Latest CVE Feed
-
2.1
LOWCVE-2004-0394
A "potential" buffer overflow exists in the panic() function in Linux 2.4.x, although it may not be exploitable due to the functionality of panic.... Read more
Affected Products : linux_kernel- Published: Aug. 18, 2004
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2004-1033
Fcron 2.0.1, 2.9.4, and possibly earlier versions leak file descriptors of open files, which allows local users to bypass access restrictions and read fcron.allow and fcron.deny via the EDITOR environment variable.... Read more
- Published: Mar. 01, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2015-4920
Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect integrity via vectors related to NDMP Backup Service.... Read more
Affected Products : solaris- Published: Jan. 21, 2016
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2004-1983
The arch_get_unmapped_area function in mmap.c in the PaX patches for Linux kernel 2.6, when Address Space Layout Randomization (ASLR) is enabled, allows local users to cause a denial of service (infinite loop) via unknown attack vectors.... Read more
- Published: May. 02, 2004
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2011-2203
The hfs_find_init function in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and Oops) by mounting an HFS file system with a malformed MDB extent record.... Read more
Affected Products : linux_kernel- Published: Jan. 27, 2012
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2014-4805
IBM DB2 10.5 before FP4 on Linux and AIX creates temporary files during CDE table LOAD operations, which allows local users to obtain sensitive information by reading a file while a LOAD is occurring.... Read more
- Published: Sep. 04, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2014-4757
The Outlook Extension in IBM Content Collector 4.0.0.x before 4.0.0.0-ICC-OE-IF004 allows local users to bypass the intended Reviewer privilege requirement and read e-mail messages from an arbitrary mailbox by invoking the Search function.... Read more
Affected Products : content_collector- Published: Aug. 12, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2014-4776
IBM License Metric Tool 9 before 9.1.0.2 does not have an off autocomplete attribute for authentication fields, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation.... Read more
Affected Products : license_metric_tool- Published: May. 20, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2004-1110
The mtink status monitor before 1.0.5 for Epson printers allows local users to overwrite arbitrary files via a symlink attack on the epson temporary file.... Read more
- Published: Jan. 10, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2014-5447
Zarafa WebAccess 7.1.10 and WebApp 1.6 beta uses weak permissions (644) for config.php, which allows local users to obtain sensitive information by reading the PHP session files. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0... Read more
- Published: Oct. 20, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2002-1319
The Linux kernel 2.4.20 and earlier, and 2.5.x, when running on x86 systems, allows local users to cause a denial of service (hang) via the emulation mode, which does not properly clear TF and NT EFLAGs.... Read more
- Published: Dec. 11, 2002
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2014-2343
Triangle MicroWorks SCADA Data Gateway before 3.00.0635 allows physically proximate attackers to cause a denial of service (excessive data processing) via a crafted DNP request over a serial line.... Read more
Affected Products : scada_data_gateway- Published: May. 30, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2007-6595
ClamAV 0.92 allows local users to overwrite arbitrary files via a symlink attack on (1) temporary files used by the cli_gentempfd function in libclamav/others.c or on (2) .ascii files used by sigtool, when utf16-decode is enabled.... Read more
- Published: Dec. 31, 2007
- Modified: Apr. 09, 2025
-
2.1
LOWCVE-2014-6110
IBM Security Identity Manager 6.x before 6.0.0.3 IF14 does not properly perform logout actions, which allows remote attackers to access sessions by leveraging an unattended workstation.... Read more
Affected Products : security_identity_manager- Published: Nov. 18, 2014
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2006-3813
A regression error in the Perl package for Red Hat Enterprise Linux 4 omits the patch for CVE-2005-0155, which allows local users to overwrite arbitrary files with debugging information.... Read more
Affected Products : enterprise_linux- Published: Aug. 11, 2006
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2005-2520
The password assistant in Mac OS X 10.4 to 10.4.2, when used to create multiple accounts from the same process, does not reset the suggested password list when the assistant is displayed, which allows attackers to view recently used passwords.... Read more
Affected Products : mac_os_x- Published: Aug. 19, 2005
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2006-3499
The dynamic linker (dyld) in Apple Mac OS X 10.3.9 allows local users to obtain sensitive information via unspecified dynamic linker options that affect the use of standard error (stderr) by privileged applications.... Read more
- Published: Aug. 03, 2006
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2014-4818
dsmtca in the client in IBM Tivoli Storage Manager (TSM) 5.4.x, 5.5.x, 6.x before 6.4.3, and 7.1.x before 7.1.2 allows local users to discover the backup/restore encryption-key password via unspecified vectors.... Read more
Affected Products : tivoli_storage_manager- Published: Feb. 24, 2015
- Modified: Apr. 12, 2025
-
2.1
LOWCVE-2012-3430
The rds_recvmsg function in net/rds/recv.c in the Linux kernel before 3.0.44 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) recvfrom or (2) recvmsg sy... Read more
Affected Products : linux_kernel- Published: Oct. 03, 2012
- Modified: Apr. 11, 2025
-
2.1
LOWCVE-2005-0736
Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.... Read more
- Published: Mar. 09, 2005
- Modified: Apr. 03, 2025