Latest CVE Feed
-
3.6
LOWCVE-2000-0487
The Protected Store in Windows 2000 does not properly select the strongest encryption when available, which causes it to use a default of 40-bit encryption instead of 56-bit DES encryption, aka the "Protected Store Key Length" vulnerability.... Read more
Affected Products : windows_2000- Published: Jun. 01, 2000
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2015-4155
GNU Parallel before 20150422, when using (1) --pipe, (2) --tmux, (3) --cat, (4) --fifo, or (5) --compress, allows local users to write to arbitrary files via a symlink attack on a temporary file.... Read more
Affected Products : parallel- Published: Jun. 02, 2015
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2009-3257
vtiger CRM before 5.1.0 allows remote authenticated users to bypass the permissions on the (1) Account Billing Address and (2) Shipping Address fields in a profile by creating a Sales Order (SO) associated with that profile.... Read more
Affected Products : vtiger_crm- Published: Sep. 18, 2009
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2000-0667
Vulnerability in gpm in Caldera Linux allows local users to delete arbitrary files or conduct a denial of service.... Read more
Affected Products : linux- Published: Jul. 27, 2000
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2003-1234
Integer overflow in the f_count counter in FreeBSD before 4.2 through 5.0 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via multiple calls to (1) fpathconf and (2) lseek, which do not properly decrement f_coun... Read more
Affected Products : freebsd- Published: Dec. 31, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2003-1452
Untrusted search path vulnerability in Qualcomm qpopper 4.0 through 4.05 allows local users to execute arbitrary code by modifying the PATH environment variable to reference a malicious smbpasswd program.... Read more
Affected Products : qpopper- Published: Dec. 31, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2000-0270
The make-temp-name Lisp function in Emacs 20 creates temporary files with predictable names, which allows attackers to conduct a symlink attack.... Read more
Affected Products : emacs- Published: Apr. 18, 2000
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2012-2451
The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack. NOTE: some of these details are obtained from third party information. NOTE: it ... Read more
Affected Products : config-inifiles- Published: Jun. 27, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2012-1120
The SOAP API in MantisBT before 1.2.9 does not properly enforce the bugnote_allow_user_edit_delete and delete_bug_threshold permissions, which allows remote authenticated users with read and write SOAP API privileges to delete arbitrary bug reports and bu... Read more
Affected Products : mantisbt- Published: Jun. 29, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2008-2288
Symantec Altiris Deployment Solution 6.8.x and 6.9.x before 6.9.176 has insufficient access control for deletion and modification of registry keys, which allows local users to cause a denial of service or obtain sensitive information.... Read more
Affected Products : altiris_deployment_solution- Published: May. 18, 2008
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2016-3155
Siemens APOGEE Insight uses weak permissions for the application folder, which allows local users to obtain sensitive information or modify data via unspecified vectors.... Read more
Affected Products : apogee_insight- Published: Mar. 18, 2016
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2015-7311
libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.... Read more
Affected Products : xen- Published: Oct. 01, 2015
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2013-4956
Puppet Module Tool (PMT), as used in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, installs modules with weak permissions if those permissions were used when the modules were originally... Read more
- Published: Aug. 20, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2019-1348
An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. The --export-marks option of git fast-import is exposed also via the in-stream command feature export-marks=... and it ... Read more
- Published: Jan. 24, 2020
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2014-0177
The am function in lib/hub/commands.rb in hub before 1.12.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary patch file.... Read more
- Published: May. 27, 2014
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2013-4157
Red Hat Storage 2.0 allows local users to overwrite arbitrary files via a symlink attack on the (1) e, (2) local-bricks.list, (3) bricks.err, or (4) limits.conf files in /tmp.... Read more
Affected Products : storage_server- Published: Oct. 04, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2014-0005
PicketBox and JBossSX, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.2.2 and JBoss BRMS before 6.0.3 roll up patch 2, allows remote authenticated users to read and modify the application sever configuration and state by deploying a cr... Read more
- Published: Feb. 20, 2015
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2014-2477
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 3.2.24, 4.0.26, 4.1.34, 4.2.26, and 4.3.12 allows local users to affect integrity and availability via unknown vectors related to Core, a different ... Read more
Affected Products : vm_virtualbox- Published: Jul. 17, 2014
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2014-6543
Unspecified vulnerability in the Agile PLM component in Oracle Supply Chain Products Suite 9.3.3 allows remote authenticated users to affect confidentiality and integrity via vectors related to ITEM (Item & BOM).... Read more
Affected Products : supply_chain_products_suite- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2015-0267
The Red Hat module-setup.sh script for kexec-tools, as distributed in the kexec-tools before 2.0.7-19 packages in Red Hat Enterprise Linux, allows local users to write to arbitrary files via a symlink attack on a temporary file.... Read more
Affected Products : kexec-tools- Published: May. 19, 2015
- Modified: Apr. 12, 2025