Latest CVE Feed
-
3.6
LOWCVE-2006-3786
Symantec pcAnywhere 12.5 uses weak integrity protection for .cif (aka caller or CallerID) files, which allows local users to generate a custom .cif file and modify the superuser flag.... Read more
Affected Products : pcanywhere- Published: Jul. 24, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-0828
UnixWare pkg commands such as pkginfo, pkgcat, and pkgparam allow local users to read arbitrary files via the dacread permission.... Read more
Affected Products : unixware- Published: Dec. 02, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2003-1460
Worker Filemanager 1.0 through 2.7 sets the permissions on the destination directory to world-readable and executable while copying data, which could allow local users to obtain sensitive information.... Read more
Affected Products : worker_filemanager- Published: Dec. 31, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2018-1842
IBM Cognos Analytics 11 Configuration tool, under certain circumstances, will bypass OIDC namespace signature verification on its id_token. IBM X-Force ID: 150902.... Read more
- Published: Nov. 09, 2018
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2018-16463
A bug causing session fixation in Nextcloud Server prior to 14.0.0, 13.0.3 and 12.0.8 could potentially allow an attacker to obtain access to password protected shares.... Read more
Affected Products : nextcloud_server- Published: Oct. 30, 2018
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2021-35465
Certain Arm products before 2021-08-23 do not properly consider the effect of exceptions on a VLLDM instruction. A Non-secure handler may have read or write access to part of a Secure context. This affects Arm Cortex-M33 r0p0 through r1p0, Arm Cortex-M35P... Read more
- Published: Aug. 23, 2021
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2006-4266
Symantec Norton Personal Firewall 2006 9.1.0.33, and possibly earlier, does not properly protect Norton registry keys, which allows local users to provide Trojan horse libraries to Norton by using RegSaveKey and RegRestoreKey to modify HKLM\SOFTWARE\Syman... Read more
Affected Products : norton_personal_firewall- Published: Aug. 21, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2014-6544
Unspecified vulnerability in the JDBC component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, and 12.1.0.1 allows remote authenticated users to affect confidentiality and integrity via unknown vectors, a different vulnerability than CVE-2014-428... Read more
Affected Products : database_server- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2017-1699
IBM MQ Managed File Transfer Agent 8.0 and 9.0 sets insecure permissions on certain files it creates. A local attacker could exploit this vulnerability to modify or delete data contained in the files with an unknown impact. IBM X-Force ID: 134391.... Read more
- Published: Jan. 04, 2018
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2003-0596
FDclone 2.00a, and other versions before 2.02a, creates temporary directories with predictable names and uses them if they already exist, which allows local users to read or modify files of other fdclone users by creating the directory ahead of time.... Read more
Affected Products : fdclone- Published: Aug. 27, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2003-0499
Mantis 0.17.5 and earlier stores its database password in cleartext in a world-readable configuration file, which allows local users to perform unauthorized database operations.... Read more
Affected Products : mantis- Published: Aug. 07, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2003-1452
Untrusted search path vulnerability in Qualcomm qpopper 4.0 through 4.05 allows local users to execute arbitrary code by modifying the PATH environment variable to reference a malicious smbpasswd program.... Read more
Affected Products : qpopper- Published: Dec. 31, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-0825
The default permissions for UnixWare /var/mail allow local users to read and modify other users' mail.... Read more
Affected Products : unixware- Published: Dec. 03, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2006-0202
Dave Nielsen and Patrick Breitenbach PayPal Web Services (aka PHP Toolkit) 0.50 and possibly earlier has (1) world-readable permissions for ipn/logs/ipn_success.txt, which allows local users to view sensitive information (payment data), and (2) world-writ... Read more
Affected Products : php_toolkit- Published: Jan. 13, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2005-0288
The change password functionality in Bottomline Webseries Payment Application does not require the old password when users enter a new password, which could allow remote authenticated users to change other users' passwords.... Read more
Affected Products : webseries_payment_application- Published: Jan. 11, 2005
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2003-1234
Integer overflow in the f_count counter in FreeBSD before 4.2 through 5.0 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via multiple calls to (1) fpathconf and (2) lseek, which do not properly decrement f_coun... Read more
Affected Products : freebsd- Published: Dec. 31, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-0850
The default permissions for Endymion MailMan allow local users to read email or modify files.... Read more
Affected Products : mailman_webmail- Published: Dec. 02, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2002-0202
PaintBBS 1.2 installs certain files and directories with insecure permissions, which allows local users to (1) obtain the encrypted server password via the world-readable oekakibbs.conf file, or (2) modify the server configuration via the world-writeable ... Read more
Affected Products : paintbbs- Published: May. 16, 2002
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2000-0270
The make-temp-name Lisp function in Emacs 20 creates temporary files with predictable names, which allows attackers to conduct a symlink attack.... Read more
Affected Products : emacs- Published: Apr. 18, 2000
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2014-1351
Siri in Apple iOS before 7.1.2 allows physically proximate attackers to bypass an intended lock-screen passcode requirement, and read a contact list, via a Siri request that refers to a contact ambiguously.... Read more
Affected Products : iphone_os- Published: Jul. 01, 2014
- Modified: Apr. 12, 2025