Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
canonical ubuntu linux 14.04 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2020-15862
Net-SNMP up to and including 5.8 has Improper Privilege Management because SNMP WRITE access to the EXTEND MIB provides the ability to run arbitrary commands as root.
Net-snmp Net-snmp
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 18.04
Netapp Cloud Backup -
Netapp Smi-s Provider -
Netapp Solidfire -
Netapp Hci Management Node -
7.8
CVSSv3
CVE-2020-14356
A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions prior to 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.
Linux Linux Kernel
Redhat Enterprise Linux 8.0
Opensuse Leap 15.1
Opensuse Leap 15.2
Debian Debian Linux 9.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Netapp Cloud Backup -
Netapp Solidfire -
Netapp Hci Management Node -
Netapp Active Iq Unified Manager -
Netapp Solidfire Baseboard Management Controller Firmware -
7.1
CVSSv3
CVE-2020-24394
In the Linux kernel prior to 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.
Linux Linux Kernel
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Opensuse Leap 15.1
Oracle Sd-wan Edge 8.2
Starwindsoftware Starwind Virtual San V8
5.5
CVSSv3
CVE-2020-1472
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted...
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2019 -
Microsoft Windows Server 2016 1903
Microsoft Windows Server 2016 1909
Microsoft Windows Server 2016 2004
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Leap 15.1
Opensuse Leap 15.2
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 20.04
Synology Directory Server
Samba Samba
Debian Debian Linux 9.0
Oracle Zfs Storage Appliance Kit 8.8
157 Github repositories
16 Articles
7.5
CVSSv3
CVE-2020-12100
In Dovecot prior to 2.3.11.3, uncontrolled recursion in submission, lmtp, and lda allows remote malicious users to cause a denial of service (resource consumption) via a crafted e-mail message with deeply nested MIME parts.
Dovecot Dovecot
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
7.5
CVSSv3
CVE-2020-12673
In Dovecot prior to 2.3.11.3, sending a specially formatted NTLM request will crash the auth service because of an out-of-bounds read.
Dovecot Dovecot
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 20.04
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
7.5
CVSSv3
CVE-2020-12674
In Dovecot prior to 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled.
Dovecot Dovecot
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 20.04
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
5.5
CVSSv3
CVE-2020-15701
An unhandled exception in check_ignored() in apport/report.py can be exploited by a local malicious user to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubu...
Canonical Apport 2.20.11-0ubuntu8
Canonical Apport 2.20.11-0ubuntu9
Canonical Apport 2.20.11-0ubuntu10
Canonical Apport 2.20.11-0ubuntu11
Canonical Apport 2.20.11-0ubuntu12
Canonical Apport 2.20.11-0ubuntu13
Canonical Apport 2.20.11-0ubuntu14
Canonical Apport 2.20.11-0ubuntu15
Canonical Apport 2.20.11-0ubuntu16
Canonical Apport 2.20.11-0ubuntu17
Canonical Apport 2.20.11-0ubuntu18
Canonical Apport 2.20.11-0ubuntu19
Canonical Apport 2.20.11-0ubuntu20
Canonical Apport 2.20.11-0ubuntu21
Canonical Apport 2.20.11-0ubuntu22
Canonical Apport 2.20.11-0ubuntu23
Canonical Apport 2.20.11-0ubuntu24
Canonical Apport 2.20.11-0ubuntu25
Canonical Apport 2.20.11-0ubuntu26
Canonical Apport 2.20.11-0ubuntu27
Canonical Apport 2.20.11-0ubuntu27.2
Canonical Apport 2.20.11-0ubuntu27.3
7
CVSSv3
CVE-2020-15702
TOCTOU Race Condition vulnerability in apport allows a local malicious user to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be us...
Canonical Apport 2.20.11-0ubuntu8
Canonical Apport 2.20.11-0ubuntu9
Canonical Apport 2.20.11-0ubuntu10
Canonical Apport 2.20.11-0ubuntu11
Canonical Apport 2.20.11-0ubuntu12
Canonical Apport 2.20.11-0ubuntu13
Canonical Apport 2.20.11-0ubuntu14
Canonical Apport 2.20.11-0ubuntu15
Canonical Apport 2.20.11-0ubuntu16
Canonical Apport 2.20.11-0ubuntu17
Canonical Apport 2.20.11-0ubuntu18
Canonical Apport 2.20.11-0ubuntu19
Canonical Apport 2.20.11-0ubuntu20
Canonical Apport 2.20.11-0ubuntu21
Canonical Apport 2.20.11-0ubuntu22
Canonical Apport 2.20.11-0ubuntu23
Canonical Apport 2.20.11-0ubuntu24
Canonical Apport 2.20.11-0ubuntu25
Canonical Apport 2.20.11-0ubuntu26
Canonical Apport 2.20.11-0ubuntu27
Canonical Apport 2.20.11-0ubuntu27.2
Canonical Apport 2.20.11-0ubuntu27.3
6.7
CVSSv3
CVE-2020-14344
An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No ...
X.org Libx11
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 12.04
Opensuse Leap 15.1
Opensuse Leap 15.2
1 Github repository
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-24955
man-in-the-middle
dos
CVE-2024-2818
CVE-2024-30584
CVE-2024-31134
camera
CVE-2023-45866
CVE-2024-30585
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »