Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ubuntu_linux vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-0834
The base-files package prior to 5.0.0ubuntu7.1 on Ubuntu 9.10 and prior to 5.0.0ubuntu20.10.04.2 on Ubuntu 10.04 LTS, as shipped on Dell Latitude 2110 netbooks, does not require authentication for package installation, which allows remote archive servers and man-in-the-middle mal...
Ubuntu Ubuntu Linux 10.04
Ubuntu Ubuntu Linux 9.10
NA
CVE-2011-0725
Absolute path traversal vulnerability in the org.debian.apt.UpdateCachePartially method in worker.py in Aptdaemon 0.40 in Ubuntu 10.10 and 11.04 allows local users to read arbitrary files via a full pathname in the sources_list argument, related to the D-Bus interface.
Sebastian Heinlein Aptdaemon 0.40
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
5.1
CVSSv3
CVE-2019-0816
A security feature bypass exists in Azure SSH Keypairs, due to a change in the provisioning logic for some Linux images that use cloud-init, aka 'Azure SSH Keypairs Security Feature Bypass Vulnerability'.
Canonical Ubuntu Linux 18.04
1 Article
5.3
CVSSv3
CVE-2023-44216
PVRIC (PowerVR Image Compression) on Imagination 2018 and later GPU devices offers software-transparent compression that enables cross-origin pixel-stealing attacks against feTurbulence and feBlend in the SVG Filter specification, aka a GPU.zip issue. For example, attackers can s...
Canonical Ubuntu Linux 22.04
Amd Ryzen 7 4800u -
Intel Core I7-10510u -
Intel Core I7-12700k -
Intel Core I7-8700 -
Microsoft Windows 11 -
Intel Core I7-10610u -
Intel Core I7-11800h -
Nvidia Geforce Rtx 3060 -
Microsoft Windows 10 -
Amd Ryzen 5 7600x -
Nvidia Geforce Rtx 2080 Super -
Apple Macos 13.1
Apple M1 Mac Mini -
Google Android 13.0
Google Pixel 6 -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4040
cross-site scripting
CVE-2023-25790
CVE-2024-2961
XML external entity
CVE-2024-26926
CVE-2024-32806
CVE-2024-32711
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started