Latest CVE Feed
-
2.1
LOWCVE-2005-3137
The (1) cfmailfilter and (2) cfcron.in files for cfengine 1.6.5 allow local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CVE-2005-2960.... Read more
Affected Products : cfengine- Published: Oct. 05, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-1999-0105
finger allows recursive searches by using a long string of @ symbols.... Read more
Affected Products :- Published: Mar. 01, 1997
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2005-1841
The control for Adobe Reader 5.0.9 and 5.0.10 on Linux, Solaris, HP-UX, and AIX creates temporary files with the permissions as specified in a user's umask, which could allow local users to read PDF documents of that user if the umask allows it.... Read more
Affected Products : acrobat_reader- Published: Jul. 07, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2004-2607
A numeric casting discrepancy in sdla_xfer in Linux kernel 2.6.x up to 2.6.5 and 2.4 up to 2.4.29-rc1 allows local users to read portions of kernel memory via a large len argument, which is received as an int but cast to a short, which prevents a read loo... Read more
Affected Products : linux_kernel- Published: Dec. 31, 2004
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-1999-1572
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.... Read more
Affected Products : enterprise_linux debian_linux enterprise_linux_desktop freebsd ubuntu_linux mandrake_linux- Published: Jul. 16, 1996
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2005-2104
sysreport before 1.3.7 allows local users to obtain sensitive information via a symlink attack on a temporary directory.... Read more
Affected Products : sysreport- Published: Oct. 07, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2008-1943
Buffer overflow in the backend of XenSource Xen Para Virtualized Frame Buffer (PVFB) 3.0 through 3.1.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted description of a shared framebuffer.... Read more
- Published: May. 14, 2008
- Modified: Apr. 09, 2025
-
2.1
LOWCVE-2004-0394
A "potential" buffer overflow exists in the panic() function in Linux 2.4.x, although it may not be exploitable due to the functionality of panic.... Read more
Affected Products : linux_kernel- Published: Aug. 18, 2004
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2004-1983
The arch_get_unmapped_area function in mmap.c in the PaX patches for Linux kernel 2.6, when Address Space Layout Randomization (ASLR) is enabled, allows local users to cause a denial of service (infinite loop) via unknown attack vectors.... Read more
- Published: May. 02, 2004
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2004-1110
The mtink status monitor before 1.0.5 for Epson printers allows local users to overwrite arbitrary files via a symlink attack on the epson temporary file.... Read more
- Published: Jan. 10, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2005-3108
mm/ioremap.c in Linux 2.6 on 64-bit x86 systems allows local users to cause a denial of service or an information leak via an ioremap on a certain memory map that causes the iounmap to perform a lookup of a page that does not exist.... Read more
- Published: Sep. 30, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2013-0160
The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.... Read more
Affected Products : linux_kernel- Published: Feb. 18, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2004-0075
The Vicam USB driver in Linux before 2.4.25 does not use the copy_from_user function when copying data from userspace to kernel space, which crosses security boundaries and allows local users to cause a denial of service.... Read more
Affected Products : linux_kernel- Published: Mar. 15, 2004
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2009-4269
The password hash generation algorithm in the BUILTIN authentication functionality for Apache Derby before 10.6.1.0 performs a transformation that reduces the size of the set of inputs to SHA-1, which produces a small search space that makes it easier for... Read more
Affected Products : derby- Published: Aug. 16, 2010
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2004-1033
Fcron 2.0.1, 2.9.4, and possibly earlier versions leak file descriptors of open files, which allows local users to bypass access restrictions and read fcron.allow and fcron.deny via the EDITOR environment variable.... Read more
- Published: Mar. 01, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2014-2038
The nfs_can_extend_write function in fs/nfs/write.c in the Linux kernel before 3.13.3 relies on a write delegation to extend a write operation without a certain up-to-date verification, which allows local users to obtain sensitive information from kernel ... Read more
- Published: Feb. 28, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2012-3160
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows local users to affect confidentiality via unknown vectors related to Server Installation.... Read more
- Published: Oct. 16, 2012
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2013-5724
Phpbb3 before 3.0.11-4 for Debian GNU/Linux uses world-writable permissions for cache files, which allows local users to modify the file contents via standard filesystem write operations.... Read more
Affected Products : phpbb3- Published: Sep. 12, 2013
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2010-2928
The vCenter Tomcat Management Application in VMware vCenter Server 4.1 before Update 1 stores log-on credentials in a configuration file, which allows local users to gain privileges by reading this file.... Read more
Affected Products : vcenter_server- Published: Feb. 16, 2011
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2014-1279
Apple TV before 6.1 does not properly restrict logging, which allows local users to obtain sensitive information by reading log data.... Read more
- Published: Mar. 14, 2014
- Modified: Apr. 12, 2025