Show filters
4,171 Total Results
Displaying 81-90 of 4,171
Sort by:
Attacker Value
Unknown

CVE-2022-28655

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to create arbitrary tcp dbus connections
Attacker Value
Unknown

CVE-2022-28654

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to fill up apport.log
Attacker Value
Unknown

CVE-2022-28652

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
Attacker Value
Unknown

CVE-2022-1242

Disclosure Date: June 03, 2024 (last updated June 04, 2024)
Apport can be tricked into connecting to arbitrary sockets as the root user
0
Attacker Value
Unknown

CVE-2022-0555

Disclosure Date: June 03, 2024 (last updated June 04, 2024)
Subiquity Shows Guided Storage Passphrase in Plaintext with Read-all Permissions
0
Attacker Value
Unknown

CVE-2021-3899

Disclosure Date: June 03, 2024 (last updated June 04, 2024)
There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
0
Attacker Value
Unknown

CVE-2024-5138

Disclosure Date: May 31, 2024 (last updated June 01, 2024)
The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar.
0
Attacker Value
Unknown

CVE-2024-3250

Disclosure Date: April 04, 2024 (last updated November 07, 2024)
It was discovered that Canonical's Pebble service manager read-file API and the associated pebble pull command, before v1.10.2, allowed unprivileged local users to read files with root-equivalent permissions when Pebble was running as root. Fixes are also available as backports to v1.1.1, v1.4.2, and v1.7.4.
0
Attacker Value
Unknown

CVE-2023-49721

Disclosure Date: February 14, 2024 (last updated February 15, 2024)
An insecure default to allow UEFI Shell in EDK2 was left enabled in LXD. This allows an OS-resident attacker to bypass Secure Boot.
0
Attacker Value
Unknown

CVE-2023-48733

Disclosure Date: February 14, 2024 (last updated February 15, 2024)
An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot.
0