Latest CVE Feed
-
2.1
LOWCVE-2014-1375
Intel Graphics Driver in Apple OS X before 10.9.4 allows local users to bypass the ASLR protection mechanism by leveraging read access to a kernel pointer in an IOKit object.... Read more
- Published: Jul. 01, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2010-3296
The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memor... Read more
- Published: Sep. 30, 2010
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2014-5398
Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 allows remote attackers to read arbitrary files or cause a denial of service via an XML external entity declaration in conjunction with an entity reference, related to an XM... Read more
Affected Products : wonderware_information_server- Published: Aug. 28, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2005-3108
mm/ioremap.c in Linux 2.6 on 64-bit x86 systems allows local users to cause a denial of service or an information leak via an ioremap on a certain memory map that causes the iounmap to perform a lookup of a page that does not exist.... Read more
- Published: Sep. 30, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2014-1425
cmanager 0.32 does not properly enforce nesting when modifying cgroup properties, which allows local users to set cgroup values for all cgroups via unspecified vectors.... Read more
- Published: Jan. 07, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2010-4529
Integer underflow in the irda_getsockopt function in net/irda/af_irda.c in the Linux kernel before 2.6.37 on platforms other than x86 allows local users to obtain potentially sensitive information from kernel heap memory via an IRLMP_ENUMDEVICES getsockop... Read more
Affected Products : linux_kernel- Published: Jan. 13, 2011
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2005-0736
Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.... Read more
- Published: Mar. 09, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2014-4455
dyld in Apple iOS before 8.1.1 and Apple TV before 7.0.2 does not properly handle overlapping segments in Mach-O executable files, which allows local users to bypass intended code-signing restrictions via a crafted file.... Read more
- Published: Nov. 18, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2015-4920
Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect integrity via vectors related to NDMP Backup Service.... Read more
Affected Products : solaris- Published: Jan. 21, 2016
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2006-3813
A regression error in the Perl package for Red Hat Enterprise Linux 4 omits the patch for CVE-2005-0155, which allows local users to overwrite arbitrary files with debugging information.... Read more
Affected Products : enterprise_linux- Published: Aug. 11, 2006
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2005-3109
The HFS and HFS+ (hfsplus) modules in Linux 2.6 allow attackers to cause a denial of service (oops) by using hfsplus to mount a filesystem that is not hfsplus.... Read more
- Published: Sep. 30, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2014-4303
Multiple cross-site scripting (XSS) vulnerabilities in the Touch theme 7.x-1.x before 7.x-1.9 for Drupal allow remote authenticated users with the Administer themes permission to inject arbitrary web script or HTML via vectors related to the (1) Twitter a... Read more
Affected Products : touch- Published: Jun. 18, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2014-4431
Dock in Apple OS X before 10.10 does not properly manage the screen-lock state, which allows physically proximate attackers to view windows by leveraging an unattended workstation.... Read more
- Published: Oct. 18, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2014-4463
Apple iOS before 8.1.1 allows physically proximate attackers to bypass the lock-screen protection mechanism, and view or transmit a Photo Library photo, via the FaceTime "Leave a Message" feature.... Read more
Affected Products : iphone_os- Published: Nov. 18, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2014-3645
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.... Read more
Affected Products : linux_kernel- Published: Nov. 10, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2009-0601
Format string vulnerability in Wireshark 0.99.8 through 1.0.5 on non-Windows platforms allows local users to cause a denial of service (application crash) via format string specifiers in the HOME environment variable.... Read more
- Published: Feb. 16, 2009
- Modified: Apr. 09, 2025
-
2.1
LOWCVE-2013-5173
The random-number generator in the kernel in Apple Mac OS X before 10.9 provides lengthy exclusive access for processing of large requests, which allows local users to cause a denial of service (temporary generator outage) via an application that requires... Read more
- Published: Oct. 24, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2014-4818
dsmtca in the client in IBM Tivoli Storage Manager (TSM) 5.4.x, 5.5.x, 6.x before 6.4.3, and 7.1.x before 7.1.2 allows local users to discover the backup/restore encryption-key password via unspecified vectors.... Read more
Affected Products : tivoli_storage_manager- Published: Feb. 24, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2013-1030
mdmclient in Mobile Device Management in Apple Mac OS X before 10.8.5 places a password on the command line, which allows local users to obtain sensitive information by listing the process.... Read more
Affected Products : mac_os_x- Published: Sep. 16, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2010-0223
Kingston DataTraveler BlackBox (DTBB), DataTraveler Secure Privacy Edition (DTSP), and DataTraveler Elite Privacy Edition (DTEP) USB flash drives do not prevent password replay attacks, which allows physically proximate attackers to access the cleartext d... Read more
- Published: Jan. 07, 2010
- Modified: Apr. 09, 2025