4934 results (0.007 seconds)

CVSS: 6.6EPSS: 0%CPEs: 1EXPL: 1

18 Mar 2026 — In Juju from version 3.0.0 through 3.6.18, when a secret owner grants permissions to a secret to a grantee, the secret owner relies exclusively on a predictable XID of the secret to verify ownership. This allows a malicious grantee which can request secrets to predict past secrets granted by the same secret owner to different grantees, allowing them to use the resources granted by those past secrets. Successful exploitation relies on a very specific configuration, specific data semantic, and the administrat... • https://github.com/juju/juju/security/advisories/GHSA-5cj2-rqqf-hx9p • CWE-343: Predictable Value Range from Previous Values CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

18 Mar 2026 — In Juju from version 3.0.0 through 3.6.18, the authorization of the "secret-set" tool is not performed correctly, which allows a grantee to update the secret content, and can lead to reading or updating other secrets. When the "secret-set" tool logs an error in an exploitation attempt, the secret is still updated contrary to expectations, and the new value is visible to both the owner and the grantee. En Juju desde la versión 3.0.0 hasta la 3.6.18, la autorización de la herramienta 'secret-set' no se realiz... • https://github.com/juju/juju/security/advisories/GHSA-439w-v2p7-pggc • CWE-284: Improper Access Control CWE-778: Insufficient Logging CWE-863: Incorrect Authorization •

CVSS: 7.6EPSS: 0%CPEs: 1EXPL: 0

18 Mar 2026 — An authorization bypass vulnerability in the Vault secrets back-end implementation of Juju versions 3.1.6 through 3.6.18 allows an authenticated unit agent to perform unauthorized updates to secret revisions. With sufficient information, an attacker can poison any existing secret revision within the scope of that Vault secret back-end. Una vulnerabilidad de omisión de autorización en la implementación del back-end de secretos de Vault de Juju versiones 3.1.6 a 3.6.18 permite a un agente de unidad autenticad... • https://github.com/juju/juju/security/advisories/GHSA-89x7-5m5m-mcmm • CWE-285: Improper Authorization •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

18 Mar 2026 — A race condition in the secrets management subsystem of Juju versions 3.0.0 through 3.6.18 allows an authenticated unit agent to claim ownership of a newly initialized secret. Between generating a Juju Secret ID and creating the secret's first revision, an attacker authenticated as another unit agent can claim ownership of a known secret. This leads to the attacking unit being able to read the content of the initial secret revision. Una condición de carrera en el subsistema de gestión de secretos de las ver... • https://github.com/juju/juju/security/advisories/GHSA-gfgr-6hrj-85ww • CWE-708: Incorrect Ownership Assignment •

CVSS: 9.4EPSS: 0%CPEs: 4EXPL: 0

12 Mar 2026 — An improper sanitization of the compression_algorithm parameter in Canonical LXD allows an authenticated, unprivileged user to execute commands as the LXD daemon on the LXD server via API calls to the image and backup endpoints. This issue affected LXD from 4.12 through 6.6 and was fixed in the snap versions 5.0.6-e49d9f4 (channel 5.0/stable), 5.21.4-1374f39 (channel 5.21/stable), and 6.7-1f11451 (channel 6.0 stable). The channel 4.0/stable is not affected as it contains version 4.0.10. Una sanitización ina... • https://discourse.ubuntu.com/t/lxd-authenticated-remote-code-execution-fixes-available/78365 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

03 Mar 2026 — Improper authorization in the API endpoint GET /1.0/certificates in Canonical LXD 6.6 on Linux allows an authenticated, restricted user to enumerate all certificate fingerprints trusted by the lxd server. • https://github.com/canonical/lxd/commit/d936c90d47cf0be1e9757df897f769e9887ebde1 • CWE-862: Missing Authorization •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

17 Feb 2026 — pybind: Improper use of Pybind A new version of Red Hat build of Ceph Storage has been released. •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

16 Feb 2026 — Malicious scripts that interrupt new tab page loading could cause desynchronization between the address bar and page content, allowing the attacker to spoof arbitrary HTML under a trusted domain. This vulnerability affects Firefox for iOS < 147.2.1. Scripts maliciosos que interrumpen la carga de la página de nueva pestaña podrían causar desincronización entre la barra de direcciones y el contenido de la página, permitiendo al atacante suplantar HTML arbitrario bajo un dominio de confianza. Esta vulnerabilid... • https://bugzilla.mozilla.org/show_bug.cgi?id=2012152 • CWE-451: User Interface (UI) Misrepresentation of Critical Information •

CVSS: 10.0EPSS: 0%CPEs: 8EXPL: 0

16 Feb 2026 — Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, Firefox ESR < 115.32.1, Thunderbird < 140.7.2, and Thunderbird < 147.0.2. • https://bugzilla.mozilla.org/show_bug.cgi?id=2014390 • CWE-122: Heap-based Buffer Overflow •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

12 Feb 2026 — A flaw was found in Dropbear. When running in multi-user mode and authenticating users, the dropbear ssh server does the socket forwardings requested by the remote client as root, only switching to the logged-in user upon spawning a shell or performing some operations like reading the user's files. With the recent ability of also using unix domain sockets as the forwarding destination any user able to log in via ssh can connect to any unix socket with the root's credentials, bypassing both file system restr... • https://github.com/mkj/dropbear/pull/391 • CWE-266: Incorrect Privilege Assignment •