Latest CVE Feed
-
2.1
LOWCVE-2012-5605
Grinder in Red Hat CloudForms before 1.1 uses world-writable permissions for /var/lib/pulp/cache/grinder/, which allows local users to modify grinder cache files.... Read more
- Published: Jan. 04, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2005-1641
mod_channel in The Ignition Project ignitionServer 0.3.0 to 0.3.6, and possibly earlier versions, does not allow protected operators to access channels that have been locked out by a key, which allows IRC users to cause a denial of service.... Read more
Affected Products : ignitionserver- Published: May. 17, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2013-0162
The diff_pp function in lib/gauntlet_rubyparser.rb in the ruby_parser gem 3.1.1 and earlier for Ruby allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.... Read more
Affected Products : ruby_parser- Published: Mar. 01, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2005-0156
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long direc... Read more
Affected Products : enterprise_linux aix enterprise_linux_desktop suse_linux perl ubuntu_linux propack fedora_core secure_linux- Published: Feb. 07, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2012-5516
Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, when moving disks between storage domains, does not properly wipe-after-delete, which prevents disks from being securely deleted and might allow local users to obtain sensitive information via... Read more
- Published: Jan. 04, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2012-6648
gdm/guest-session-cleanup.sh in gdm-guest-session 0.24 and earlier, as used in Ubuntu Linux 10.04 LTS, 10.10, and 11.04, allows local users to delete arbitrary files via a space in the name of a file in /tmp. NOTE: this identifier was SPLIT from CVE-2012-... Read more
- Published: May. 22, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2012-6646
F-Secure Anti-Virus, Safe Anywhere, and PSB Workstation Security before 11500 for Mac OS X allows local users to disable the Mac OS X firewall via unspecified vectors.... Read more
- Published: Apr. 18, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2012-5561
script/katello-generate-passphrase in Katello 1.1 uses world-readable permissions for /etc/katello/secure/passphrase, which allows local users to obtain the passphrase by reading the file.... Read more
- Published: Mar. 01, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2015-2157
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.... Read more
- Published: Mar. 27, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2012-5538
Cross-site scripting (XSS) vulnerability in the FileField Sources module 6.x-1.x before 6.x-1.6 and 7.x-1.x before 7.x-1.6 for Drupal, when the field has "Reference existing" source enabled, allows remote authenticated users to inject arbitrary web script... Read more
- Published: Dec. 03, 2012
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2013-1888
pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.... Read more
- Published: Aug. 17, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2012-3818
The fpm exporter in Revelation 0.4.13-2 and earlier encrypts the version number but not the password when exporting a file, which might allow local users to obtain sensitive information.... Read more
Affected Products : revelation- Published: Jun. 29, 2012
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2013-2013
The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.... Read more
Affected Products : python-keystoneclient- Published: Oct. 01, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2012-0568
Unspecified vulnerability in Oracle Sun Solaris 8, 9, and 10 allows local users to affect confidentiality via unknown vectors related to Utility/fdformat.... Read more
- Published: Apr. 17, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2012-6117
Aeolus Configuration Server, as used in Red Hat CloudForms Cloud Engine before 1.1.2, uses world-readable permissions for /var/log/aeolus-configserver/configserver.log, which allows local users to read plaintext passwords by reading the log file.... Read more
- Published: Mar. 12, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2012-6119
Candlepin before 0.7.24, as used in Red Hat Subscription Asset Manager before 1.2.1, does not properly check manifest signatures, which allows local users to modify manifests.... Read more
- Published: Apr. 02, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2012-6108
HP Linux Imaging and Printing (HPLIP) before 3.13.2 uses world-writable permissions for /var/log/hp and /var/log/hp/tmp, which allows local users to delete log files via standard filesystem operations.... Read more
Affected Products : linux_imaging_and_printing_project- Published: Feb. 15, 2014
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2013-1853
Almanah Diary 0.9.0 and 0.10.0 does not encrypt the database when closed, which allows local users to obtain sensitive information by reading the database.... Read more
Affected Products : almanah- Published: Jan. 24, 2014
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2009-0676
The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt requ... Read more
Affected Products : linux_kernel- Published: Feb. 22, 2009
- Modified: Apr. 09, 2025
-
2.1
LOWCVE-2013-1940
X.Org X server before 1.13.4 and 1.4.x before 1.14.1 does not properly restrict access to input events when adding a new hot-plug device, which might allow physically proximate attackers to obtain sensitive information, as demonstrated by reading password... Read more
- Published: May. 13, 2013
- Modified: Apr. 11, 2025