Latest CVE Feed
-
3.6
LOWCVE-2008-0806
wyrd 1.4.3b allows local users to overwrite arbitrary files via a symlink attack on the wyrd-tmp.[USERID] temporary file.... Read more
Affected Products : wyrd- Published: Feb. 19, 2008
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2019-1348
An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. The --export-marks option of git fast-import is exposed also via the in-stream command feature export-marks=... and it ... Read more
- Published: Jan. 24, 2020
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2014-2477
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 3.2.24, 4.0.26, 4.1.34, 4.2.26, and 4.3.12 allows local users to affect integrity and availability via unknown vectors related to Core, a different ... Read more
Affected Products : vm_virtualbox- Published: Jul. 17, 2014
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2012-3453
logol 1.5.0 uses world writable permissions for the /var/lib/logol/results directory, which allows local users to delete or overwrite arbitrary files.... Read more
Affected Products : logol- Published: Aug. 07, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2011-3511
Unspecified vulnerability in the Database Vault component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, and 11.2.0.2 allows remote authenticated users to affect integrity and availability via unknown vectors related to Privileged Accou... Read more
Affected Products : database_server- Published: Oct. 18, 2011
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2012-3750
The Passcode Lock implementation in Apple iOS before 6.0.1 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement and access Passbook passes via unspecified vectors.... Read more
Affected Products : iphone_os- Published: Nov. 03, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2011-4606
Artsoft Entertainment Rocks'n'Diamonds (aka rocksndiamonds) 3.3.0.1 allows local users to overwrite arbitrary files via a symlink attack on .rocksndiamonds/cache/artworkinfo.cache under a user's home directory.... Read more
Affected Products : rocks\'n\'diamonds- Published: Dec. 15, 2011
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2005-2492
The raw_sendmsg function in the Linux kernel 2.6 before 2.6.13.1 allows local users to cause a denial of service (change hardware state) or read from arbitrary memory via crafted input.... Read more
- Published: Sep. 14, 2005
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2012-0109
Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect confidentiality and availability, related to TCP/IP.... Read more
- Published: Jan. 18, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2020-29374
An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore ... Read more
Affected Products : linux_kernel debian_linux h410c_firmware solidfire_\&_hci_management_node hci_compute_node_bios solidfire_\&_hci_storage_node a250_firmware 500f_firmware h410c a250 +1 more products- Published: Nov. 28, 2020
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2012-3504
The nssconfigFound function in genkey.pl in crypto-utils 2.4.1-34 allows local users to overwrite arbitrary files via a symlink attack on the "list" file in the current working directory.... Read more
Affected Products : crypto-utils- Published: Oct. 10, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2014-1875
The Capture::Tiny module before 0.24 for Perl allows local users to write to arbitrary files via a symlink attack on a temporary file.... Read more
Affected Products : capture-tiny- Published: Oct. 06, 2014
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2000-1127
registrar in the HP resource monitor service allows local users to read and modify arbitrary files by renaming the original registrar.log log file and creating a symbolic link to the target file, to which registrar appends log information and sets the per... Read more
Affected Products : hp-ux- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1258
Horde Internet Messaging Program (IMP) before 2.2.6 allows local users to read IMP configuration files and steal the Horde database password by placing the prefs.lang file containing PHP code on the server.... Read more
Affected Products : imp- Published: Jul. 21, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-0885
Alibaba web server allows remote attackers to execute commands via a pipe character in a malformed URL.... Read more
Affected Products : alibaba- Published: Nov. 03, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1395
Unknown vulnerability in sockfilter for Linux kernel before 2.2.19 related to "boundary cases," with unknown impact.... Read more
- Published: Apr. 17, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2002-2270
Unspecified vulnerability in the ied command in HP-UX 10.10, 10.20, and 11.0 allows local users to view "normally invisible data" via unknown attack vectors.... Read more
Affected Products : hp-ux- Published: Dec. 31, 2002
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1519
RunAs (runas.exe) in Windows 2000 allows local users to create a spoofed named pipe when the service is stopped, then capture cleartext usernames and passwords when clients connect to the service. NOTE: the vendor disputes this issue, saying that adminis... Read more
Affected Products : windows_2000- Published: Dec. 31, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2001-1322
xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask.... Read more
Affected Products : xinetd- Published: Jul. 10, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2025-27613
Gitk is a Tcl/Tk based Git history browser. Starting with 1.7.0, when a user clones an untrusted repository and runs gitk without additional command arguments, files for which the user has write permission can be created and truncated. The option Support ... Read more
Affected Products : git- Published: Jul. 10, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Misconfiguration