Latest CVE Feed
-
2.6
LOWCVE-2005-1347
** UNVERIFIABLE ** NOTE: this issue describes a problem that can not be independently verified as of 20050421. Adobe Acrobat reader (AcroRd32.exe) 6.0 and earlier allows remote attackers to cause a denial of service ("Invalid-ID-Handle-Error" error) and... Read more
Affected Products : acrobat_reader- Published: May. 02, 2005
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2001-0685
Thibault Godouet FCron prior to 1.1.1 allows a local user to corrupt another user's crontab file via a symlink attack on the fcrontab temporary file.... Read more
Affected Products : fcron- Published: Sep. 20, 2001
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2004-1495
The Repair Archive command in WinRAR 3.40 allows remote attackers to cause a denial of service (application crash) via a corrupt ZIP archive.... Read more
Affected Products : winrar- Published: Dec. 31, 2004
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2006-3729
DataSourceControl in Internet Explorer 6 on Windows XP SP2 with Office installed allows remote attackers to cause a denial of service (crash) via a large negative integer argument to the getDataMemberName method of a OWC11.DataSourceControl.11 object, whi... Read more
- Published: Jul. 21, 2006
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2010-1856
Cross-site scripting (XSS) vulnerability in index.php in RepairShop2 1.9.023 Trial, when magic_quotes_gpc is disabled, allows remote attackers to inject arbitrary web script or HTML via the prod parameter in a products.details action.... Read more
Affected Products : repairshop2- Published: May. 07, 2010
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2010-2151
Cross-site request forgery (CSRF) vulnerability in Fujitsu e-Pares V01 L01 V01 L01, L03, L10, L20, L30, and L40 allows remote attackers to hijack the authentication of users for requests that modify "facility reservation data" via unknown vectors.... Read more
Affected Products : e-pares- Published: Jun. 03, 2010
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2006-0704
iE Integrator 4.4.220114, when configured without a "bespoke error page" in acm.ini, allows remote attackers to obtain sensitive information via a URL that calls a non-existent .aspx script in the integrator/apps directory, which results in an error messa... Read more
Affected Products : ie_integrator- Published: Feb. 15, 2006
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2010-2957
Cross-site scripting (XSS) vulnerability in Serendipity before 1.5.4, when "Remember me" logins are enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.... Read more
Affected Products : serendipity- Published: Sep. 10, 2010
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2000-0892
Some telnet clients allow remote telnet servers to request environment variables from the client that may contain sensitive information, or remote web servers to obtain the information via a telnet: URL.... Read more
- Published: Jul. 21, 2001
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2006-2015
Cross-site scripting (XSS) vulnerability in SL_site 1.0 allows remote attackers to inject arbitrary web script or HTML via the recherche parameter in recherche.php. NOTE: other XSS vectors, as reported in the original disclosure, are resultant from other... Read more
Affected Products : sl_site- Published: Apr. 25, 2006
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-1999-0485
Remote attackers can cause a system crash through ipintr() in ipq in OpenBSD.... Read more
Affected Products : openbsd- Published: Feb. 19, 1999
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2000-0767
The ActiveX control for invoking a scriptlet in Internet Explorer 4.x and 5.x renders arbitrary file types instead of HTML, which allows an attacker to read arbitrary files, aka the "Scriptlet Rendering" vulnerability.... Read more
Affected Products : internet_explorer- Published: Oct. 20, 2000
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2000-0503
The IFRAME of the WebBrowser control in Internet Explorer 5.01 allows a remote attacker to violate the cross frame security policy via the NavigateComplete2 event.... Read more
Affected Products : internet_explorer- Published: Jun. 06, 2000
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2022-21929
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability... Read more
Affected Products : edge_chromium- Published: Jan. 11, 2022
- Modified: Nov. 21, 2024
-
2.6
LOWCVE-2000-0649
IIS 4.0 allows remote attackers to obtain the internal IP address of the server via an HTTP 1.0 request for a web page which is protected by basic authentication and has no realm defined.... Read more
- Published: Jul. 13, 2000
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2012-3383
The map_meta_cap function in wp-includes/capabilities.php in WordPress 3.4.x before 3.4.2, when the multisite feature is enabled, does not properly assign the unfiltered_html capability, which allows remote authenticated users to bypass intended access re... Read more
Affected Products : wordpress- Published: Jul. 22, 2012
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2006-2311
Cross-site scripting (XSS) vulnerability in BlueDragon Server and Server JX 6.2.1.286 for Windows allows remote attackers to inject arbitrary web script or HTML via the filename in a request to a (1) .cfm or (2) .cfml file, which reflects the result in th... Read more
- Published: Jun. 26, 2006
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2012-5077
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown ... Read more
- Published: Oct. 16, 2012
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2013-2061
The openvpn_decrypt function in crypto.c in OpenVPN 2.3.0 and earlier, when running in UDP mode, allows remote attackers to obtain sensitive information via a timing attack involving an HMAC comparison function that does not run in constant time and a pad... Read more
- Published: Nov. 18, 2013
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2006-4567
Mozilla Firefox before 1.5.0.7 and Thunderbird before 1.5.0.7 makes it easy for users to accept self-signed certificates for the auto-update mechanism, which might allow remote user-assisted attackers to use DNS spoofing to trick users into visiting a mal... Read more
- Published: Sep. 15, 2006
- Modified: Apr. 03, 2025