CVE List

Id CVE No. Status Description Phase Votes Comments Actions
96766  CVE-2016-9946  Candidate  ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.  Assigned (20161213)  None (candidate not yet proposed)    View
96767  CVE-2016-9947  Candidate  ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.  Assigned (20161213)  None (candidate not yet proposed)    View
96768  CVE-2016-9948  Candidate  ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.  Assigned (20161213)  None (candidate not yet proposed)    View
96769  CVE-2016-9949  Candidate  An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.  Assigned (20161214)  None (candidate not yet proposed)    View
96770  CVE-2016-9950  Candidate  An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the local system.  Assigned (20161214)  None (candidate not yet proposed)    View

Page 19354 of 20943, showing 5 records out of 104715 total, starting on record 96766, ending on 96770

Actions