Latest CVE Feed
-
3.6
LOWCVE-1999-0828
UnixWare pkg commands such as pkginfo, pkgcat, and pkgparam allow local users to read arbitrary files via the dacread permission.... Read more
Affected Products : unixware- Published: Dec. 02, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2006-4266
Symantec Norton Personal Firewall 2006 9.1.0.33, and possibly earlier, does not properly protect Norton registry keys, which allows local users to provide Trojan horse libraries to Norton by using RegSaveKey and RegRestoreKey to modify HKLM\SOFTWARE\Syman... Read more
Affected Products : norton_personal_firewall- Published: Aug. 21, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2006-2288
Avahi before 0.6.10 allows local users to cause a denial of service (mDNS/DNS-SD service disconnect) via unspecified mDNS name conflicts.... Read more
Affected Products : avahi- Published: May. 10, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2025-4878
A vulnerability was found in libssh, where an uninitialized variable exists under certain conditions in the privatekey_from_file() function. This flaw can be triggered if the file specified by the filename doesn't exist and may lead to possible signing fa... Read more
Affected Products : libssh- Published: Jul. 22, 2025
- Modified: Jul. 29, 2025
- Vuln Type: Memory Corruption
-
3.6
LOWCVE-2025-30731
Vulnerability in the Oracle Applications Technology Stack product of Oracle E-Business Suite (component: Configuration). Supported versions that are affected are 12.2.3-12.2.14. Difficult to exploit vulnerability allows unauthenticated attacker with logo... Read more
Affected Products : applications_technology_stack- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Authorization
-
3.6
LOWCVE-2017-10308
Vulnerability in the Oracle Agile PLM component of Oracle Supply Chain Products Suite (subcomponent: Performance). Supported versions that are affected are 9.3.5 and 9.3.6. Easily exploitable vulnerability allows physical access to compromise Oracle Agile... Read more
Affected Products : agile_product_lifecycle_management_framework agile_plm agile_product_lifecycle_management- Published: Oct. 19, 2017
- Modified: May. 08, 2025
-
3.6
LOWCVE-2013-4270
The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application.... Read more
Affected Products : linux_kernel- Published: Dec. 09, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2015-3631
Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.... Read more
- Published: May. 18, 2015
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2017-1699
IBM MQ Managed File Transfer Agent 8.0 and 9.0 sets insecure permissions on certain files it creates. A local attacker could exploit this vulnerability to modify or delete data contained in the files with an unknown impact. IBM X-Force ID: 134391.... Read more
- Published: Jan. 04, 2018
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2003-0499
Mantis 0.17.5 and earlier stores its database password in cleartext in a world-readable configuration file, which allows local users to perform unauthorized database operations.... Read more
Affected Products : mantis- Published: Aug. 07, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1396
Unknown vulnerabilities in strnlen_user for Linux kernel before 2.2.19, with unknown impact.... Read more
- Published: Apr. 17, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2005-1982
Unknown vulnerability in the PKINIT Protocol for Microsoft Windows 2000, Windows XP, and Windows Server 2003 could allow a local user to obtain information and spoof a server via a man-in-the-middle (MITM) attack between a client and a domain controller w... Read more
- Published: Aug. 10, 2005
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2013-5856
Unspecified vulnerability in the Oracle Health Sciences InForm component in Oracle Industry Applications 4.5 SP3, 4.5 SP3a-k, 4.6 SP0, 4.6 SP0a-c, 4.6 SP1, 4.6 SP1a-c, 4.6 SP2, 4.6 SP2a-c, 5.0 SP0, 5.0 SP0a, 5.0 SP1, 5.0 SP1a-b, 5.5 SP0, 5.5 SP0b, 5.5.1, ... Read more
Affected Products : industry_applications- Published: Oct. 16, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2012-2451
The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack. NOTE: some of these details are obtained from third party information. NOTE: it ... Read more
Affected Products : config-inifiles- Published: Jun. 27, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2012-1120
The SOAP API in MantisBT before 1.2.9 does not properly enforce the bugnote_allow_user_edit_delete and delete_bug_threshold permissions, which allows remote authenticated users with read and write SOAP API privileges to delete arbitrary bug reports and bu... Read more
Affected Products : mantisbt- Published: Jun. 29, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2005-0288
The change password functionality in Bottomline Webseries Payment Application does not require the old password when users enter a new password, which could allow remote authenticated users to change other users' passwords.... Read more
Affected Products : webseries_payment_application- Published: Jan. 11, 2005
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-0850
The default permissions for Endymion MailMan allow local users to read email or modify files.... Read more
Affected Products : mailman_webmail- Published: Dec. 02, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2002-2334
Joe text editor 2.8 through 2.9.7 does not remove the group and user setuid bits for backup files, which could allow local users to execute arbitrary setuid and setgid root programs when root edits scripts owned by other users.... Read more
Affected Products : joe- Published: Dec. 31, 2002
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2023-45145
Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, du... Read more
- Published: Oct. 18, 2023
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2005-4803
graphviz before 2.2.1 allows local users to overwrite arbitrary files via a symlink attack on temporary files. NOTE: this issue was originally associated with a different CVE identifier, CVE-2005-2965, which had been used for multiple different issues. ... Read more
Affected Products : graphviz- Published: Dec. 31, 2005
- Modified: Apr. 03, 2025