Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
canonical ubuntu linux 10.04 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME prior to 1.5.1 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different...
Gnu Gpgme
Debian Debian Linux 6.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
NA
CVE-2014-5029
The web interface in CUPS 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/ and language[0] set to null. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3537.
Apple Cups 1.7.4
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
NA
CVE-2014-5030
CUPS prior to 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
Apple Cups 1.7.0
Apple Cups 1.7.1
Apple Cups 1.7
Apple Cups 1.7.2
Apple Cups
Apple Cups 1.7.3
NA
CVE-2014-5031
The web interface in CUPS prior to 2.0 does not check that files have world-readable permissions, which allows remote malicious users to obtains sensitive information via unspecified vectors.
Apple Cups 1.7.0
Apple Cups 1.7.1
Apple Cups 1.7
Apple Cups 1.7.2
Apple Cups
Apple Cups 1.7.3
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
NA
CVE-2012-6648
gdm/guest-session-cleanup.sh in gdm-guest-session 0.24 and previous versions, as used in Ubuntu Linux 10.04 LTS, 10.10, and 11.04, allows local users to delete arbitrary files via a space in the name of a file in /tmp. NOTE: this identifier was SPLIT from CVE-2012-0943 per ADT1/A...
Gdm-guest-session Project Gdm-guest-session 0.23
Canonical Ubuntu Linux 10.10
Gdm-guest-session Project Gdm-guest-session 0.21
Gdm-guest-session Project Gdm-guest-session 0.20
Canonical Ubuntu Linux 11.04
Gdm-guest-session Project Gdm-guest-session
Gdm-guest-session Project Gdm-guest-session 0.22
Canonical Ubuntu Linux 10.04
NA
CVE-2014-3730
The django.util.http.is_safe_url function in Django 1.4 prior to 1.4.13, 1.5 prior to 1.5.8, 1.6 prior to 1.6.5, and 1.7 prior to 1.7b4 does not properly validate URLs, which allows remote malicious users to conduct open redirect attacks via a malformed URL, as demonstrated by &q...
Canonical Ubuntu Linux 13.10
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Djangoproject Django 1.4.12
Djangoproject Django 1.4.9
Djangoproject Django 1.4.10
Djangoproject Django 1.4.6
Djangoproject Django 1.4.4
Djangoproject Django 1.4.5
Djangoproject Django 1.4.2
Djangoproject Django 1.4.11
Djangoproject Django 1.4.7
Djangoproject Django 1.4.8
Djangoproject Django 1.4
Djangoproject Django 1.4.1
Djangoproject Django 1.7
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
Djangoproject Django 1.6
Djangoproject Django 1.6.3
1 Github repository
NA
CVE-2014-1418
Django 1.4 prior to 1.4.13, 1.5 prior to 1.5.8, 1.6 prior to 1.6.5, and 1.7 prior to 1.7b4 does not properly include the (1) Vary: Cookie or (2) Cache-Control header in responses, which allows remote malicious users to obtain sensitive information or poison the cache via a reques...
Djangoproject Django 1.7
Djangoproject Django 1.4.12
Djangoproject Django 1.4.9
Djangoproject Django 1.4.10
Djangoproject Django 1.4.6
Djangoproject Django 1.4.4
Djangoproject Django 1.4.5
Djangoproject Django 1.4.2
Djangoproject Django 1.4.11
Djangoproject Django 1.4.7
Djangoproject Django 1.4.8
Djangoproject Django 1.4
Djangoproject Django 1.4.1
Djangoproject Django 1.5
Djangoproject Django 1.5.7
Djangoproject Django 1.5.1
Djangoproject Django 1.5.3
Djangoproject Django 1.5.4
Djangoproject Django 1.5.5
Djangoproject Django 1.5.2
Djangoproject Django 1.5.6
Canonical Ubuntu Linux 13.10
NA
CVE-2011-4407
ppa.py in Software Properties prior to 0.81.13.3 does not validate the server certificate when downloading PPA GPG key fingerprints, which allows man-in-the-middle (MITM) malicious users to spoof GPG keys for a package repository.
Canonical Ubuntu Linux 10.10
Canonical Software-properties
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 10.04
NA
CVE-2013-4544
hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and previous versions allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices. NOTE: some of these details are obtained from ...
Canonical Ubuntu Linux 13.10
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Qemu Qemu 1.0
Qemu Qemu
Qemu Qemu 1.1
Qemu Qemu 1.6.0
Qemu Qemu 1.5.0
Qemu Qemu 1.5.3
Qemu Qemu 1.5.1
Qemu Qemu 2.0.0
Qemu Qemu 1.5.2
Qemu Qemu 1.0.1
Qemu Qemu 1.4.1
Qemu Qemu 1.4.2
Qemu Qemu 1.6.2
Qemu Qemu 1.6.1
NA
CVE-2014-0471
Directory traversal vulnerability in the unpacking functionality in dpkg prior to 1.15.9, 1.16.x prior to 1.16.13, and 1.17.x prior to 1.17.8 allows remote malicious users to write arbitrary files via a crafted source package, related to "C-style filename quoting."
Debian Dpkg 1.10.5
Debian Dpkg 1.15.5.5
Debian Dpkg 1.13.20
Debian Dpkg 1.10.6
Debian Dpkg 1.15.8.4
Debian Dpkg 1.14.4
Debian Dpkg 1.9.10
Debian Dpkg 1.14.12
Debian Dpkg 1.15.5.2
Debian Dpkg 1.9.20
Debian Dpkg 1.13.9
Debian Dpkg 1.15.3.1
Debian Dpkg 1.14.23
Debian Dpkg 1.14.16.6
Debian Dpkg 1.15.4.1
Debian Dpkg 1.13.11
Debian Dpkg 1.16.0
Debian Dpkg 1.14.18
Debian Dpkg 1.17.3
Debian Dpkg 1.9.12
Debian Dpkg 1.14.21
Debian Dpkg 1.9.13
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »