Canonical

Ubuntu Linux

4106 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.73%
  • Veröffentlicht 13.06.2018 11:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:53

Exiv2 0.26 has an integer overflow in the LoaderExifJpeg class in preview.cpp, leading to an out-of-bounds read in Exiv2::MemIo::read in basicio.cpp.

  • EPSS 0.03%
  • Veröffentlicht 12.06.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:27

In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by s...

  • EPSS 81.09%
  • Veröffentlicht 12.06.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:38:49

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime result...

  • EPSS 0.08%
  • Veröffentlicht 12.06.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:49

In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered b...

  • EPSS 0.57%
  • Veröffentlicht 11.06.2018 21:29:16
  • Zuletzt bearbeitet 21.11.2024 04:08:16

A mechanism to bypass Content Security Policy (CSP) protections on sites that have a "script-src" policy of "'strict-dynamic'". If a target website contains an HTML injection flaw an attacker could inject a reference to a copy of the "require.js" lib...

  • EPSS 0.39%
  • Veröffentlicht 11.06.2018 21:29:16
  • Zuletzt bearbeitet 21.11.2024 04:08:16

The JSON Viewer displays clickable hyperlinks for strings that are parseable as URLs, including "javascript:" links. If a JSON file contains malicious JavaScript script embedded as "javascript:" links, users may be tricked into clicking and running t...

  • EPSS 0.31%
  • Veröffentlicht 11.06.2018 21:29:16
  • Zuletzt bearbeitet 21.11.2024 04:08:16

A vulnerability exists in XSLT during number formatting where a negative buffer size may be allocated in some instances, leading to a buffer overflow and crash if it occurs. This vulnerability affects Firefox < 60.

  • EPSS 18.16%
  • Veröffentlicht 11.06.2018 21:29:16
  • Zuletzt bearbeitet 25.11.2025 17:50:16

A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affec...

  • EPSS 1.76%
  • Veröffentlicht 11.06.2018 21:29:16
  • Zuletzt bearbeitet 21.11.2024 04:08:16

A use-after-free vulnerability can occur during WebGL operations. While this results in a potentially exploitable crash, the vulnerability is limited because the memory is freed and reused in a brief window of time during the freeing of the same call...

Exploit
  • EPSS 1.26%
  • Veröffentlicht 11.06.2018 21:29:16
  • Zuletzt bearbeitet 21.11.2024 04:08:17

If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more rel...