Latest CVE Feed
-
3.6
LOWCVE-2006-4759
PunBB 1.2.12 does not properly handle an avatar directory pathname ending in %00, which allows remote authenticated administrative users to upload arbitrary files and execute code, as demonstrated by a query to admin_options.php with an avatars_dir parame... Read more
Affected Products : punbb- Published: Sep. 13, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2006-4842
The Netscape Portable Runtime (NSPR) API 4.6.1 and 4.6.2, as used in Sun Solaris 10, trusts user-specified environment variables for specifying log files even when running from setuid programs, which allows local users to create or overwrite arbitrary fil... Read more
- Published: Oct. 12, 2006
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2004-2303
MTools Mformat before 3.9.9, when installed setuid root, creates files with world-readable and world-writable permissions, which allows local users to read and overwrite files.... Read more
Affected Products : mformat- Published: Dec. 31, 2004
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1519
RunAs (runas.exe) in Windows 2000 allows local users to create a spoofed named pipe when the service is stopped, then capture cleartext usernames and passwords when clients connect to the service. NOTE: the vendor disputes this issue, saying that adminis... Read more
Affected Products : windows_2000- Published: Dec. 31, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2000-1127
registrar in the HP resource monitor service allows local users to read and modify arbitrary files by renaming the original registrar.log log file and creating a symbolic link to the target file, to which registrar appends log information and sets the per... Read more
Affected Products : hp-ux- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-0885
Alibaba web server allows remote attackers to execute commands via a pipe character in a malformed URL.... Read more
Affected Products : alibaba- Published: Nov. 03, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1395
Unknown vulnerability in sockfilter for Linux kernel before 2.2.19 related to "boundary cases," with unknown impact.... Read more
- Published: Apr. 17, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2019-6679
On BIG-IP versions 15.0.0-15.0.1, 14.1.0.2-14.1.2.2, 14.0.0.5-14.0.1, 13.1.1.5-13.1.3.1, 12.1.4.1-12.1.5, 11.6.4-11.6.5, and 11.5.9-11.5.10, the access controls implemented by scp.whitelist and scp.blacklist are not properly enforced for paths that are sy... Read more
Affected Products : big-ip_access_policy_manager big-ip_advanced_firewall_manager big-ip_analytics big-ip_application_acceleration_manager big-ip_application_security_manager big-ip_domain_name_system big-ip_fraud_protection_service big-ip_global_traffic_manager big-ip_link_controller big-ip_local_traffic_manager +3 more products- Published: Dec. 23, 2019
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2000-0472
Buffer overflow in innd 2.2.2 allows remote attackers to execute arbitrary commands via a cancel request containing a long message ID.... Read more
Affected Products : inn- Published: Feb. 06, 2000
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2002-1710
The attachment capability in Compose Mail in BasiliX Webmail 1.1.0 does not check whether the attachment was uploaded by the user or came from a HTTP POST, which could allow local users to steal sensitive information like a password file.... Read more
Affected Products : basilix_webmail- Published: Dec. 31, 2002
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2019-2961
Vulnerability in the Oracle Solaris product of Oracle Systems (component: SMF services & legacy daemons). The supported version that is affected is 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure wher... Read more
- Published: Oct. 16, 2019
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2001-1258
Horde Internet Messaging Program (IMP) before 2.2.6 allows local users to read IMP configuration files and steal the Horde database password by placing the prefs.lang file containing PHP code on the server.... Read more
Affected Products : imp- Published: Jul. 21, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1322
xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask.... Read more
Affected Products : xinetd- Published: Jul. 10, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2012-4417
GlusterFS 3.3.0, as used in Red Hat Storage server 2.0, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.... Read more
Affected Products : glusterfs- Published: Nov. 18, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2008-0665
wml_backend/p1_ipp/ipp.src in Website META Language (WML) 2.0.11 allows local users to overwrite arbitrary files via a symlink attack on the ipp.$$.tmp temporary file.... Read more
Affected Products : website_meta_language- Published: Feb. 11, 2008
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2004-0698
4D WebSTAR 5.3.2 and earlier allows local users to read and modify arbitrary files via a symlink attack.... Read more
Affected Products : webstar- Published: Jul. 27, 2004
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2024-54014
Improper authorization in handler for custom URL scheme issue in 'Skylark' App for Android 6.2.13 and earlier and 'Skylark' App for iOS 6.2.13 and earlier allows an attacker to lead the application to access an arbitrary web site via another application i... Read more
Affected Products :- Published: Dec. 05, 2024
- Modified: Dec. 05, 2024
-
3.6
LOWCVE-2008-1371
Absolute path traversal vulnerability in install/index.php in Drake CMS 0.4.11 RC8 allows remote attackers to read and execute arbitrary files via a full pathname in the d_root parameter. NOTE: the provenance of this information is unknown; the details a... Read more
Affected Products : drake_cms- Published: Mar. 18, 2008
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2006-4092
Simpliciti Locked Browser does not properly limit a user's actions to ones within the intended Internet Explorer environment, which allows local users to perform unauthorized actions by visiting a web site that executes a JavaScript window.blur loop to re... Read more
Affected Products : locked_browser- Published: Aug. 11, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2023-39342
Dangerzone is software for converting potentially dangerous PDFs, office documents, or images to safe PDFs. The Dangerzone CLI (`dangerzone-cli` command) logs output from the container where the file sanitization takes place, to the user's terminal. Prior... Read more
Affected Products : dangerzone- Published: Aug. 08, 2023
- Modified: Nov. 21, 2024