Latest CVE Feed
-
3.6
LOWCVE-2000-0880
LPPlus creates the lpdprocess file with world-writeable permissions, which allows local users to kill arbitrary processes by specifying an alternate process ID and using the setuid dcclpdshut program to kill the process that was specified in the lpdproces... Read more
Affected Products : lpplus- Published: Nov. 14, 2000
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-1999-1366
Pegasus e-mail client 3.0 and earlier uses weak encryption to store POP3 passwords in the pmail.ini file, which allows local users to easily decrypt the passwords and read e-mail.... Read more
Affected Products : pegasus_mail- Published: May. 15, 1999
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2015-4155
GNU Parallel before 20150422, when using (1) --pipe, (2) --tmux, (3) --cat, (4) --fifo, or (5) --compress, allows local users to write to arbitrary files via a symlink attack on a temporary file.... Read more
Affected Products : parallel- Published: Jun. 02, 2015
- Modified: Apr. 12, 2025
-
3.6
LOWCVE-2002-1692
Buffer overflow in backup utility of Microsoft Windows 95 allows attackers to execute arbitrary code by causing a filename with a long extension to be placed in a folder to be backed up.... Read more
Affected Products : windows_95- Published: Dec. 31, 2002
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2006-4233
Globus Toolkit 3.2.x, 4.0.x, and 4.1.0 before 20060815 allow local users to obtain sensitive information (proxy certificates) and overwrite arbitrary files via a symlink attack on temporary files in the /tmp directory, as demonstrated by files created by ... Read more
Affected Products : globus_toolkit- Published: Aug. 18, 2006
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2007-2837
The (1) getRule and (2) getChains functions in server/rules.cpp in fireflierd (fireflier-server) in FireFlier 1.1.6 allow local users to overwrite arbitrary files via a symlink attack on the /tmp/fireflier.rules temporary file.... Read more
- Published: Jul. 03, 2007
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2009-3410
Unspecified vulnerability in the RDBMS component in Oracle Database 11.1.0.7, 10.2.0.3, 10.2.0.4, 10.1.0.5, 9.2.0.8, and 9.2.0.8DV allows remote authenticated users to affect confidentiality and integrity via unknown vectors.... Read more
Affected Products : database_server- Published: Jan. 13, 2010
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2006-5213
Sun Solaris 10 before 20061006 uses "incorrect and insufficient permission checks" that allow local users to intercept or spoof packets by creating a raw socket on a link aggregation (network device aggregation).... Read more
Affected Products : solaris- Published: Oct. 10, 2006
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2002-1673
The web interface for Webmin 0.92 does not properly quote or filter script code in files that are displayed to the interface, which allows local users to execute script and possibly steal cookies by inserting the script into certain files or fields, such ... Read more
Affected Products : webmin- Published: Dec. 31, 2002
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2007-6208
sylprint.pl in claws mail tools (claws-mail-tools) allows local users to overwrite arbitrary files via a symlink attack on the sylprint.[USER].[PID] temporary file.... Read more
Affected Products : claws_mail_tools- Published: Dec. 04, 2007
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2007-5851
iChat in Apple Mac OS X 10.4.11 allows network-adjacent remote attackers to automatically initiate a video connection to another user via unknown vectors.... Read more
Affected Products : mac_os_x- Published: Dec. 19, 2007
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2011-0804
Unspecified vulnerability in the Database Vault component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.1, and 11.2.0.2 allows remote authenticated users to affect confidentiality and integrity via unknown vectors.... Read more
Affected Products : database_server- Published: Apr. 20, 2011
- Modified: Apr. 11, 2025
-
3.6
LOWCVE-2022-37010
In JetBrains IntelliJ IDEA before 2022.2 email address validation in the "Git User Name Is Not Defined" dialog was missed... Read more
Affected Products : intellij_idea- Published: Jul. 28, 2022
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2018-1842
IBM Cognos Analytics 11 Configuration tool, under certain circumstances, will bypass OIDC namespace signature verification on its id_token. IBM X-Force ID: 150902.... Read more
- Published: Nov. 09, 2018
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2021-35465
Certain Arm products before 2021-08-23 do not properly consider the effect of exceptions on a VLLDM instruction. A Non-secure handler may have read or write access to part of a Secure context. This affects Arm Cortex-M33 r0p0 through r1p0, Arm Cortex-M35P... Read more
- Published: Aug. 23, 2021
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2009-3409
Unspecified vulnerability in the PeopleSoft Enterprise HCM (TAM) component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 9.0 Bundle 10 allows remote authenticated users to affect confidentiality and integrity via unknown vectors.... Read more
- Published: Oct. 22, 2009
- Modified: Apr. 09, 2025
-
3.6
LOWCVE-2001-0806
Apple MacOS X 10.0 and 10.1 allow a local user to read and write to a user's desktop folder via insecure default permissions for the Desktop when it is created in some languages.... Read more
Affected Products : mac_os_x- Published: Dec. 06, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2025-30731
Vulnerability in the Oracle Applications Technology Stack product of Oracle E-Business Suite (component: Configuration). Supported versions that are affected are 12.2.3-12.2.14. Difficult to exploit vulnerability allows unauthenticated attacker with logo... Read more
Affected Products : applications_technology_stack- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Authorization
-
3.6
LOWCVE-2025-4878
A vulnerability was found in libssh, where an uninitialized variable exists under certain conditions in the privatekey_from_file() function. This flaw can be triggered if the file specified by the filename doesn't exist and may lead to possible signing fa... Read more
Affected Products : libssh- Published: Jul. 22, 2025
- Modified: Jul. 29, 2025
- Vuln Type: Memory Corruption
-
3.6
LOWCVE-2023-39342
Dangerzone is software for converting potentially dangerous PDFs, office documents, or images to safe PDFs. The Dangerzone CLI (`dangerzone-cli` command) logs output from the container where the file sanitization takes place, to the user's terminal. Prior... Read more
Affected Products : dangerzone- Published: Aug. 08, 2023
- Modified: Nov. 21, 2024