Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
canonical ubuntu linux 13.04 vulnerabilities and exploits
(subscribe to this query)
409
VMScore
CVE-2013-1064
apt-xapian-index prior to 0.45ubuntu2.1, 0.44ubuntu7.1, and 0.44ubuntu5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1...
Canonical Apt-xapian-index 0.44ubuntu7.1
Canonical Apt-xapian-index 0.44ubuntu5.1
Canonical Apt-xapian-index
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 13.04
409
VMScore
CVE-2013-1066
language-selector 0.110.x prior to 0.110.1, 0.90.x prior to 0.90.1, and 0.79.x prior to 0.79.4 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject ra...
Ubuntu Developers Language-selector 0.79.1
Ubuntu Developers Language-selector 0.79.2
Ubuntu Developers Language-selector 0.79.3
Ubuntu Developers Language-selector 0.90
Ubuntu Developers Language-selector 0.110
Ubuntu Developers Language-selector 0.79
Canonical Ubuntu Linux 13.04
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 12.04
409
VMScore
CVE-2013-1061
dbus/SoftwarePropertiesDBus.py in Software Properties 0.92.17 prior to 0.92.17.3, 0.92.9 prior to 0.92.9.3, and 0.82.7 prior to 0.82.7.5 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by lever...
Marc Deslauriers Software-properties 0.92.9
Marc Deslauriers Software-properties 0.82.7.4
Marc Deslauriers Software-properties 0.92.17.2
Marc Deslauriers Software-properties 0.82.7.3
Marc Deslauriers Software-properties 0.82.7.2
Marc Deslauriers Software-properties 0.92.17.1
Marc Deslauriers Software-properties 0.92.17
Marc Deslauriers Software-properties 0.82.7.1
Marc Deslauriers Software-properties 0.82.7
Marc Deslauriers Software-properties 0.92.9.2
Marc Deslauriers Software-properties 0.92.9.1
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 13.04
Canonical Ubuntu Linux 12.04
614
VMScore
CVE-2013-4327
systemd does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-201...
Systemd Project Systemd
Debian Debian Linux 7.0
Canonical Ubuntu Linux 13.04
715
VMScore
CVE-2013-5745
The vino_server_client_data_pending function in vino-server.c in GNOME Vino 2.26.1, 2.32.1, 3.7.3, and previous versions, and 3.8 when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remo...
David King Vino 3.6.2
David King Vino
David King Vino 3.4.2
David King Vino 3.2.1
David King Vino 3.2.0
David King Vino 3.1.2
David King Vino 3.1.1
David King Vino 2.99.3
David King Vino 2.99.2
David King Vino 2.8.0
David King Vino 3.6.0
David King Vino 3.6.1
David King Vino 3.3.1
David King Vino 3.2.2
David King Vino 3.1.4
David King Vino 3.1.3
David King Vino 3.0.0
David King Vino 2.99.5
David King Vino 2.99.4
David King Vino 2.8.1
David King Vino 2.8.0.1
David King Vino 2.7.4.90
1 EDB exploit
383
VMScore
CVE-2013-4314
The X509Extension in pyOpenSSL prior to 0.13.1 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle malicious users to spoof arbitrary SSL servers via a crafted certifica...
Jean-paul Calderone Pyopenssl 0.11
Jean-paul Calderone Pyopenssl 0.10
Jean-paul Calderone Pyopenssl 0.9
Jean-paul Calderone Pyopenssl 0.8
Jean-paul Calderone Pyopenssl
Jean-paul Calderone Pyopenssl 0.12
Jean-paul Calderone Pyopenssl 0.7
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 13.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.10
614
VMScore
CVE-2013-1060
A certain Ubuntu build procedure for perf, as distributed in the Linux kernel packages in Ubuntu 10.04 LTS, 12.04 LTS, 12.10, 13.04, and 13.10, sets the HOME environment variable to the ~buildd directory and consequently reads the system configuration file from the ~buildd direct...
Canonical Ubuntu Linux 13.04
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 13.10
668
VMScore
CVE-2013-3567
Puppet 2.7.x prior to 2.7.22 and 3.2.x prior to 3.2.2, and Puppet Enterprise prior to 2.8.2, deserializes untrusted YAML, which allows remote malicious users to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
Puppetlabs Puppet 2.7.1
Puppet Puppet 2.7.10
Puppet Puppet 2.7.18
Puppetlabs Puppet 2.7.19
Puppetlabs Puppet 3.2.0
Puppet Puppet 2.7.13
Puppet Puppet 2.7.14
Puppetlabs Puppet 2.7.20
Puppet Puppet 2.7.21
Puppet Puppet 2.7.11
Puppet Puppet 2.7.12
Puppet Puppet 2.7.2
Puppet Puppet 3.2.1
Puppetlabs Puppet 2.7.0
Puppet Puppet 2.7.16
Puppet Puppet 2.7.17
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 13.04
Novell Suse Linux Enterprise Server 11.0
Novell Suse Linux Enterprise Desktop 11.0
Novell Suse Linux Enterprise Desktop 11
1 Article
392
VMScore
CVE-2013-2145
The cpansign verify functionality in the Module::Signature module prior to 0.72 for Perl allows malicious users to bypass the signature check and execute arbitrary code via a SIGNATURE file with a "special unknown cipher" that references an untrusted module in Digest/.
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 13.04
Canonical Ubuntu Linux 12.04
Opensuse Opensuse 11.4
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
Perlmonks Module\\ \\
445
VMScore
CVE-2013-2175
HAProxy 1.4 prior to 1.4.24 and 1.5 prior to 1.5-dev19, when configured to use hdr_ip or other "hdr_*" functions with a negative occurrence count, allows remote malicious users to cause a denial of service (negative array index usage and crash) via an HTTP header with a...
Debian Debian Linux 6.0
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 13.04
Redhat Enterprise Linux Load Balancer 6.4
Redhat Enterprise Linux Load Balancer 6.0
Haproxy Haproxy 1.4.6
Haproxy Haproxy 1.4.8
Haproxy Haproxy 1.4.15
Haproxy Haproxy 1.4.17
Haproxy Haproxy 1.4
Haproxy Haproxy 1.4.22
Haproxy Haproxy 1.4.9
Haproxy Haproxy 1.4.10
Haproxy Haproxy 1.4.11
Haproxy Haproxy 1.4.12
Haproxy Haproxy 1.4.13
Haproxy Haproxy 1.4.1
Haproxy Haproxy 1.4.2
Haproxy Haproxy 1.4.3
Haproxy Haproxy 1.4.4
Haproxy Haproxy 1.4.18
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »