Latest CVE Feed
-
3.6
LOWCVE-2007-1537
\Device\NdisTapi (NDISTAPI.sys) in Microsoft Windows XP SP2 and 2003 SP1 uses weak permissions, which allows local users to write to the device and cause a denial of service, as demonstrated by using an IRQL to acquire a spinlock on paged memory via the N... Read more
- Published: Mar. 20, 2007
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2008-0819
Directory traversal vulnerability in index.php in PlutoStatus Locator 1.0 pre alpha allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter.... Read more
Affected Products : plutostatus_locator- Published: Feb. 19, 2008
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2025-27574
Cross-site scripting vulnerability exists in the USB storage file-sharing function of HGW-BL1500HM Ver 002.002.003 and earlier. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is using the configu... Read more
Affected Products :- Published: Mar. 28, 2025
- Modified: Mar. 28, 2025
- Vuln Type: Cross-Site Scripting
-
3.6
LOWCVE-2008-0822
Directory traversal vulnerability in index.php in Scribe 0.2 allows remote attackers to read arbitrary local files via a .. (dot dot) in the page parameter.... Read more
Affected Products : scribe- Published: Feb. 19, 2008
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2011-1837
The lock-counter implementation in utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 allows local users to overwrite arbitrary files via unspecified vectors.... Read more
- Published: Feb. 15, 2014
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2013-0164
The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.... Read more
- Published: Feb. 24, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2012-3504
The nssconfigFound function in genkey.pl in crypto-utils 2.4.1-34 allows local users to overwrite arbitrary files via a symlink attack on the "list" file in the current working directory.... Read more
Affected Products : crypto-utils- Published: Oct. 10, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2012-6150
The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access... Read more
- Published: Dec. 03, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2020-29374
An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore ... Read more
Affected Products : linux_kernel debian_linux h410c_firmware solidfire_\&_hci_management_node hci_compute_node_bios solidfire_\&_hci_storage_node a250_firmware 500f_firmware h410c a250 +1 more products- Published: Nov. 28, 2020
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2012-3750
The Passcode Lock implementation in Apple iOS before 6.0.1 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement and access Passbook passes via unspecified vectors.... Read more
Affected Products : iphone_os- Published: Nov. 03, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2019-2961
Vulnerability in the Oracle Solaris product of Oracle Systems (component: SMF services & legacy daemons). The supported version that is affected is 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure wher... Read more
- Published: Oct. 16, 2019
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-1999-0885
Alibaba web server allows remote attackers to execute commands via a pipe character in a malformed URL.... Read more
Affected Products : alibaba- Published: Nov. 03, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2000-1127
registrar in the HP resource monitor service allows local users to read and modify arbitrary files by renaming the original registrar.log log file and creating a symbolic link to the target file, to which registrar appends log information and sets the per... Read more
Affected Products : hp-ux- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2000-0472
Buffer overflow in innd 2.2.2 allows remote attackers to execute arbitrary commands via a cancel request containing a long message ID.... Read more
Affected Products : inn- Published: Feb. 06, 2000
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1322
xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask.... Read more
Affected Products : xinetd- Published: Jul. 10, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2006-0133
Multiple directory traversal vulnerabilities in AIX 5.3 ML03 allow local users to determine the existence of files and read partial contents of certain files via a .. (dot dot) in the argument to (1) getCommand.new (aka getCommand) and (2) getShell, a dif... Read more
Affected Products : aix- Published: Jan. 09, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2008-2148
The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary fil... Read more
Affected Products : linux_kernel- Published: May. 12, 2008
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2012-3355
(1) AlbumTab.py, (2) ArtistTab.py, (3) LinksTab.py, and (4) LyricsTab.py in the Context module in GNOME Rhythmbox 0.13.3 and earlier allows local users to execute arbitrary code via a symlink attack on a temporary HTML template file in the /tmp/context di... Read more
Affected Products : rhythmbox- Published: Jul. 17, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2012-3165
Unspecified vulnerability in Oracle Sun Solaris 8, 9, 10, and 11 allows local users to affect confidentiality and integrity via unknown vectors related to mailx.... Read more
- Published: Oct. 17, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2015-3631
Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.... Read more
- Published: May. 18, 2015
- Modified: Apr. 12, 2025