Latest CVE Feed
-
1.9
LOWCVE-2014-0058
The security audit functionality in Red Hat JBoss Enterprise Application Platform (EAP) 6.x before 6.2.1 logs request parameters in plaintext, which might allow local users to obtain passwords by reading the log files.... Read more
Affected Products : jboss_enterprise_application_platform- Published: Feb. 26, 2014
- Modified: Apr. 12, 2025
-
1.9
LOWCVE-2014-0018
Red Hat JBoss Enterprise Application Platform (JBEAP) 6.2.0 and JBoss WildFly Application Server, when run under a security manager, do not properly restrict access to the Modular Service Container (MSC) service registry, which allows local users to modif... Read more
- Published: Feb. 14, 2014
- Modified: Apr. 11, 2025
-
1.9
LOWCVE-2013-5169
CoreGraphics in Apple Mac OS X before 10.9, when display-sleep mode is used, does not ensure that screen locking blocks the visibility of all windows, which allows physically proximate attackers to obtain sensitive information by reading the screen.... Read more
- Published: Oct. 24, 2013
- Modified: Apr. 11, 2025
-
1.9
LOWCVE-2014-0974
The boot_linux_from_mmc function in app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly validate a certain address value,... Read more
Affected Products : little_kernel_bootloader- Published: Aug. 25, 2014
- Modified: Apr. 12, 2025
-
1.9
LOWCVE-2014-1515
Mozilla Firefox before 28.0.1 on Android processes a file: URL by copying a local file onto the SD card, which allows attackers to obtain sensitive information from the Firefox profile directory via a crafted application.... Read more
- Published: Mar. 25, 2014
- Modified: Apr. 12, 2025
-
1.9
LOWCVE-2015-0430
Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect confidentiality via vectors related to RPC Utility.... Read more
- Published: Jan. 21, 2015
- Modified: Apr. 12, 2025
-
1.9
LOWCVE-2009-3746
XScreenSaver in Sun Solaris 10, when the accessibility feature is enabled, allows physically proximate attackers to obtain sensitive information by reading popup windows, which are displayed even when the screen is locked, a different vulnerability than C... Read more
Affected Products : solaris- Published: Oct. 22, 2009
- Modified: Apr. 09, 2025
-
1.9
LOWCVE-2010-1160
GNU nano before 2.2.4 does not verify whether a file has been changed before it is overwritten in a file-save operation, which allows local user-assisted attackers to overwrite arbitrary files via a symlink attack on an attacker-owned file that is being e... Read more
Affected Products : nano- Published: Apr. 16, 2010
- Modified: Apr. 11, 2025
-
1.9
LOWCVE-2010-1775
Race condition in Passcode Lock in Apple iOS before 4 on the iPhone and iPod touch allows physically proximate attackers to bypass intended passcode requirements, and pair a locked device with a computer and access arbitrary data, via vectors involving th... Read more
- Published: Jun. 22, 2010
- Modified: Apr. 11, 2025
-
1.9
LOWCVE-2015-1420
Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a fil... Read more
- Published: Mar. 16, 2015
- Modified: Apr. 12, 2025
-
1.9
LOWCVE-2015-2830
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) ... Read more
- Published: May. 27, 2015
- Modified: Apr. 12, 2025
-
1.9
LOWCVE-2014-5030
CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.... Read more
- Published: Jul. 29, 2014
- Modified: Apr. 12, 2025
-
1.9
LOWCVE-2007-2580
Unspecified vulnerability in Apple Safari allows local users to obtain sensitive information (saved keychain passwords) via the document.loginform.password.value JavaScript parameter loaded from an AppleScript script.... Read more
Affected Products : safari- Published: May. 09, 2007
- Modified: Apr. 09, 2025
-
1.9
LOWCVE-2014-9415
Huawei eSpace Desktop before V100R001C03 allows local users to cause a denial of service (program exit) via a crafted QES file.... Read more
Affected Products : espace_desktop- Published: Dec. 24, 2014
- Modified: Apr. 12, 2025
-
1.9
LOWCVE-2012-6140
pam_google_authenticator.c in the PAM module in Google Authenticator before 1.0 requires user-readable permissions for the secret file, which allows local users to bypass intended access restrictions and discover a shared secret via standard filesystem op... Read more
Affected Products : authenticator- Published: Apr. 24, 2013
- Modified: Apr. 11, 2025
-
1.9
LOWCVE-2014-6146
IBM Sterling B2B Integrator 5.2.x through 5.2.4, when the Connect:Direct Server Adapter is configured, does not properly process the logging configuration, which allows local users to obtain sensitive information by reading log files.... Read more
Affected Products : sterling_b2b_integrator- Published: Nov. 08, 2014
- Modified: Apr. 12, 2025
-
1.9
LOWCVE-2012-3116
Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 5.5.06, 6.0, 6.1, and 6.2 allows local users to affect confidentiality via unknown vectors.... Read more
Affected Products : supply_chain_products_suite- Published: Jul. 17, 2012
- Modified: Apr. 11, 2025
-
1.9
LOWCVE-2010-2027
Mathematica 7, when running on Linux, allows local users to overwrite arbitrary files via a symlink attack on (1) files within /tmp/MathLink/ or (2) /tmp/fonts$$.conf.... Read more
- Published: May. 24, 2010
- Modified: Apr. 11, 2025
-
1.9
LOWCVE-2014-8923
The (1) IBM Tivoli Identity Manager Active Directory adapter before 5.1.24 and (2) IBM Security Identity Manager Active Directory adapter before 6.0.14 for IBM Security Identity Manager on Windows, when certain log and trace levels are configured, store t... Read more
- Published: Mar. 25, 2015
- Modified: Apr. 12, 2025
-
1.9
LOWCVE-2011-1074
crontab.c in crontab in FreeBSD allows local users to determine the existence of arbitrary directories via a command-line argument composed of a directory name concatenated with a directory traversal sequence that leads to the /etc/crontab pathname.... Read more
Affected Products : freebsd- Published: Mar. 04, 2011
- Modified: Apr. 11, 2025