CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
96766 | CVE-2016-9946 | Candidate | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. | Assigned (20161213) | None (candidate not yet proposed) | View | |
96767 | CVE-2016-9947 | Candidate | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. | Assigned (20161213) | None (candidate not yet proposed) | View | |
96768 | CVE-2016-9948 | Candidate | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. | Assigned (20161213) | None (candidate not yet proposed) | View | |
96769 | CVE-2016-9949 | Candidate | An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code. | Assigned (20161214) | None (candidate not yet proposed) | View | |
96770 | CVE-2016-9950 | Candidate | An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the local system. | Assigned (20161214) | None (candidate not yet proposed) | View |
Page 19354 of 20943, showing 5 records out of 104715 total, starting on record 96766, ending on 96770