Latest CVE Feed
-
3.6
LOWCVE-2011-1021
drivers/acpi/debugfs.c in the Linux kernel before 3.0 allows local users to modify arbitrary kernel memory locations by leveraging root privileges to write to the /sys/kernel/debug/acpi/custom_method file. NOTE: this vulnerability exists because of an inc... Read more
Affected Products : linux_kernel- Published: Jun. 21, 2012
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2021-25366
Improper access control in Samsung Internet prior to version 13.2.1.70 allows physically proximate attackers to bypass the secret mode's authentication.... Read more
Affected Products : internet- Published: Mar. 25, 2021
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2019-5252
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the ap... Read more
Affected Products : y6_pro_firmware honor_8x_firmware honor_9_lite_firmware honor_9i_firmware enjoy_8_plus_firmware y9_firmware honor_9i honor_8x y6_pro honor_9_lite +2 more products- Published: Dec. 14, 2019
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2002-1518
mv in IRIX 6.5 creates a directory with world-writable permissions while moving a directory, which could allow local users to modify files and directories.... Read more
Affected Products : irix- Published: Apr. 02, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2007-1150
Unrestricted file upload vulnerability in LoveCMS 1.4 allows remote authenticated administrators to upload arbitrary files to /modules/content/pictures/tmp/.... Read more
Affected Products : lovecms- Published: Mar. 02, 2007
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2013-5857
Unspecified vulnerability in the Oracle Health Sciences InForm component in Oracle Industry Applications 4.5 SP3, 4.5 SP3a-k, 4.6 SP0, 4.6 SP0a-c, 4.6 SP1, 4.6 SP1a-c, 4.6 SP2, 4.6 SP2a-c, 5.0 SP0, 5.0 SP0a, 5.0 SP1, and 5.0 SP1a-b allows remote authentic... Read more
Affected Products : industry_applications- Published: Oct. 16, 2013
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2002-2384
hotfoon4.exe in Hotfoon 4.00 stores user names and passwords in cleartext in the hotfoon2 registry key, which allows local users to gain access to user accounts and steal phone service.... Read more
Affected Products : hotfoon- Published: Dec. 31, 2002
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2018-1842
IBM Cognos Analytics 11 Configuration tool, under certain circumstances, will bypass OIDC namespace signature verification on its id_token. IBM X-Force ID: 150902.... Read more
- Published: Nov. 09, 2018
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2006-2288
Avahi before 0.6.10 allows local users to cause a denial of service (mDNS/DNS-SD service disconnect) via unspecified mDNS name conflicts.... Read more
Affected Products : avahi- Published: May. 10, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2006-4266
Symantec Norton Personal Firewall 2006 9.1.0.33, and possibly earlier, does not properly protect Norton registry keys, which allows local users to provide Trojan horse libraries to Norton by using RegSaveKey and RegRestoreKey to modify HKLM\SOFTWARE\Syman... Read more
Affected Products : norton_personal_firewall- Published: Aug. 21, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2025-55188
7-Zip before 25.01 does not always properly handle symbolic links during extraction.... Read more
Affected Products : 7-zip- Published: Aug. 08, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Path Traversal
-
3.6
LOWCVE-2024-50610
GSL (GNU Scientific Library) through 2.8 has an integer signedness error in gsl_siman_solve_many in siman/siman.c. When params.n_tries is negative, incorrect memory allocation occurs.... Read more
Affected Products : gnu_scientific_library- Published: Oct. 27, 2024
- Modified: Sep. 04, 2025
-
3.6
LOWCVE-2023-3485
Insecure defaults in open-source Temporal Server before version 1.20 on all platforms allows an attacker to craft a task token with access to a namespace other than the one specified in the request. Creation of this task token must be done outside of the ... Read more
Affected Products : temporal- Published: Jun. 30, 2023
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2020-4008
The installer of the macOS Sensor for VMware Carbon Black Cloud (prior to 3.5.1) handles certain files in an insecure way. A malicious actor who has local access to the endpoint on which a macOS sensor is going to be installed, may overwrite a limited num... Read more
- Published: Dec. 16, 2020
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2014-8994
The check_diskio plugin 3.2.6 and earlier for Nagios and Icinga allows local users to write to arbitrary files via a symlink attack on a temporary file with a predictable name (tmp/check_diskio_status-*-*).... Read more
Affected Products : check_diskio- Published: Nov. 28, 2014
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2024-2918
Improper input validation in PAM JIT elevation feature in Devolutions Server 2024.1.6 and earlier allows an attacker with access to the PAM JIT elevation feature to forge the displayed group in the PAM JIT elevation checkout request via a specially crafte... Read more
Affected Products : devolutions_server- Published: Apr. 09, 2024
- Modified: Mar. 28, 2025
-
3.6
LOWCVE-2025-4878
A vulnerability was found in libssh, where an uninitialized variable exists under certain conditions in the privatekey_from_file() function. This flaw can be triggered if the file specified by the filename doesn't exist and may lead to possible signing fa... Read more
Affected Products : libssh- Published: Jul. 22, 2025
- Modified: Jul. 29, 2025
- Vuln Type: Memory Corruption
-
3.6
LOWCVE-2002-2401
NT Virtual DOS Machine (NTVDM.EXE) in Windows 2000, NT and XP does not verify user execution permissions for 16-bit executable files, which allows local users to bypass the loader and execute arbitrary programs.... Read more
- Published: Dec. 31, 2002
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2003-0448
Portmon 1.7 and possibly earlier versions allows local users to read and write arbitrary files via the (1) -c (host file) or (2) -l (log file) command line options.... Read more
Affected Products : portmon- Published: Jul. 24, 2003
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-1498
Slackware Linux 3.4 pkgtool allows local attacker to read and write to arbitrary files via a symlink attack on the reply file.... Read more
Affected Products : slackware_linux- Published: Apr. 06, 1998
- Modified: Apr. 03, 2025