Page 2 of 25 results (0.010 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

18 Sep 2024 — Anbox Management Service, in versions 1.17.0 through 1.23.0, does not validate the TLS certificate provided to it by the Anbox Stream Agent. An attacker must be able to machine-in-the-middle the Anbox Stream Agent from within an internal network before they can attempt to take advantage of this. • https://bugs.launchpad.net/anbox-cloud/+bug/2077570 • CWE-295: Improper Certificate Validation •

CVSS: 8.8EPSS: 0%CPEs: 6EXPL: 1

07 Aug 2024 — An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist. Rory McNamara discovered that wpa_supplicant could be made... • https://github.com/zrax-x/CVE-2024-5290-exp • CWE-427: Uncontrolled Search Path Element •

CVSS: 8.8EPSS: 0%CPEs: 5EXPL: 0

29 Jul 2024 — An issue was discovered in Juju that resulted in the leak of the sensitive context ID, which allows a local unprivileged attacker to access other sensitive data or relation accessible to the local charm. • https://github.com/juju/juju/commit/da929676853092a29ddf8d589468cf85ba3efaf2 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

23 Jul 2024 — An issue was discovered in provd before version 0.1.5 with a setuid binary, which allows a local attacker to escalate their privilege. Se descubrió un problema en provd anterior a la versión 0.1.5 con un binario setuid, que permite a un atacante local escalar sus privilegios. James Henstridge discovered that provd incorrectly handled environment variables. A local attacker could possibly use this issue to run arbitrary programs and escalate privileges. • https://bugs.launchpad.net/ubuntu/+source/provd/+bug/2071574 • CWE-73: External Control of File Name or Path •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

27 Jun 2024 — Marco Trevisan discovered that the Ubuntu Advantage Desktop Daemon, before version 1.12, leaks the Pro token to unprivileged users by passing the token as an argument in plaintext. Marco Trevisan discovered that the Ubuntu Advantage Desktop Daemon leaked the Pro token to unprivileged users by passing the token as an argument in plaintext. An attacker could use this issue to gain unauthorized access to an Ubuntu Pro subscription. • https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/2068944 • CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

07 Jun 2024 — netplan leaks the private key of wireguard to local users. Versions after 1.0 are not affected. netplan filtra la clave privada de wireguard a los usuarios locales. Pronto se publicará una solución de seguridad. Andreas Hasenack discovered that netplan incorrectly handled the permissions for netdev files containing wireguard configuration. An attacker could use this to obtain wireguard secret keys. • https://bugs.launchpad.net/netplan/+bug/1987842 • CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

03 Jun 2024 — Subiquity Shows Guided Storage Passphrase in Plaintext with Read-all Permissions Subiquity muestra una frase de contraseña de almacenamiento guiada en texto plano con permisos de lectura total • https://bugs.launchpad.net/subiquity/+bug/1960162 • CWE-256: Plaintext Storage of a Password •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

04 Apr 2024 — It was discovered that Canonical's Pebble service manager read-file API and the associated pebble pull command, before v1.10.2, allowed unprivileged local users to read files with root-equivalent permissions when Pebble was running as root. Fixes are also available as backports to v1.1.1, v1.4.2, and v1.7.4. Se descubrió que la API de lectura de archivos del administrador de servicios Pebble de Canonical y el comando pebble pull asociado, antes de v1.10.2, permitían a los usuarios locales sin privilegios le... • https://github.com/canonical/pebble/security/advisories/GHSA-4685-2x5r-65pj • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 6.7EPSS: 0%CPEs: 1EXPL: 0

14 Feb 2024 — An insecure default to allow UEFI Shell in EDK2 was left enabled in LXD. This allows an OS-resident attacker to bypass Secure Boot. Un valor predeterminado inseguro para permitir UEFI Shell en EDK2 se dejó habilitado en LXD. Esto permite que un atacante residente en el sistema operativo omita el arranque seguro. • https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137 • CWE-276: Incorrect Default Permissions •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

14 Feb 2024 — An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot. Un valor predeterminado inseguro para permitir UEFI Shell en EDK2 se dejó habilitado en EDK2 de Ubuntu. Esto permite que un atacante residente en el sistema operativo omita el arranque seguro. Marc Beatove discovered buffer overflows exit in EDK2. • https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137 •