Latest CVE Feed
-
3.6
LOWCVE-2020-1807
HUAWEI Mate 20 smartphones with versions earlier than 10.0.0.188(C00E74R3P8) have an improper authorization vulnerability. The software does not properly restrict certain user's modification of certain configuration file, successful exploit could allow th... Read more
- Published: Apr. 27, 2020
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2011-1837
The lock-counter implementation in utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 allows local users to overwrite arbitrary files via unspecified vectors.... Read more
- Published: Feb. 15, 2014
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2012-1699
The ProcSetEventMask function in difs/events.c in the xfs font server for X.Org X11R6 through X11R6.6 and XFree86 before 3.3.3 calls the SendErrToClient function with a mask value instead of a pointer, which allows local users to cause a denial of service... Read more
- Published: Dec. 21, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2012-3504
The nssconfigFound function in genkey.pl in crypto-utils 2.4.1-34 allows local users to overwrite arbitrary files via a symlink attack on the "list" file in the current working directory.... Read more
Affected Products : crypto-utils- Published: Oct. 10, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2010-1967
Unspecified vulnerability in HP Insight Software Installer for Windows before 6.1 allows local users to read or modify data via unknown vectors.... Read more
- Published: Jul. 15, 2010
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2006-4246
Usermin before 1.220 (20060629) allows remote attackers to read arbitrary files, possibly related to chfn/save.cgi not properly handling an empty shell parameter, which results in changing root's shell instead of the shell of a specified user.... Read more
Affected Products : usermin- Published: Sep. 19, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2010-2072
Pyftpd 0.8.4 creates log files with predictable names in a temporary directory, which allows local users to cause a denial of service and obtain sensitive information.... Read more
Affected Products : pyftpd- Published: Jun. 16, 2010
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2024-38531
Nix is a package manager for Linux and other Unix systems that makes package management reliable and reproducible. A build process has access to and can change the permissions of the build directory. After creating a setuid binary in a globally accessible... Read more
- Published: Jun. 28, 2024
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2010-3028
The Aardvertiser component before 2.2.1 for Joomla! uses insecure permissions (777) in unspecified folders, which allows local users to modify, create, or delete certain files.... Read more
- Published: Aug. 16, 2010
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2010-1439
yum-rhn-plugin in Red Hat Network Client Tools (aka rhn-client-tools) on Red Hat Enterprise Linux (RHEL) 5 and Fedora uses world-readable permissions for the /var/spool/up2date/loginAuth.pkl file, which allows local users to access the Red Hat Network pro... Read more
- Published: Jun. 07, 2010
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2011-2289
Unspecified vulnerability in Oracle Solaris 10 allows local users to affect integrity and availability via unknown vectors related to LiveUpgrade.... Read more
- Published: Jul. 21, 2011
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2008-0001
VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.... Read more
Affected Products : linux_kernel- Published: Jan. 15, 2008
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2011-0793
Unspecified vulnerability in the Database Vault component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, and 11.2.0.1 allows remote authenticated users to affect integrity and availability, related to SYSDBA.... Read more
Affected Products : database_server- Published: Apr. 20, 2011
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2005-4618
Buffer overflow in sysctl in the Linux Kernel 2.6 before 2.6.15 allows local users to corrupt user memory and possibly cause a denial of service via a long string, which causes sysctl to write a zero byte outside the buffer. NOTE: since the sysctl is cal... Read more
Affected Products : linux_kernel- Published: Dec. 31, 2005
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2011-1182
kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.... Read more
- Published: Mar. 01, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2005-2492
The raw_sendmsg function in the Linux kernel 2.6 before 2.6.13.1 allows local users to cause a denial of service (change hardware state) or read from arbitrary memory via crafted input.... Read more
- Published: Sep. 14, 2005
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2015-5273
The abrt-action-install-debuginfo-to-abrt-cache help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users to write to arbitrary files via a symlink attack on unpacked.cpio in a pre-created directory with a predictable name in /va... Read more
- Published: Dec. 07, 2015
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2012-1122
bug_actiongroup.php in MantisBT before 1.2.9 does not properly check the report_bug_threshold permission of the receiving project when moving a bug report, which allows remote authenticated users with the report_bug_threshold and move_bug_threshold privil... Read more
Affected Products : mantisbt- Published: Jun. 29, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2014-0177
The am function in lib/hub/commands.rb in hub before 1.12.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary patch file.... Read more
- Published: May. 27, 2014
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2014-0005
PicketBox and JBossSX, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.2.2 and JBoss BRMS before 6.0.3 roll up patch 2, allows remote authenticated users to read and modify the application sever configuration and state by deploying a cr... Read more
- Published: Feb. 20, 2015
- Modified: Apr. 12, 2025