Lucene search

K

CVE-2019-7304

🗓️ 23 Apr 2019 16:10:29Reported by canonicalType 
cve
 cve
🔗 web.nvd.nist.gov📰️ 5 Media mentions👁 144 Views🌐 WEB

Canonical snapd before version 2.37.1 allows arbitrary root commands

Show more
Related
Detection
Affected
Refs
Paths
Social
ReporterTitlePublishedViews
Family
Ubuntu
snapd vulnerability
12 Feb 201900:00
ubuntu
ThreatPost
Flaw in snapd Allows Root Access to Linux Servers
13 Feb 201915:20
threatpost
Packet Storm
snapd 2.37 (Ubuntu) dirty_sock Local Privilege Escalation
13 Feb 201900:00
packetstorm
Packet Storm
snapd 2.37 (Ubuntu) dirty_sock Local Privilege Escalation
13 Feb 201900:00
packetstorm
NVD
CVE-2019-7304
23 Apr 201916:29
nvd
Prion
Input validation
23 Apr 201916:29
prion
Tenable Nessus
Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS : snapd vulnerability (USN-3887-1)
13 Feb 201900:00
nessus
OpenVAS
Ubuntu: Security Advisory (USN-3887-1)
13 Feb 201900:00
openvas
Debian CVE
CVE-2019-7304
23 Apr 201916:29
debiancve
OSV
CVE-2019-7304
23 Apr 201916:29
osv
Rows per page
Nvd
Node
canonicalsnapdRange<2.37.1
Node
[
  {
    "product": "snapd",
    "vendor": "Canonical",
    "versions": [
      {
        "lessThan": "2.37.1",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]
ParameterPositionPathDescriptionCWE
devmodepath/v2/snapsVulnerable API endpoint used to install arbitrary snaps including a trojan that creates a new user.CWE-863
snappath/v2/snapsVulnerable API endpoint used to install arbitrary snaps including a trojan that creates a new user.CWE-863

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
23 Apr 2019 16:29Current
9.3High risk
Vulners AI Score9.3
CVSS210
CVSS38.8 - 9.8
EPSS0.85373
144
.json
Report