Latest CVE Feed
-
2.6
LOWCVE-2001-0092
A function in Internet Explorer 5.0 through 5.5 does not properly verify the domain of a frame within a browser window, which allows a remote attacker to read client files, aka a new variant of the "Frame Domain Verification" vulnerability.... Read more
Affected Products : internet_explorer- Published: Feb. 16, 2001
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2001-0807
Internet Explorer 5.0, and possibly other versions, may allow remote attackers (malicious web pages) to read known text files from a client's hard drive via a SCRIPT tag with a SRC value that points to the text file.... Read more
Affected Products : internet_explorer- Published: Dec. 06, 2001
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2000-0028
Internet Explorer 5.0 and 5.01 allows remote attackers to bypass the cross frame security policy and read files via the external.NavigateAndFind function.... Read more
- Published: Dec. 23, 1999
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2006-0926
Multiple directory traversal vulnerabilities in Allume StuffIt Standard and Deluxe 9.0, ZipMagic Deluxe 9.0, and StuffIt Expander 9.0.0.21 Engine 9.0.0.21 allow remote attackers to create and overwrite arbitrary files via certain crafted pathnames in a (1... Read more
- Published: Feb. 28, 2006
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-1999-0396
A race condition between the select() and accept() calls in NetBSD TCP servers allows remote attackers to cause a denial of service.... Read more
- Published: Feb. 17, 1999
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2008-3270
yum-rhn-plugin in Red Hat Enterprise Linux (RHEL) 5 does not verify the SSL certificate for a file download from a Red Hat Network (RHN) server, which makes it easier for remote man-in-the-middle attackers to cause a denial of service (loss of updates) or... Read more
Affected Products : enterprise_linux- Published: Aug. 18, 2008
- Modified: Apr. 09, 2025
-
2.6
LOWCVE-2000-0006
strace allows local users to read arbitrary files via memory mapped file names.... Read more
- Published: Dec. 25, 1999
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2000-0132
Microsoft Java Virtual Machine allows remote attackers to read files via the getSystemResourceAsStream function.... Read more
Affected Products : virtual_machine- Published: Jan. 31, 2000
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2006-0836
Mozilla Thunderbird 1.5 allows user-assisted attackers to cause an unspecified denial of service by tricking the user into importing an LDIF file with a long field into the address book, as demonstrated by a long homePhone field.... Read more
Affected Products : thunderbird- Published: Feb. 22, 2006
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2008-3326
Cross-site scripting (XSS) vulnerability in blog/edit.php in Moodle 1.6.x before 1.6.7 and 1.7.x before 1.7.5 allows remote attackers to inject arbitrary web script or HTML via the etitle parameter (blog entry title).... Read more
Affected Products : moodle- Published: Jul. 25, 2008
- Modified: Apr. 09, 2025
-
2.6
LOWCVE-1999-0487
The DHTML Edit ActiveX control in Internet Explorer allows remote attackers to read arbitrary files.... Read more
Affected Products : internet_explorer- Published: May. 01, 1999
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-1999-1263
Metamail before 2.7-7.2 allows remote attackers to overwrite arbitrary files via an e-mail message containing a uuencoded attachment that specifies the full pathname for the file to be modified, which is processed by uuencode in Metamail scripts such as s... Read more
Affected Products : metamail- Published: Aug. 15, 2003
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2008-3634
Apple iTunes before 8.0 on Mac OS X 10.4.11, when iTunes Music Sharing is enabled but blocked by the host-based firewall, presents misleading information about firewall security, which might allow remote attackers to leverage an exposure that would be abs... Read more
- Published: Sep. 11, 2008
- Modified: Apr. 09, 2025
-
2.6
LOWCVE-2001-0273
pgp4pine Pine/PGP interface version 1.75-6 does not properly check to see if a public key has expired when obtaining the keys via Gnu Privacy Guard (GnuPG), which causes the message to be sent in cleartext.... Read more
Affected Products : pgp4pine- Published: May. 03, 2001
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2008-3457
Cross-site scripting (XSS) vulnerability in setup.php in phpMyAdmin before 2.11.8 allows user-assisted remote attackers to inject arbitrary web script or HTML via crafted setup arguments. NOTE: this issue can only be exploited in limited scenarios in whi... Read more
Affected Products : phpmyadmin- Published: Aug. 04, 2008
- Modified: Apr. 09, 2025
-
2.6
LOWCVE-2010-3172
CRLF injection vulnerability in Bugzilla before 3.2.9, 3.4.x before 3.4.9, 3.6.x before 3.6.3, and 4.0.x before 4.0rc1, when Server Push is enabled in a web browser, allows remote attackers to inject arbitrary HTTP headers and content, and conduct HTTP re... Read more
Affected Products : bugzilla- Published: Nov. 05, 2010
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2011-3649
Mozilla Firefox 7.0 and Thunderbird 7.0, when the Direct2D (aka D2D) API is used on Windows in conjunction with the Azure graphics back-end, allow remote attackers to bypass the Same Origin Policy, and obtain sensitive image data from a different domain, ... Read more
- Published: Nov. 09, 2011
- Modified: Apr. 11, 2025
-
2.6
LOWCVE-2006-3174
Cross-site scripting (XSS) vulnerability in search.php in SquirrelMail 1.5.1 and earlier, when register_globals is enabled, allows remote attackers to inject arbitrary HTML via the mailbox parameter.... Read more
Affected Products : squirrelmail- Published: Jun. 23, 2006
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2006-4484
Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow wh... Read more
Affected Products : php- Published: Aug. 31, 2006
- Modified: Apr. 03, 2025
-
2.6
LOWCVE-2011-3266
The proto_tree_add_item function in Wireshark 1.6.0 through 1.6.1 and 1.4.0 through 1.4.8, when the IKEv1 protocol dissector is used, allows user-assisted remote attackers to cause a denial of service (infinite loop) via vectors involving a malformed IKE ... Read more
Affected Products : wireshark- Published: Aug. 24, 2011
- Modified: Apr. 11, 2025