Latest CVE Feed
-
3.6
LOWCVE-2012-3750
The Passcode Lock implementation in Apple iOS before 6.0.1 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement and access Passbook passes via unspecified vectors.... Read more
Affected Products : iphone_os- Published: Nov. 03, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2024-38531
Nix is a package manager for Linux and other Unix systems that makes package management reliable and reproducible. A build process has access to and can change the permissions of the build directory. After creating a setuid binary in a globally accessible... Read more
- Published: Jun. 28, 2024
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2010-4460
Unspecified vulnerability in Oracle Solaris 10 allows local users to affect confidentiality and integrity via unknown vectors related to Fault Manager Daemon.... Read more
- Published: Jan. 19, 2011
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2010-1439
yum-rhn-plugin in Red Hat Network Client Tools (aka rhn-client-tools) on Red Hat Enterprise Linux (RHEL) 5 and Fedora uses world-readable permissions for the /var/spool/up2date/loginAuth.pkl file, which allows local users to access the Red Hat Network pro... Read more
- Published: Jun. 07, 2010
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2010-3028
The Aardvertiser component before 2.2.1 for Joomla! uses insecure permissions (777) in unspecified folders, which allows local users to modify, create, or delete certain files.... Read more
- Published: Aug. 16, 2010
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2013-0164
The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.... Read more
- Published: Feb. 24, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2014-6543
Unspecified vulnerability in the Agile PLM component in Oracle Supply Chain Products Suite 9.3.3 allows remote authenticated users to affect confidentiality and integrity via vectors related to ITEM (Item & BOM).... Read more
Affected Products : supply_chain_products_suite- Published: Oct. 15, 2014
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2012-4417
GlusterFS 3.3.0, as used in Red Hat Storage server 2.0, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.... Read more
Affected Products : glusterfs- Published: Nov. 18, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2014-0177
The am function in lib/hub/commands.rb in hub before 1.12.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary patch file.... Read more
- Published: May. 27, 2014
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2014-0005
PicketBox and JBossSX, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.2.2 and JBoss BRMS before 6.0.3 roll up patch 2, allows remote authenticated users to read and modify the application sever configuration and state by deploying a cr... Read more
- Published: Feb. 20, 2015
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2016-3155
Siemens APOGEE Insight uses weak permissions for the application folder, which allows local users to obtain sensitive information or modify data via unspecified vectors.... Read more
Affected Products : apogee_insight- Published: Mar. 18, 2016
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2015-0267
The Red Hat module-setup.sh script for kexec-tools, as distributed in the kexec-tools before 2.0.7-19 packages in Red Hat Enterprise Linux, allows local users to write to arbitrary files via a symlink attack on a temporary file.... Read more
Affected Products : kexec-tools- Published: May. 19, 2015
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2014-1353
Lock Screen in Apple iOS before 7.1.2 does not properly manage the telephony state in Airplane Mode, which allows physically proximate attackers to bypass the lock protection mechanism, and access a certain foreground application, via unspecified vectors.... Read more
Affected Products : iphone_os- Published: Jul. 01, 2014
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2013-5364
Secunia CSI Agent 6.0.0.15017 and earlier, 6.0.1.1007 and earlier, and 7.0.0.21 and earlier, when running on Red Hat Linux, uses world-readable and world-writable permissions for /etc/csia_config.xml, which allows local users to change CSI Agent configura... Read more
- Published: Jan. 26, 2014
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2013-4956
Puppet Module Tool (PMT), as used in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, installs modules with weak permissions if those permissions were used when the modules were originally... Read more
- Published: Aug. 20, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2013-4426
pyxtrlock before 0.1 uses an incorrect variable name, which allows physically proximate attackers to bypass the lock screen via multiple failed authentication attempts, which trigger a crash.... Read more
Affected Products : pyxtrlock- Published: May. 19, 2014
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2013-4157
Red Hat Storage 2.0 allows local users to overwrite arbitrary files via a symlink attack on the (1) e, (2) local-bricks.list, (3) bricks.err, or (4) limits.conf files in /tmp.... Read more
Affected Products : storage_server- Published: Oct. 04, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2013-2930
The perf_trace_event_perm function in kernel/trace/trace_event_perf.c in the Linux kernel before 3.12.2 does not properly restrict access to the perf subsystem, which allows local users to enable function tracing via a crafted application.... Read more
Affected Products : linux_kernel- Published: Dec. 09, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2006-4439
pkgadd in Sun Solaris 10 before 20060825 installs files with insecure file and directory permissions (755 or 777) if the pkgmap file contains a "?" (question mark) in the mode field, which allows local users to modify arbitrary files or directories, a dif... Read more
Affected Products : solaris- Published: Aug. 29, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2024-56433
shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potential... Read more
Affected Products : shadow-utils- Published: Dec. 26, 2024
- Modified: Dec. 26, 2024