Latest CVE Feed
-
3.6
LOWCVE-2012-1989
telnet.rb in Puppet 2.7.x before 2.7.13 and Puppet Enterprise (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users to overwrite arbitrary files via a symlink attack on the NET::Telnet connection log (/tmp/out.log).... Read more
- Published: Jun. 27, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2010-0870
Unspecified vulnerability in the Change Data Capture component in Oracle Database 9.2.0.8 and 9.2.0.8DV allows remote authenticated users to affect confidentiality and integrity, related to SYS.DBMS_CDC_PUBLISH.... Read more
Affected Products : database_server- Published: Apr. 13, 2010
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2010-1439
yum-rhn-plugin in Red Hat Network Client Tools (aka rhn-client-tools) on Red Hat Enterprise Linux (RHEL) 5 and Fedora uses world-readable permissions for the /var/spool/up2date/loginAuth.pkl file, which allows local users to access the Red Hat Network pro... Read more
- Published: Jun. 07, 2010
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2006-0353
unix_random.c in lshd for lsh 2.0.1 leaks file descriptors related to the randomness generator, which allows local users to cause a denial of service by truncating the seed file, which prevents the server from starting, or obtain sensitive seed informatio... Read more
Affected Products : lsh- Published: Jan. 22, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2006-0133
Multiple directory traversal vulnerabilities in AIX 5.3 ML03 allow local users to determine the existence of files and read partial contents of certain files via a .. (dot dot) in the argument to (1) getCommand.new (aka getCommand) and (2) getShell, a dif... Read more
Affected Products : aix- Published: Jan. 09, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2008-4228
The Passcode Lock feature in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allows physically proximate attackers to leverage the emergency-call ability of locked devices to make a phone call to an arbitrary number.... Read more
- Published: Nov. 25, 2008
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2015-3631
Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.... Read more
- Published: May. 18, 2015
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2012-3355
(1) AlbumTab.py, (2) ArtistTab.py, (3) LinksTab.py, and (4) LyricsTab.py in the Context module in GNOME Rhythmbox 0.13.3 and earlier allows local users to execute arbitrary code via a symlink attack on a temporary HTML template file in the /tmp/context di... Read more
Affected Products : rhythmbox- Published: Jul. 17, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2012-3165
Unspecified vulnerability in Oracle Sun Solaris 8, 9, 10, and 11 allows local users to affect confidentiality and integrity via unknown vectors related to mailx.... Read more
- Published: Oct. 17, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2013-4270
The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application.... Read more
Affected Products : linux_kernel- Published: Dec. 09, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2001-1322
xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask.... Read more
Affected Products : xinetd- Published: Jul. 10, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1258
Horde Internet Messaging Program (IMP) before 2.2.6 allows local users to read IMP configuration files and steal the Horde database password by placing the prefs.lang file containing PHP code on the server.... Read more
Affected Products : imp- Published: Jul. 21, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2004-2319
IBM Informix Dynamic Server (IDS) before 9.40.xC3 allows local users to (1) create or overwrite files via the /001 log file to onedcu or (2) read arbitrary files via a symlink attack on a file in /tmp to onshowaudit.... Read more
- Published: Dec. 31, 2004
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1395
Unknown vulnerability in sockfilter for Linux kernel before 2.2.19 related to "boundary cases," with unknown impact.... Read more
- Published: Apr. 17, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2019-6679
On BIG-IP versions 15.0.0-15.0.1, 14.1.0.2-14.1.2.2, 14.0.0.5-14.0.1, 13.1.1.5-13.1.3.1, 12.1.4.1-12.1.5, 11.6.4-11.6.5, and 11.5.9-11.5.10, the access controls implemented by scp.whitelist and scp.blacklist are not properly enforced for paths that are sy... Read more
Affected Products : big-ip_access_policy_manager big-ip_advanced_firewall_manager big-ip_analytics big-ip_application_acceleration_manager big-ip_application_security_manager big-ip_domain_name_system big-ip_fraud_protection_service big-ip_global_traffic_manager big-ip_link_controller big-ip_local_traffic_manager +3 more products- Published: Dec. 23, 2019
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2001-1519
RunAs (runas.exe) in Windows 2000 allows local users to create a spoofed named pipe when the service is stopped, then capture cleartext usernames and passwords when clients connect to the service. NOTE: the vendor disputes this issue, saying that adminis... Read more
Affected Products : windows_2000- Published: Dec. 31, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2002-2270
Unspecified vulnerability in the ied command in HP-UX 10.10, 10.20, and 11.0 allows local users to view "normally invisible data" via unknown attack vectors.... Read more
Affected Products : hp-ux- Published: Dec. 31, 2002
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2004-2408
Linux VServer 1.27 and earlier, 1.3.9 and earlier, and 1.9.1 and earlier shares /proc permissions across all virtual and host servers, which allows local users with the ability to set permissions in /proc to obtain system information or cause a denial of ... Read more
Affected Products : linux-vserver- Published: Dec. 31, 2004
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2002-1710
The attachment capability in Compose Mail in BasiliX Webmail 1.1.0 does not check whether the attachment was uploaded by the user or came from a HTTP POST, which could allow local users to steal sensitive information like a password file.... Read more
Affected Products : basilix_webmail- Published: Dec. 31, 2002
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2011-2779
Windows Event Log SmartConnector in HP ArcSight Connector Appliance before 6.1 uses world-writable permissions for exported report files, which allows local users to change or delete log data by modifying a file, a different vulnerability than CVE-2011-07... Read more
- Published: Jul. 19, 2011
- Modified: Apr. 11, 2025