Show filters
4,242 Total Results
Displaying 81-90 of 4,242
Sort by:
Attacker Value
Unknown
CVE-2022-28658
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
0
Attacker Value
Unknown
CVE-2022-28657
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
Apport does not disable python crash handler before entering chroot
0
Attacker Value
Unknown
CVE-2022-28656
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to consume RAM in the Apport process
0
Attacker Value
Unknown
CVE-2022-28655
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to create arbitrary tcp dbus connections
0
Attacker Value
Unknown
CVE-2022-28654
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to fill up apport.log
0
Attacker Value
Unknown
CVE-2022-28652
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
0
Attacker Value
Unknown
CVE-2022-1242
Disclosure Date: June 03, 2024 (last updated June 04, 2024)
Apport can be tricked into connecting to arbitrary sockets as the root user
0
Attacker Value
Unknown
CVE-2022-0555
Disclosure Date: June 03, 2024 (last updated June 04, 2024)
Subiquity Shows Guided Storage Passphrase in Plaintext with Read-all Permissions
0
Attacker Value
Unknown
CVE-2021-3899
Disclosure Date: June 03, 2024 (last updated June 04, 2024)
There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
0
Attacker Value
Unknown
CVE-2024-5138
Disclosure Date: May 31, 2024 (last updated June 01, 2024)
The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar.
0