Latest CVE Feed
-
2.1
LOWCVE-2007-2617
srsexec in Sun Remote Services (SRS) Net Connect Software Proxy Core package in Sun Solaris 10 does not enforce file permissions when opening files, which allows local users to read the first line of arbitrary files via the -d and -v options.... Read more
- Published: May. 11, 2007
- Modified: Apr. 09, 2025
-
2.1
LOWCVE-2015-5742
VeeamVixProxy in Veeam Backup & Replication (B&R) before 8.0 update 3 stores local administrator credentials in log files with world-readable permissions, which allows local users to obtain sensitive information by reading the files.... Read more
- Published: Oct. 16, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2015-1108
The Lock Screen component in Apple iOS before 8.3 does not properly enforce the limit on incorrect passcode-authentication attempts, which makes it easier for physically proximate attackers to obtain access by making many passcode guesses.... Read more
Affected Products : iphone_os- Published: Apr. 10, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2006-5199
Adobe Contribute Publishing Server leaks the administrator password in logs that are created during product installation, which allows local users to gain privileges to the server.... Read more
Affected Products : contribute- Published: Oct. 10, 2006
- Modified: Apr. 09, 2025
-
2.1
LOWCVE-2014-1360
Lockdown in Apple iOS before 7.1.2 does not properly verify data from activation servers, which makes it easier for physically proximate attackers to bypass the Activation Lock protection mechanism via unspecified vectors.... Read more
Affected Products : iphone_os- Published: Jul. 01, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2015-2618
Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.3, 12.2.3, and 12.2.4 allows remote authenticated users to affect integrity via unknown vectors related to Input validation.... Read more
Affected Products : e-business_suite- Published: Jul. 16, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2015-1087
Directory traversal vulnerability in Backup in Apple iOS before 8.3 allows attackers to read arbitrary files via a crafted relative path.... Read more
Affected Products : iphone_os- Published: Apr. 10, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2007-3099
usr/mgmt_ipc.c in iscsid in open-iscsi (iscsi-initiator-utils) before 2.0-865 checks the client's UID on the listening AF_LOCAL socket instead of the new connection, which allows remote attackers to access the management interface and cause a denial of se... Read more
Affected Products : enterprise_linux- Published: Jun. 14, 2007
- Modified: Apr. 09, 2025
-
2.1
LOWCVE-2015-5448
HP Asset Manager 9.40 and 9.41 before 9.41.11103 P4-rev1 and 9.50 before 9.50.11925 P3 allows local users to obtain sensitive information via unspecified vectors.... Read more
Affected Products : asset_manager- Published: Oct. 26, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2015-2529
The kernel in Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and Windows 10 allows local users to bypass the ASLR protection mechanism via a crafted application, aka "Kernel ASLR Bypass Vulnerability."... Read more
- Published: Sep. 09, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2010-2955
The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw... Read more
- Published: Sep. 08, 2010
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2005-0342
The Finder in Mac OS X and earlier allows local users to overwrite arbitrary files and gain privileges by creating a hard link from the .DS_Store file to an arbitrary file.... Read more
- Published: May. 02, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2015-2574
Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect confidentiality via unknown vectors related to Text Utilities.... Read more
Affected Products : solaris- Published: Apr. 16, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2005-1265
The mmap function in the Linux Kernel 2.6.10 can be used to create memory maps with a start address beyond the end address, which allows local users to cause a denial of service (kernel crash).... Read more
- Published: Jun. 16, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2015-3010
ceph-deploy before 1.5.23 uses weak permissions (644) for ceph/ceph.client.admin.keyring, which allows local users to obtain sensitive information by reading the file.... Read more
Affected Products : ceph-deploy- Published: Jun. 16, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2003-0858
Zebra 0.93b and earlier, and quagga before 0.95, allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface.... Read more
- Published: Dec. 15, 2003
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2003-0854
ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd.... Read more
- Published: Nov. 17, 2003
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2009-0028
The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new... Read more
Affected Products : linux_kernel- Published: Feb. 27, 2009
- Modified: Apr. 09, 2025
-
2.1
LOWCVE-2007-0958
Linux kernel 2.6.x before 2.6.20 allows local users to read unreadable binaries by using the interpreter (PT_INTERP) functionality and triggering a core dump, a variant of CVE-2004-1073.... Read more
Affected Products : linux_kernel- Published: Feb. 15, 2007
- Modified: Apr. 09, 2025
-
2.1
LOWCVE-2004-0211
The kernel for Microsoft Windows Server 2003 does not reset certain values in CPU data structures, which allows local users to cause a denial of service (system crash) via a malicious program.... Read more
- Published: Nov. 03, 2004
- Modified: Apr. 03, 2025