Latest CVE Feed
-
2.1
LOWCVE-2000-0080
AIX techlibss allows local users to overwrite files via a symlink attack.... Read more
Affected Products : aix- Published: Jan. 10, 2000
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2002-1193
tkmail before 4.0beta9-8.1 allows local users to create or overwrite files as users via a symlink attack on temporary files.... Read more
Affected Products : tkmail- Published: Oct. 28, 2002
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2014-3123
Cross-site scripting (XSS) vulnerability in admin/manage-images.php in the NextCellent Gallery plugin before 1.19.18 for WordPress allows remote authenticated users with the NextGEN Upload images, NextGEN Manage gallery, or NextGEN Manage others gallery p... Read more
Affected Products : nextcellent_gallery- Published: May. 08, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2000-0829
The tmpwatch utility in Red Hat Linux forks a new process for each directory level, which allows local users to cause a denial of service by creating deeply nested directories in /tmp or /var/tmp/.... Read more
- Published: Nov. 14, 2000
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2000-0605
Blackboard CourseInfo 4.0 stores the local and SQL administrator user names and passwords in cleartext in a registry key whose access control allows users to access the passwords.... Read more
Affected Products : courseinfo- Published: Jul. 10, 2000
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2000-0873
netstat in AIX 4.x.x does not properly restrict access to the -Zi option, which allows local users to clear network interface statistics and possibly hide evidence of unusual network activities.... Read more
Affected Products : aix- Published: Nov. 14, 2000
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2000-0485
Microsoft SQL Server allows local users to obtain database passwords via the Data Transformation Service (DTS) package Properties dialog, aka the "DTS Password" vulnerability.... Read more
Affected Products : sql_server- Published: May. 30, 2000
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-1999-1294
Office Shortcut Bar (OSB) in Windows 3.51 enables backup and restore permissions, which are inherited by programs such as File Manager that are started from the Shortcut Bar, which could allow local users to read folders for which they do not have permiss... Read more
Affected Products : windows_nt- Published: Dec. 31, 1999
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2000-0311
The Windows 2000 domain controller allows a malicious user to modify Active Directory information by modifying an unprotected attribute, aka the "Mixed Object Access" vulnerability.... Read more
Affected Products : windows_2000- Published: Apr. 20, 2000
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2000-0276
BeOS 4.5 and 5.0 allow local users to cause a denial of service via malformed direct system calls using interrupt 37.... Read more
Affected Products : beos- Published: Apr. 10, 2000
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2003-0794
GDM 2.4.4.x before 2.4.4.4, and 2.4.1.x before 2.4.1.7, does not limit the number or duration of commands and uses a blocking socket connection, which allows attackers to cause a denial of service (resource exhaustion) by sending commands and not reading ... Read more
Affected Products : gdm- Published: Nov. 17, 2003
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2003-0643
Integer signedness error in the Linux Socket Filter implementation (filter.c) in Linux 2.4.3-pre3 to 2.4.22-pre10 allows attackers to cause a denial of service (crash).... Read more
Affected Products : linux_kernel- Published: Jul. 25, 2003
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2000-1143
Recourse ManTrap 1.6 hides the first 4 processes that run on a Solaris system, which allows attackers to determine that they are in a honeypot system.... Read more
Affected Products : mantrap- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2003-1122
ScriptLogic 4.01, and possibly other versions before 4.14, uses insecure permissions for the LOGS$ share, which allows users to modify log records and possibly execute arbitrary code.... Read more
Affected Products : scriptlogic- Published: Dec. 31, 2003
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2001-0642
Directory traversal vulnerability in IncrediMail version 1400185 and earlier allows local users to overwrite files on the local hard drive by appending .. (dot dot) sequences to filenames listed in the content.ini file.... Read more
Affected Products : incredimail- Published: Sep. 20, 2001
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2000-0455
Buffer overflow in xlockmore xlock program version 4.16 and earlier allows local users to read sensitive data from memory via a long -mode option.... Read more
Affected Products : xlock- Published: May. 29, 2000
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-1999-1430
PIM software for Royal daVinci does not properly password-protext access to data stored in the .mdb (Microsoft Access) file, which allows local users to read the data without a password by directly accessing the files with a different application, such as... Read more
Affected Products : davinci- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2000-0368
Classic Cisco IOS 9.1 and later allows attackers with access to the login prompt to obtain portions of the command history of previous users, which may allow the attacker to access sensitive data.... Read more
Affected Products : ios- Published: Mar. 12, 2001
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-1999-1348
Linuxconf on Red Hat Linux 6.0 and earlier does not properly disable PAM-based access to the shutdown command, which could allow local users to cause a denial of service.... Read more
Affected Products : linux- Published: Jun. 30, 1999
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2000-0715
DiskCheck script diskcheck.pl in Red Hat Linux 6.2 allows local users to create or overwrite arbitrary files via a symlink attack on a temporary file.... Read more
- Published: Oct. 20, 2000
- Modified: Apr. 03, 2025