Low Severity Vulnerabilities
9.9K CVEs classified as low severity
9.9K CVEs classified as low severity
The DHTML Edit ActiveX control in Internet Explorer allows remote attackers to read arbitrary files.
Remote attackers can cause a system crash through ipintr() in ipq in OpenBSD.
Buffer overflow in OpenBSD ping.
OpenBSD crash using nlink value in FFS and EXT2FS filesystems.
Local attackers can conduct a denial of service in Midnight Commander 4.x with a symlink attack.
A race condition in how procmail handles .procmailrc files allows a local user to read arbitrary files available to the user who is running procmail.
The rsync command before rsync 2.3.1 may inadvertently change the permissions of the client's working directory to the permissions of the directory being transferred.
Internet Explorer 5.0 allows a remote server to read arbitrary files on the client's file system using the Microsoft Scriptlet Component.
Local users can perform a denial of service in Tripwire 1.2 and earlier using long filenames.
Buffer overflow in Linux autofs module through long directory names allows local users to perform a denial of service.
L0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information.
Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port.
Local users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS.
Solaris ff.core allows local users to modify files.
talkback in Netscape 4.5 allows a local user to overwrite arbitrary files of another user whose Netscape crashes.
64 bit Solaris 7 procfs allows local users to perform a denial of service.
A race condition in Linux 2.2.1 allows local users to read arbitrary memory from /proc files.
A race condition between the select() and accept() calls in NetBSD TCP servers allows remote attackers to cause a denial of service.
Debian GNU/Linux cfengine package is susceptible to a symlink attack.
The installer for BackOffice Server includes account names and passwords in a setup file (reboot.ini) which is not deleted.
Lynx allows a local user to overwrite sensitive files through /tmp symlinks.
NetBSD netstat command allows local users to access kernel memory.
SGI syserr program allows local users to corrupt files.
The open() function in FreeBSD allows local attackers to write to arbitrary files.