Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
canonical ubuntu linux 14.10 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2016-1575
The overlayfs implementation in the Linux kernel up to and including 4.5.2 does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.
Linux Linux Kernel
Canonical Ubuntu Touch 15.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 16.10
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Core 15.04
1 EDB exploit
7.8
CVSSv3
CVE-2016-1576
The overlayfs implementation in the Linux kernel up to and including 4.5.2 does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an overlayfs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.
Canonical Ubuntu Core 15.04
Canonical Ubuntu Touch 15.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 16.10
Linux Linux Kernel
1 EDB exploit
7.8
CVSSv3
CVE-2015-1328
The overlayfs implementation in the linux (aka Linux kernel) package prior to 3.19.0-21.21 in Ubuntu up to and including 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a c...
Canonical Ubuntu Linux
Linux Linux Kernel
3 EDB exploits
13 Github repositories
NA
CVE-2015-0220
The django.util.http.is_safe_url function in Django prior to 1.4.18, 1.6.x prior to 1.6.10, and 1.7.x prior to 1.7.3 does not properly handle leading whitespaces, which allows remote malicious users to conduct cross-site scripting (XSS) attacks via a crafted URL, related to redir...
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Djangoproject Django 1.6.2
Djangoproject Django 1.6.3
Djangoproject Django 1.7
Djangoproject Django 1.7.1
Djangoproject Django
Djangoproject Django 1.6.6
Djangoproject Django 1.6.7
Djangoproject Django 1.6
Djangoproject Django 1.6.1
Djangoproject Django 1.6.8
Djangoproject Django 1.6.9
Djangoproject Django 1.6.4
Djangoproject Django 1.6.5
Djangoproject Django 1.7.2
NA
CVE-2015-0221
The django.views.static.serve view in Django prior to 1.4.18, 1.6.x prior to 1.6.10, and 1.7.x prior to 1.7.3 reads files an entire line at a time, which allows remote malicious users to cause a denial of service (memory consumption) via a long line in a file.
Djangoproject Django 1.6.4
Djangoproject Django 1.6.5
Djangoproject Django 1.7.2
Djangoproject Django 1.6
Djangoproject Django 1.6.1
Djangoproject Django 1.6.8
Djangoproject Django 1.6.9
Djangoproject Django 1.6.2
Djangoproject Django 1.6.3
Djangoproject Django 1.7
Djangoproject Django 1.7.1
Djangoproject Django
Djangoproject Django 1.6.6
Djangoproject Django 1.6.7
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
NA
CVE-2015-0222
ModelMultipleChoiceField in Django 1.6.x prior to 1.6.10 and 1.7.x prior to 1.7.3, when show_hidden_initial is set to True, allows remote malicious users to cause a denial of service by submitting duplicate values, which triggers a large number of SQL queries.
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 14.10
Djangoproject Django 1.6.4
Djangoproject Django 1.6.5
Djangoproject Django 1.7.2
Djangoproject Django 1.6
Djangoproject Django 1.6.1
Djangoproject Django 1.6.8
Djangoproject Django 1.6.9
Djangoproject Django 1.6.2
Djangoproject Django 1.6.3
Djangoproject Django 1.7
Djangoproject Django 1.7.1
Djangoproject Django
Djangoproject Django 1.6.6
Djangoproject Django 1.6.7
NA
CVE-2015-3144
The fix_hostname function in cURL and libcurl 7.37.0 up to and including 7.41.0 does not properly calculate an index, which allows remote malicious users to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-leng...
Oracle Mysql Enterprise Monitor
Haxx Curl 7.39.0
Haxx Curl 7.40.0
Haxx Curl 7.37.0
Haxx Curl 7.41.0
Haxx Curl 7.37.1
Haxx Curl 7.38.0
Haxx Libcurl 7.40.0
Haxx Libcurl 7.41.0
Haxx Libcurl 7.37.0
Haxx Libcurl 7.37.1
Haxx Libcurl 7.38.0
Haxx Libcurl 7.39
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Debian Debian Linux 7.0
NA
CVE-2014-9673
Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType prior to 2.5.4 allows remote malicious users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 15.04
Debian Debian Linux 7.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Hpc Node 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Hpc Node Eus 7.1
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Freetype Freetype
NA
CVE-2014-9661
type42/t42parse.c in FreeType prior to 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote malicious users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Debian Debian Linux 7.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Hpc Node 6
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Hpc Node Eus 7.1
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Freetype Freetype
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Fedoraproject Fedora 21
Fedoraproject Fedora 20
NA
CVE-2014-9667
sfnt/ttload.c in FreeType prior to 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote malicious users to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFN...
Debian Debian Linux 7.0
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.10
Fedoraproject Fedora 21
Fedoraproject Fedora 20
Freetype Freetype
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Hpc Node Eus 7.1
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node 6
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Desktop 7.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
remote code execution
CVE-2024-34909
CVE-2024-3317
SSTI
CVE-2024-3400
CVE-2024-30051
wireless
CVE-2024-4622
CVE-2024-4908
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »