| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2021-3710 | Apport info disclosure via path traversal bug in read_file | Canonical | apport | Medium | 6.5 | 2021-10-01 02:35:23 | Deep Dive |
| CVE-2021-3709 | Apport file permission bypass through emacs byte compilation errors | Canonical | apport | Medium | 6.5 | 2021-10-01 02:35:21 | Deep Dive |
| CVE-2021-3626 | Windows version of Multipass unauthenticated localhost tcp control socket can perform mounts | Canonical | Multipass | High | 8.8 | 2021-10-01 02:35:20 | Deep Dive |
| CVE-2021-32556 | apport get_modified_conffiles() function command injection | Canonical | apport | Low | 3.8 | 2021-06-12 03:40:43 | Deep Dive |
| CVE-2021-32557 | apport process_report() arbitrary file write | Canonical | apport | Medium | 5.2 | 2021-06-12 03:40:43 | Deep Dive |
| CVE-2021-32555 | apport read_file() function could follow maliciously constructed symbolic links | Canonical | apport | High | 7.3 | 2021-06-12 03:40:42 | Deep Dive |
| CVE-2021-32553 | apport read_file() function could follow maliciously constructed symbolic links | Canonical | apport | High | 7.3 | 2021-06-12 03:40:41 | Deep Dive |
| CVE-2021-32554 | apport read_file() function could follow maliciously constructed symbolic links | Canonical | apport | High | 7.3 | 2021-06-12 03:40:41 | Deep Dive |
| CVE-2021-32552 | apport read_file() function could follow maliciously constructed symbolic links | Canonical | apport | High | 7.3 | 2021-06-12 03:40:40 | Deep Dive |
| CVE-2021-32550 | apport read_file() function could follow maliciously constructed symbolic links | Canonical | apport | High | 7.3 | 2021-06-12 03:40:39 | Deep Dive |
| CVE-2021-32551 | apport read_file() function could follow maliciously constructed symbolic links | Canonical | apport | High | 7.3 | 2021-06-12 03:40:39 | Deep Dive |
| CVE-2021-32549 | apport read_file() function could follow maliciously constructed symbolic links | Canonical | apport | High | 7.3 | 2021-06-12 03:40:38 | Deep Dive |
| CVE-2021-32548 | apport read_file() function could follow maliciously constructed symbolic links | Canonical | apport | High | 7.3 | 2021-06-12 03:40:37 | Deep Dive |
| CVE-2021-32547 | apport read_file() function could follow maliciously constructed symbolic links | Canonical | apport | High | 7.3 | 2021-06-12 03:40:36 | Deep Dive |
| CVE-2021-25684 | apport can be stalled by reading a FIFO | Canonical | apport | High | 8.8 | 2021-06-11 02:20:21 | Deep Dive |
| CVE-2021-25683 | apport improperly parses /proc/pid/stat | Canonical | apport | High | 8.8 | 2021-06-11 02:20:20 | Deep Dive |
| CVE-2021-25682 | apport improperly parses /proc/pid/status | Canonical | apport | High | 8.8 | 2021-06-11 02:20:19 | Deep Dive |
| CVE-2013-1055 | Potential DoS through abuse of rate limit in libunity-webapps for Firefox | Canonical | unity-firefox-extension | Medium | 4.3 | 2021-04-07 19:20:19 | Deep Dive |
| CVE-2013-1054 | Possible remote DOS in WebApps | Canonical | unity-firefox-extension | Medium | 4.3 | 2021-04-07 19:20:18 | Deep Dive |
| CVE-2020-16119 | DCCP CCID structure use-after-free | Canonical | Linux kernel | Medium | 6.3 | 2021-01-14 01:10:20 | Deep Dive |