Latest CVE Feed
-
2.1
LOWCVE-2012-4544
The PV domain builder in Xen 4.2 and earlier does not validate the size of the kernel or ramdisk (1) before or (2) after decompression, which allows local guest administrators to cause a denial of service (domain 0 memory consumption) via a crafted (a) ke... Read more
Affected Products : xen- Published: Oct. 31, 2012
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2012-6536
net/xfrm/xfrm_user.c in the Linux kernel before 3.6 does not verify that the actual Netlink message length is consistent with a certain header field, which allows local users to obtain sensitive information from kernel heap memory by leveraging the CAP_NE... Read more
Affected Products : linux_kernel- Published: Mar. 15, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2013-0162
The diff_pp function in lib/gauntlet_rubyparser.rb in the ruby_parser gem 3.1.1 and earlier for Ruby allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.... Read more
Affected Products : ruby_parser- Published: Mar. 01, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2012-4574
Pulp in Red Hat CloudForms before 1.1 uses world-readable permissions for pulp.conf, which allows local users to read the administrative password by reading this file.... Read more
- Published: Jan. 04, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2012-3866
lib/puppet/defaults.rb in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for last_run_report.yaml, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master serv... Read more
- Published: Aug. 06, 2012
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2012-3818
The fpm exporter in Revelation 0.4.13-2 and earlier encrypts the version number but not the password when exporting a file, which might allow local users to obtain sensitive information.... Read more
Affected Products : revelation- Published: Jun. 29, 2012
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2012-4571
Python Keyring 0.9.1 does not securely initialize the cipher when encrypting passwords for CryptedFileKeyring files, which makes it easier for local users to obtain passwords via a brute-force attack.... Read more
Affected Products : keyring- Published: Nov. 30, 2012
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2008-5690
The Kerberos credential renewal feature in Sun Solaris 8, 9, and 10, and OpenSolaris build snv_01 through snv_104, allows local users to cause a denial of service (authentication failure) via unspecified vectors related to incorrect cache file permissions... Read more
- Published: Dec. 19, 2008
- Modified: Apr. 09, 2025
-
2.1
LOWCVE-2012-4452
MySQL 5.0.88, and possibly other versions and platforms, allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with ... Read more
- Published: Oct. 09, 2012
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2012-5561
script/katello-generate-passphrase in Katello 1.1 uses world-readable permissions for /etc/katello/secure/passphrase, which allows local users to obtain the passphrase by reading the file.... Read more
- Published: Mar. 01, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2012-5605
Grinder in Red Hat CloudForms before 1.1 uses world-writable permissions for /var/lib/pulp/cache/grinder/, which allows local users to modify grinder cache files.... Read more
- Published: Jan. 04, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2013-6480
Libcloud 0.12.3 through 0.13.2 does not set the scrub_data parameter for the destroy DigitalOcean API, which allows local users to obtain sensitive information by leveraging a new VM.... Read more
Affected Products : libcloud- Published: Jan. 07, 2014
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2016-8305
Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Core). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0 and 12.2.0. Easily exploitable vulnera... Read more
Affected Products : flexcube_universal_banking- Published: Jan. 27, 2017
- Modified: Apr. 20, 2025
-
2.1
LOWCVE-2005-2960
cfengine 1.6.5 and 2.1.16 allows local users to overwrite arbitrary files via a symlink attack on temporary files used by vicf.in, a different vulnerability than CVE-2005-3137.... Read more
- Published: Oct. 05, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2005-3111
The handler code for backupninja 0.8 and earlier creates temporary files with predictable filenames, which allows local users to modify arbitrary files via a symlink attack.... Read more
Affected Products : backupninja- Published: Sep. 30, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2006-0555
The Linux Kernel before 2.6.15.5 allows local users to cause a denial of service (NFS client panic) via unknown attack vectors related to the use of O_DIRECT (direct I/O).... Read more
Affected Products : linux_kernel- Published: Mar. 07, 2006
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2001-1397
The System V (SYS5) shared memory implementation for Linux kernel before 2.2.19 could allow attackers to modify recently freed memory.... Read more
- Published: Apr. 17, 2001
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2006-2660
Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents ... Read more
Affected Products : php- Published: Jun. 13, 2006
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2001-0235
Vulnerability in crontab allows local users to read crontab files of other users by replacing the temporary file that is being edited while crontab is running.... Read more
Affected Products : debian_linux- Published: Mar. 26, 2001
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2005-2739
Keychain Access in Mac OS X 10.4.2 and earlier keeps a password visible even if a keychain times out while the password is being viewed, which could allow attackers with physical access to obtain the password.... Read more
- Published: Nov. 01, 2005
- Modified: Apr. 03, 2025