Latest CVE Feed
-
3.6
LOWCVE-2012-3453
logol 1.5.0 uses world writable permissions for the /var/lib/logol/results directory, which allows local users to delete or overwrite arbitrary files.... Read more
Affected Products : logol- Published: Aug. 07, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2012-3504
The nssconfigFound function in genkey.pl in crypto-utils 2.4.1-34 allows local users to overwrite arbitrary files via a symlink attack on the "list" file in the current working directory.... Read more
Affected Products : crypto-utils- Published: Oct. 10, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2012-4518
ibacm 1.0.7 creates files with world-writable permissions, which allows local users to overwrite the ib_acm daemon log or ibacm.port file.... Read more
Affected Products : ibacm- Published: Oct. 22, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2020-29374
An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore ... Read more
Affected Products : linux_kernel debian_linux h410c_firmware solidfire_\&_hci_management_node hci_compute_node_bios solidfire_\&_hci_storage_node a250_firmware 500f_firmware h410c a250 +1 more products- Published: Nov. 28, 2020
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2012-0808
as31 2.3.1-4 does not seed the random number generator and generates predictable temporary file names, which makes it easier for local users to create or truncate files via a symlink attack.... Read more
Affected Products : as31- Published: Mar. 19, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2013-0914
The flush_signal_handlers function in kernel/signal.c in the Linux kernel before 3.8.4 preserves the value of the sa_restorer field across an exec operation, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted appli... Read more
Affected Products : linux_kernel- Published: Mar. 22, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2012-1989
telnet.rb in Puppet 2.7.x before 2.7.13 and Puppet Enterprise (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users to overwrite arbitrary files via a symlink attack on the NET::Telnet connection log (/tmp/out.log).... Read more
- Published: Jun. 27, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2008-0001
VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.... Read more
Affected Products : linux_kernel- Published: Jan. 15, 2008
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2011-0793
Unspecified vulnerability in the Database Vault component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, and 11.2.0.1 allows remote authenticated users to affect integrity and availability, related to SYSDBA.... Read more
Affected Products : database_server- Published: Apr. 20, 2011
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2010-4819
The ProcRenderAddGlyphs function in the Render extension (render/render.c) in X.Org xserver 1.7.7 and earlier allows local users to read arbitrary memory and possibly cause a denial of service (server crash) via unspecified vectors related to an "input sa... Read more
- Published: Sep. 05, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2011-2289
Unspecified vulnerability in Oracle Solaris 10 allows local users to affect integrity and availability via unknown vectors related to LiveUpgrade.... Read more
- Published: Jul. 21, 2011
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2015-5273
The abrt-action-install-debuginfo-to-abrt-cache help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users to write to arbitrary files via a symlink attack on unpacked.cpio in a pre-created directory with a predictable name in /va... Read more
- Published: Dec. 07, 2015
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2010-4460
Unspecified vulnerability in Oracle Solaris 10 allows local users to affect confidentiality and integrity via unknown vectors related to Fault Manager Daemon.... Read more
- Published: Jan. 19, 2011
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2002-2401
NT Virtual DOS Machine (NTVDM.EXE) in Windows 2000, NT and XP does not verify user execution permissions for 16-bit executable files, which allows local users to bypass the loader and execute arbitrary programs.... Read more
- Published: Dec. 31, 2002
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2007-1150
Unrestricted file upload vulnerability in LoveCMS 1.4 allows remote authenticated administrators to upload arbitrary files to /modules/content/pictures/tmp/.... Read more
Affected Products : lovecms- Published: Mar. 02, 2007
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2000-0802
The BAIR program does not properly restrict access to the Internet Explorer Internet options menu, which allows local users to obtain access to the menu by modifying the registry key that starts BAIR.... Read more
Affected Products : personal_privacy- Published: Oct. 20, 2000
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2000-0090
VMWare 1.1.2 allows local users to cause a denial of service via a symlink attack.... Read more
Affected Products : workstation- Published: Jan. 17, 2000
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2023-39342
Dangerzone is software for converting potentially dangerous PDFs, office documents, or images to safe PDFs. The Dangerzone CLI (`dangerzone-cli` command) logs output from the container where the file sanitization takes place, to the user's terminal. Prior... Read more
Affected Products : dangerzone- Published: Aug. 08, 2023
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2002-1518
mv in IRIX 6.5 creates a directory with world-writable permissions while moving a directory, which could allow local users to modify files and directories.... Read more
Affected Products : irix- Published: Apr. 02, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2000-0121
The Recycle Bin utility in Windows NT and Windows 2000 allows local users to read or modify files by creating a subdirectory with the victim's SID in the recycler directory, aka the "Recycle Bin Creation" vulnerability.... Read more
Affected Products : windows_nt- Published: Feb. 01, 2000
- Modified: Apr. 03, 2025