Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
canonical snapcraft vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv3
CVE-2020-27348
In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions before 4....
Canonical Snapcraft
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
7.5
CVSSv3
CVE-2019-11503
snap-confine as included in snapd prior to 2.39 did not guard against symlink races when performing the chdir() to the current working directory of the calling user, aka a "cwd restore permission bypass."
Canonical Snapd
7.5
CVSSv3
CVE-2019-11502
snap-confine in snapd prior to 2.38 incorrectly set the ownership of a snap application to the uid and gid of the first calling user. Consequently, that user had unintended access to a private /tmp directory.
Canonical Snapd
Preferred Score:
CVSSv3
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
dos
cente tcp/ipv4
CVE-2025-26568
hard-coded
CVE-2025-25898
heart health ios mobile application
myscada
CVE-2025-24016
arbitrary
CVE-2023-34402
CVE-2024-37602
130.8005
CVE-2025-24200
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started