypass intended restrictions. N... Read more
Affected Products : resmgrd- Published: May. 02, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2012-2451
The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack. NOTE: some of these details are obtained from third party information. NOTE: it ... Read more
Affected Products : config-inifiles- Published: Jun. 27, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2006-2045
The (1) shadow password file in na-img-4.0.34.bin for the IP3 Networks NetAccess NA75 has world readable permissions, which allows local users to view encrypted passwords; and the (2) NetAccess database file has world readable and writable permissions, wh... Read more
Affected Products : ip3_netaccess_75- Published: Apr. 26, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2014-4372
syslogd in the syslog subsystem in Apple iOS before 8 and Apple TV before 7 allows local users to change the permissions of arbitrary files via a symlink attack on an unspecified file.... Read more
- Published: Sep. 18, 2014
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2013-0964
The kernel in Apple iOS before 6.1 and Apple TV before 5.2 does not properly validate copyin and copyout arguments, which allows local users to bypass intended pointer restrictions and access locations in the first kernel-memory page by specifying a lengt... Read more
- Published: Jan. 29, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2007-1537
\Device\NdisTapi (NDISTAPI.sys) in Microsoft Windows XP SP2 and 2003 SP1 uses weak permissions, which allows local users to write to the device and cause a denial of service, as demonstrated by using an IRQL to acquire a spinlock on paged memory via the N... Read more
- Published: Mar. 20, 2007
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2008-4228
The Passcode Lock feature in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allows physically proximate attackers to leverage the emergency-call ability of locked devices to make a phone call to an arbitrary number.... Read more
- Published: Nov. 25, 2008
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2006-0133
Multiple directory traversal vulnerabilities in AIX 5.3 ML03 allow local users to determine the existence of files and read partial contents of certain files via a .. (dot dot) in the argument to (1) getCommand.new (aka getCommand) and (2) getShell, a dif... Read more
Affected Products : aix- Published: Jan. 09, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2003-0246
The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports.... Read more
Affected Products : linux_kernel- Published: Jun. 16, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2005-4779
verifiedexecioctl in verified_exec.c in NetBSD 2.0.2 calls NDINIT with UIO_USERSPACE rather than UID_SYSSPACE, which removes the functionality of the verified exec kernel subsystem and might allow local users to execute Trojan horse programs.... Read more
Affected Products : netbsd- Published: Dec. 31, 2005
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2015-3631
Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.... Read more
- Published: May. 18, 2015
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2005-4803
graphviz before 2.2.1 allows local users to overwrite arbitrary files via a symlink attack on temporary files. NOTE: this issue was originally associated with a different CVE identifier, CVE-2005-2965, which had been used for multiple different issues. ... Read more
Affected Products : graphviz- Published: Dec. 31, 2005
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2010-0870
Unspecified vulnerability in the Change Data Capture component in Oracle Database 9.2.0.8 and 9.2.0.8DV allows remote authenticated users to affect confidentiality and integrity, related to SYS.DBMS_CDC_PUBLISH.... Read more
Affected Products : database_server- Published: Apr. 13, 2010
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2006-4246
Usermin before 1.220 (20060629) allows remote attackers to read arbitrary files, possibly related to chfn/save.cgi not properly handling an empty shell parameter, which results in changing root's shell instead of the shell of a specified user.... Read more
Affected Products : usermin- Published: Sep. 19, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-1300
Vulnerability in accton in Cray UNICOS 6.1 and 6.0 allows local users to read arbitrary files and modify system accounting configuration.... Read more
Affected Products : unicos- Published: Dec. 31, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2000-1127
registrar in the HP resource monitor service allows local users to read and modify arbitrary files by renaming the original registrar.log log file and creating a symbolic link to the target file, to which registrar appends log information and sets the per... Read more
Affected Products : hp-ux- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2019-2961
Vulnerability in the Oracle Solaris product of Oracle Systems (component: SMF services & legacy daemons). The supported version that is affected is 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure wher... Read more
- Published: Oct. 16, 2019
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-1999-1366
Pegasus e-mail client 3.0 and earlier uses weak encryption to store POP3 passwords in the pmail.ini file, which allows local users to easily decrypt the passwords and read e-mail.... Read more
Affected Products : pegasus_mail- Published: May. 15, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-0430
Vulnerability in exuberant-ctags before 3.2.4-0.1 insecurely creates temporary files.... Read more
Affected Products : debian_linux- Published: Jul. 02, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-0885
Alibaba web server allows remote attackers to execute commands via a pipe character in a malformed URL.... Read more
Affected Products : alibaba- Published: Nov. 03, 1999
- Modified: Apr. 03, 2025