Latest CVE Feed
-
3.6
LOWCVE-1999-0828
UnixWare pkg commands such as pkginfo, pkgcat, and pkgparam allow local users to read arbitrary files via the dacread permission.... Read more
Affected Products : unixware- Published: Dec. 02, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2000-0121
The Recycle Bin utility in Windows NT and Windows 2000 allows local users to read or modify files by creating a subdirectory with the victim's SID in the recycler directory, aka the "Recycle Bin Creation" vulnerability.... Read more
Affected Products : windows_nt- Published: Feb. 01, 2000
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2006-4266
Symantec Norton Personal Firewall 2006 9.1.0.33, and possibly earlier, does not properly protect Norton registry keys, which allows local users to provide Trojan horse libraries to Norton by using RegSaveKey and RegRestoreKey to modify HKLM\SOFTWARE\Syman... Read more
Affected Products : norton_personal_firewall- Published: Aug. 21, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2006-2288
Avahi before 0.6.10 allows local users to cause a denial of service (mDNS/DNS-SD service disconnect) via unspecified mDNS name conflicts.... Read more
Affected Products : avahi- Published: May. 10, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2023-3485
Insecure defaults in open-source Temporal Server before version 1.20 on all platforms allows an attacker to craft a task token with access to a namespace other than the one specified in the request. Creation of this task token must be done outside of the ... Read more
Affected Products : temporal- Published: Jun. 30, 2023
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2018-16463
A bug causing session fixation in Nextcloud Server prior to 14.0.0, 13.0.3 and 12.0.8 could potentially allow an attacker to obtain access to password protected shares.... Read more
Affected Products : nextcloud_server- Published: Oct. 30, 2018
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2018-12446
An issue was discovered in the com.dropbox.android application 98.2.2 for Android. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method's return value to true. In other words, an attacker could authentica... Read more
Affected Products : dropbox- Published: Jun. 20, 2018
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2001-1059
VMWare creates a temporary file vmware-log.USERNAME with insecure permissions, which allows local users to read or modify license information.... Read more
Affected Products : workstation- Published: Jul. 30, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2007-2703
BEA WebLogic Portal 9.2 GA can corrupt a visitor entitlements role if an administrator provides a long role description, which might allow remote authenticated users to access privileged resources.... Read more
- Published: May. 16, 2007
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2002-1518
mv in IRIX 6.5 creates a directory with world-writable permissions while moving a directory, which could allow local users to modify files and directories.... Read more
Affected Products : irix- Published: Apr. 02, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2003-0448
Portmon 1.7 and possibly earlier versions allows local users to read and write arbitrary files via the (1) -c (host file) or (2) -l (log file) command line options.... Read more
Affected Products : portmon- Published: Jul. 24, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2013-5857
Unspecified vulnerability in the Oracle Health Sciences InForm component in Oracle Industry Applications 4.5 SP3, 4.5 SP3a-k, 4.6 SP0, 4.6 SP0a-c, 4.6 SP1, 4.6 SP1a-c, 4.6 SP2, 4.6 SP2a-c, 5.0 SP0, 5.0 SP0a, 5.0 SP1, and 5.0 SP1a-b allows remote authentic... Read more
Affected Products : industry_applications- Published: Oct. 16, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2012-3225
Unspecified vulnerability in the Oracle FLEXCUBE Direct Banking component in Oracle Financial Services Software 5.3.0 through 5.3.4 allows remote authenticated users to affect confidentiality and integrity, related to BASE.... Read more
Affected Products : financial_services_software- Published: Oct. 17, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2013-1766
libvirt 1.0.2 and earlier sets the group owner to kvm for device files, which allows local users to write to these files via unspecified vectors.... Read more
Affected Products : libvirt- Published: Mar. 20, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2012-5477
The smart proxy in Foreman before 1.1 uses a umask set to 0, which allows local users to modify files created by the daemon via unspecified vectors.... Read more
Affected Products : foreman- Published: May. 08, 2014
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2012-2692
MantisBT before 1.2.11 does not check the delete_attachments_threshold permission when form_security_validation is set to OFF, which allows remote authenticated users with certain privileges to bypass intended access restrictions and delete arbitrary atta... Read more
Affected Products : mantisbt- Published: Jun. 17, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2012-1989
telnet.rb in Puppet 2.7.x before 2.7.13 and Puppet Enterprise (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users to overwrite arbitrary files via a symlink attack on the NET::Telnet connection log (/tmp/out.log).... Read more
- Published: Jun. 27, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2011-0793
Unspecified vulnerability in the Database Vault component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, and 11.2.0.1 allows remote authenticated users to affect integrity and availability, related to SYSDBA.... Read more
Affected Products : database_server- Published: Apr. 20, 2011
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2010-4819
The ProcRenderAddGlyphs function in the Render extension (render/render.c) in X.Org xserver 1.7.7 and earlier allows local users to read arbitrary memory and possibly cause a denial of service (server crash) via unspecified vectors related to an "input sa... Read more
- Published: Sep. 05, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2024-38531
Nix is a package manager for Linux and other Unix systems that makes package management reliable and reproducible. A build process has access to and can change the permissions of the build directory. After creating a setuid binary in a globally accessible... Read more
- Published: Jun. 28, 2024
- Modified: Nov. 21, 2024