Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
canonical vulnerabilities and exploits
(subscribe to this query)
6.9
CVSSv2
CVE-2011-3628
Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules prior to 1.1.3-2ubuntu2.1 on Ubuntu 11.10, prior to 1.1.2-2ubuntu8.4 on Ubuntu 11.04, prior to 1.1.1-4ubuntu2.4 on Ubuntu 10.10, prior to 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and prior to 0.9...
Canonical Libpam-modules 1.1.2
Canonical Libpam-modules 0.9.7
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
Canonical Libpam-modules 1.1.1
Canonical Libpam-modules 1.1.3
Canonical Ubuntu Linux 11.10
NA
CVE-2023-1523
Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-te...
Canonical Snapd
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 22.04
Canonical Ubuntu Linux 22.10
Canonical Ubuntu Linux 23.04
6.4
CVSSv2
CVE-2011-3152
DistUpgrade/DistUpgradeFetcherCore.py in Update Manager prior to 1:0.87.31.1, 1:0.134.x prior to 1:0.134.11.1, 1:0.142.x prior to 1:0.142.23.1, 1:0.150.x prior to 1:0.150.5.1, and 1:0.152.x prior to 1:0.152.25.5 on Ubuntu 8.04 up to and including 11.10 does not verify the GPG sig...
Canonical Update-manager
Canonical Update-manager 1\\
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 10.10
1.9
CVSSv2
CVE-2011-3154
DistUpgrade/DistUpgradeViewKDE.py in Update Manager prior to 1:0.87.31.1, 1:0.134.x prior to 1:0.134.11.1, 1:0.142.x prior to 1:0.142.23.1, 1:0.150.x prior to 1:0.150.5.1, and 1:0.152.x prior to 1:0.152.25.5 does not properly create temporary files, which allows local users to ob...
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
Canonical Update-manager 1\\
Canonical Ubuntu Linux 11.10
Canonical Update-manager
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
NA
CVE-2022-3328
Race condition in snap-confine's must_mkdir_and_open_with_perms()
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 22.04
Canonical Ubuntu Linux 22.10
Canonical Snapd
1 Github repository
NA
CVE-2023-3297
In Ubuntu's accountsservice an unprivileged local attacker can trigger a use-after-free vulnerability in accountsservice by sending a D-Bus message to the accounts-daemon process.
Canonical Accountsservice
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 22.04
Canonical Ubuntu Linux 22.10
Canonical Ubuntu Linux 23.04
5
CVSSv2
CVE-2019-7303
A vulnerability in the seccomp filters of Canonical snapd before version 2.37.4 allows a strict mode snap to insert characters into a terminal on a 64-bit host. The seccomp rules were generated to match 64-bit ioctl(2) commands on a 64-bit platform; however, the Linux kernel only...
Canonical Snapd
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.10
1 EDB exploit
10
CVSSv2
CVE-2019-7304
Canonical snapd before version 2.37.1 incorrectly performed socket owner validation, allowing an malicious user to run arbitrary commands as root. This issue affects: Canonical snapd versions before 2.37.1.
Canonical Snapd
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
2 EDB exploits
8 Github repositories
1 Article
4.6
CVSSv2
CVE-2020-11933
cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass inten...
Canonical Snapd
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 20.04
NA
CVE-2023-1326
A privilege escalation attack was found in apport-cli 2.26.0 and previous versions which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a loca...
Canonical Apport
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 22.04
Canonical Ubuntu Linux 22.10
3 Github repositories
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
firmware
CVE-2006-4304
CVE-2024-32878
CVE-2024-31502
XSS
CVE-2024-3059
CVE-2024-33692
CVE-2024-3400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »