Latest CVE Feed
-
2.1
LOWCVE-2010-3881
arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.... Read more
- Published: Dec. 23, 2010
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2008-4747
Unspecified vulnerability in the search feature in Sun Java System LDAP JDK before 4.20 allows context-dependent attackers to obtain sensitive information via unknown attack vectors related to the LDAP JDK library.... Read more
- Published: Oct. 27, 2008
- Modified: Apr. 09, 2025
-
2.1
LOWCVE-2015-2465
The Windows shell in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 does not properly constrain impersonation levels, which a... Read more
- Published: Aug. 15, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2015-5832
The iTunes Store component in Apple iOS before 9 does not properly delete AppleID credentials from the keychain upon a signout action, which might allow physically proximate attackers to obtain sensitive information via unspecified vectors.... Read more
Affected Products : iphone_os- Published: Sep. 18, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2015-3320
Lenovo USB Enhanced Performance Keyboard software before 2.0.2.2 includes active debugging code in SKHOOKS.DLL, which allows local users to obtain keypress information by accessing debug output.... Read more
Affected Products : usb_enhanced_performance_keyboard- Published: Apr. 16, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2015-5861
SpringBoard in Apple iOS before 9 allows physically proximate attackers to bypass a lock-screen preview-disabled setting, and reply to an audio message, via unspecified vectors.... Read more
Affected Products : iphone_os- Published: Sep. 18, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2006-0095
dm-crypt in Linux kernel 2.6.15 and earlier does not clear a structure before it is freed, which leads to a memory disclosure that could allow local users to obtain sensitive information about a cryptographic key.... Read more
- Published: Jan. 06, 2006
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2008-3272
The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to... Read more
- Published: Aug. 08, 2008
- Modified: Apr. 09, 2025
-
2.1
LOWCVE-2015-2529
The kernel in Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and Windows 10 allows local users to bypass the ASLR protection mechanism via a crafted application, aka "Kernel ASLR Bypass Vulnerability."... Read more
- Published: Sep. 09, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2015-5875
Cross-site scripting (XSS) vulnerability in Notes in Apple OS X before 10.11 allows local users to inject arbitrary web script or HTML via crafted text.... Read more
- Published: Oct. 09, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2015-0397
Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors related to File System, a different vulnerability than CVE-2014-6570 and CVE-2014-6600.... Read more
- Published: Jan. 21, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2014-1360
Lockdown in Apple iOS before 7.1.2 does not properly verify data from activation servers, which makes it easier for physically proximate attackers to bypass the Activation Lock protection mechanism via unspecified vectors.... Read more
Affected Products : iphone_os- Published: Jul. 01, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2006-0369
MySQL 5.0.18 allows local users with access to a VIEW to obtain sensitive information via the "SELECT * FROM information_schema.views;" query, which returns the query that created the VIEW. NOTE: this issue has been disputed by third parties, saying that... Read more
Affected Products : mysql- Published: Jan. 22, 2006
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2014-9568
puppetlabs-rabbitmq 3.0 through 4.1 stores the RabbitMQ Erlang cookie value in the facts of a node, which allows local users to obtain sensitive information as demonstrated by using Facter.... Read more
Affected Products : rabbitmq- Published: Feb. 03, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2015-1005
IniNet embeddedWebServer (aka eWebServer) before 2.02 for Windows CE uses cleartext for password storage, which allows context-dependent attackers to obtain sensitive information via unspecified vectors.... Read more
Affected Products : scada_web_server- Published: Oct. 25, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2013-0980
The Passcode Lock implementation in Apple iOS before 6.1.3 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement by leveraging an error in the emergency-call feature.... Read more
Affected Products : iphone_os- Published: Mar. 20, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2014-9417
The Meeting component in Huawei eSpace Desktop before V100R001C03 allows local users to cause a denial of service (program exit) via a crafted image.... Read more
Affected Products : espace_desktop- Published: Dec. 24, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2015-0378
Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors related to Libc.... Read more
Affected Products : solaris- Published: Jan. 21, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2011-3257
The Data Access component in Apple iOS before 5 does not properly handle the existence of multiple user accounts on the same mail server, which allows local users to bypass intended access restrictions in opportunistic circumstances by leveraging a differ... Read more
Affected Products : iphone_os- Published: Oct. 14, 2011
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2015-7238
The Secondary server in Threat Intelligence Exchange (TIE) before 1.2.0 uses weak permissions for unspecified (1) configuration files and (2) installation logs, which allows local users to obtain sensitive information by reading the files.... Read more
Affected Products : threat_intelligence_exchange- Published: Sep. 18, 2015
- Modified: Apr. 12, 2025