[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195521

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:704497
snapd is installed

oval:org.secpod.oval:def:118484
snapd is installed

oval:org.secpod.oval:def:70378
snapd: Daemon and tooling that enable snap packages An intended access restriction in snapd could be bypassed by container management snaps.

oval:org.secpod.oval:def:70166
snapd: Daemon and tooling that enable snap packages An intended access restriction in snapd could be bypassed by strict mode snaps on 64 bit architectures.

oval:org.secpod.oval:def:124727
Snappy is a modern, cross-distribution, transactional package manager designed for working with self-contained, immutable packages.

oval:org.secpod.oval:def:605953
Multiple vulnerabilties were discovered in snapd, a daemon and tooling that enable Snap packages, which could result in bypass of access restrictions or privilege escalation.

oval:org.secpod.oval:def:1902005
snap-confine as included in snapd before 2.39 did not guard against symlink races when performing the chdir to the current working directory of the calling user, aka a "cwd restore permission bypass."

oval:org.secpod.oval:def:704494
snapd: Daemon and tooling that enable snap packages snapd could be made to run programs as an administrator.

oval:org.secpod.oval:def:51219
snapd: Daemon and tooling that enable snap packages snapd could be made to run programs as an administrator.

oval:org.secpod.oval:def:704836
snapd: Daemon and tooling that enable snap packages An intended access restriction in snapd could be bypassed by strict mode snaps on 64 bit architectures.

oval:org.secpod.oval:def:705543
snapd: Daemon and tooling that enable snap packages An intended access restriction in snapd could be bypassed by strict mode snaps.

oval:org.secpod.oval:def:610291
The Qualys Research Team discovered a race condition in the snapd-confine binary which could result in local privilege escalation.

oval:org.secpod.oval:def:88627
snapd: Daemon and tooling that enable snap packages snapd could be made to run programs as an administrator.

oval:org.secpod.oval:def:88436
The Qualys Research Team discovered a race condition in the snapd-confine binary which could result in local privilege escalation.

*CPE
cpe:/a:snapd:snapd

© SecPod Technologies