Latest CVE Feed
-
3.6
LOWCVE-2000-0880
LPPlus creates the lpdprocess file with world-writeable permissions, which allows local users to kill arbitrary processes by specifying an alternate process ID and using the setuid dcclpdshut program to kill the process that was specified in the lpdproces... Read more
Affected Products : lpplus- Published: Nov. 14, 2000
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-0885
Alibaba web server allows remote attackers to execute commands via a pipe character in a malformed URL.... Read more
Affected Products : alibaba- Published: Nov. 03, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1322
xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask.... Read more
Affected Products : xinetd- Published: Jul. 10, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1519
RunAs (runas.exe) in Windows 2000 allows local users to create a spoofed named pipe when the service is stopped, then capture cleartext usernames and passwords when clients connect to the service. NOTE: the vendor disputes this issue, saying that adminis... Read more
Affected Products : windows_2000- Published: Dec. 31, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2000-1127
registrar in the HP resource monitor service allows local users to read and modify arbitrary files by renaming the original registrar.log log file and creating a symbolic link to the target file, to which registrar appends log information and sets the per... Read more
Affected Products : hp-ux- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-1300
Vulnerability in accton in Cray UNICOS 6.1 and 6.0 allows local users to read arbitrary files and modify system accounting configuration.... Read more
Affected Products : unicos- Published: Dec. 31, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2000-0472
Buffer overflow in innd 2.2.2 allows remote attackers to execute arbitrary commands via a cancel request containing a long message ID.... Read more
Affected Products : inn- Published: Feb. 06, 2000
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1258
Horde Internet Messaging Program (IMP) before 2.2.6 allows local users to read IMP configuration files and steal the Horde database password by placing the prefs.lang file containing PHP code on the server.... Read more
Affected Products : imp- Published: Jul. 21, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-0430
Vulnerability in exuberant-ctags before 3.2.4-0.1 insecurely creates temporary files.... Read more
Affected Products : debian_linux- Published: Jul. 02, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2008-0819
Directory traversal vulnerability in index.php in PlutoStatus Locator 1.0 pre alpha allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter.... Read more
Affected Products : plutostatus_locator- Published: Feb. 19, 2008
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2008-1734
Interpretation conflict in PHP Toolkit before 1.0.1 on Gentoo Linux might allow local users to cause a denial of service (PHP outage) and read contents of PHP scripts by creating a file with a one-letter lowercase alphabetic name, which triggers interpret... Read more
- Published: Apr. 18, 2008
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2025-27145
copyparty, a portable file server, has a DOM-based cross-site scripting vulnerability in versions prior to 1.16.15. The vulnerability is considered low-risk. By handing someone a maliciously-named file, and then tricking them into dragging the file into c... Read more
- Published: Feb. 25, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Cross-Site Scripting
-
3.6
LOWCVE-2008-4228
The Passcode Lock feature in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allows physically proximate attackers to leverage the emergency-call ability of locked devices to make a phone call to an arbitrary number.... Read more
- Published: Nov. 25, 2008
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2003-0246
The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports.... Read more
Affected Products : linux_kernel- Published: Jun. 16, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2005-1982
Unknown vulnerability in the PKINIT Protocol for Microsoft Windows 2000, Windows XP, and Windows Server 2003 could allow a local user to obtain information and spoof a server via a man-in-the-middle (MITM) attack between a client and a domain controller w... Read more
- Published: Aug. 10, 2005
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2012-0111
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization 4.1 allows local users to affect confidentiality and integrity via unknown vectors related to Shared Folders.... Read more
- Published: Jan. 18, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2015-3631
Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.... Read more
- Published: May. 18, 2015
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2014-4372
syslogd in the syslog subsystem in Apple iOS before 8 and Apple TV before 7 allows local users to change the permissions of arbitrary files via a symlink attack on an unspecified file.... Read more
- Published: Sep. 18, 2014
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2007-1537
\Device\NdisTapi (NDISTAPI.sys) in Microsoft Windows XP SP2 and 2003 SP1 uses weak permissions, which allows local users to write to the device and cause a denial of service, as demonstrated by using an IRQL to acquire a spinlock on paged memory via the N... Read more
- Published: Mar. 20, 2007
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2025-30731
Vulnerability in the Oracle Applications Technology Stack product of Oracle E-Business Suite (component: Configuration). Supported versions that are affected are 12.2.3-12.2.14. Difficult to exploit vulnerability allows unauthenticated attacker with logo... Read more
Affected Products : applications_technology_stack- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Authorization