Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
canonical ubuntu linux 14.10 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2015-3407
Module::Signature prior to 0.74 allows remote malicious users to bypass signature verification for files via a signature file that does not list the files.
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 15.04
Module-signature Project Module-signature
10
CVSSv2
CVE-2015-3408
Module::Signature prior to 0.74 allows remote malicious users to execute arbitrary shell commands via a crafted SIGNATURE file which is not properly handled when generating checksums from a signed manifest.
Module-signature Project Module-signature
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 15.04
7.2
CVSSv2
CVE-2015-3409
Untrusted search path vulnerability in Module::Signature prior to 0.75 allows local users to gain privileges via a Trojan horse module under the current working directory, as demonstrated by a Trojan horse Text::Diff module.
Module-signature Project Module-signature
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 15.04
5
CVSSv2
CVE-2012-6656
iconvdata/ibm930.c in GNU C Library (aka glibc) prior to 2.16 allows context-dependent malicious users to cause a denial of service (out-of-bounds read) via a multibyte character value of "0xffff" to the iconv function when converting IBM930 encoded data to UTF-8.
Debian Debian Linux 7.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
Gnu Glibc
7.2
CVSSv2
CVE-2014-3689
The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.
Qemu Qemu
Debian Debian Linux 7.0
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
7.5
CVSSv2
CVE-2015-1205
Multiple unspecified vulnerabilities in Google Chrome prior to 40.0.2214.91 allow malicious users to cause a denial of service or possibly have other impact via unknown vectors.
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Google Chrome
Chromium Chromium
7.5
CVSSv2
CVE-2015-2238
Multiple unspecified vulnerabilities in Google V8 prior to 4.1.0.21, as used in Google Chrome prior to 41.0.2272.76, allow malicious users to cause a denial of service or possibly have other impact via unknown vectors.
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 14.10
Google Chrome
Google V8
7.5
CVSSv2
CVE-2015-3905
Buffer overflow in the set_cs_start function in t1disasm.c in t1utils prior to 1.39 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
T1utils Project T1utils 1.38
4.6
CVSSv2
CVE-2015-1572
Heap-based buffer overflow in closefs.c in the libext2fs library in e2fsprogs prior to 1.42.12 allows local users to execute arbitrary code by causing a crafted block group descriptor to be marked as dirty. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015...
E2fsprogs Project E2fsprogs
Debian Debian Linux 7.0
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
4.3
CVSSv2
CVE-2014-8602
iterator.c in NLnet Labs Unbound prior to 1.5.1 does not limit delegation chaining, which allows remote malicious users to cause a denial of service (memory and CPU consumption) via a large or infinite number of referrals.
Nlnetlabs Unbound
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 14.10
Debian Debian Linux 7.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21987
buffer overflow
CVE-2024-28890
CVE-2024-27574
CVE-2024-27347
CVE-2024-31450
privilege
SSTI
CVE-2024-31666
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »