certin 3rd round machine ubuntu
certin 3rd round machine ubuntu
(18.04.x)
Location of ~
Vulnerability/Error
Vulnerable location, http://192.168.125.96/forgot-password
parameter, path, link
Name of Canonical Ubuntu Linux SEoL (18.04.x)
Vulnerability/Summary
According to its version, Canonical Ubuntu Linux is 18.04.x. It is, therefore, no
longer maintained by its vendor or provider.
Lack of support implies that no new security patches for the product will be
released by the vendor. As a result, it may contain security vulnerabilities.
Proof of concept and
steps of verification of
vulnerability with clearly
visible screenshots
Workaround / Solutions Upgrade to a version of Canonical Ubuntu Linux that is currently supported.
VULNERABILITY -2 # Ubuntu 14.04 LTS / 16.04 LTS /
18.04 LTS / 20.04 LTS / 22.04 LTS / 23.10 : Python
vulnerabilities (USN-6891-1)
Location of ~
Vulnerability/Error
Vulnerable location, /
parameter, path, link
Name of Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 23.10 :
Vulnerability/Summary Python vulnerabilities (USN-6891-1)
The remote Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04
LTS / 23.10 host has packages installed that are affected by multiple
vulnerabilities as referenced in the USN-6736-1 advisory.
The remote Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04
LTS / 24.04 LTS host has packages installed that are affected by multiple
vulnerabilities as referenced in the USN-6947-1 advisory.
Tenable has extracted the preceding description block directly from the
Ubuntu security advisory..
Proof of concept and
steps of verification of
vulnerability with clearly
visible screenshots
The remote Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04
LTS / 24.04 LTS / 24.10 host has packages installed that are affected by a
vulnerability as referenced in the USN-7257-1 advisory.
Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc
Stevens, and Adam Suhl discovered that Kerberos incorrectly authenticated
certain responses. An attacker able to intercept communications between a
RADIUS client and server could possibly use this issue to forge responses,
bypass authentication, and access network devices and services.
The remote Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04
LTS / 24.04 LTS host has packages installed that are affected by multiple
vulnerabilities as referenced in the USN-7070-1 advisory.
The remote Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS
host has a package installed that is affected by a vulnerability as referenced
in the USN-6730-1 advisory.
It was discovered that Apache Maven Shared Utils did not handle double-
quoted strings properly, allowing shell injection attacks. This could allow an
attacker to run arbitrary code.
Proof of concept and
steps of verification of
vulnerability with clearly
visible screenshots
Location of ~
Vulnerability/Error
Vulnerable location, /
parameter, path, link
Name of Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 24.04 LTS : Expat
Vulnerability/Summary vulnerabilities (USN-7000-1)
Shang-Hung Wan discovered that Expat did not properly handle certain
function calls when a negative input length was provided. An attacker could
use this issue to cause a denial of service or possibly execute arbitrary code.
(CVE-2024-45490)
Shang-Hung Wan discovered that Expat did not properly handle the potential
for an integer overflow on 32-bit platforms. An attacker could use this issue to
cause a denial of service or possibly execute arbitrary code. (CVE-2024-
45491, CVE-2024-45492)
Proof of concept and
steps of verification of
vulnerability with clearly
visible screenshots
The remote Ubuntu 16.04 ESM / 18.04 ESM / 20.04 ESM / 22.04 ESM host has
packages installed that are affected by a vulnerability as referenced in the
USN-5245-1 advisory.
It was discovered that Apache Maven followed repositories that are defined in
a dependency's Project Object Model (pom) even if the repositories weren't
encrypted (http protocol). An attacker could use this vulnerability to take over
a repository, execute arbitrary code or cause a denial of service.
Proof of concept and
steps of verification of
vulnerability with clearly
visible screenshots
Workaround / Solutions Update the affected libonig-dev, libonig2 and / or libonig4 packages.
VULNERABILITY -16 # Ubuntu 16.04 ESM / 18.04 ESM :
OpenSSH vulnerability (USN-6242-2)
Location of ~
Vulnerability/Error
Vulnerable location, /
parameter, path, link
Name of Ubuntu 16.04 ESM / 18.04 ESM : OpenSSH vulnerability (USN-6242-2)
Vulnerability/Summary
The remote Ubuntu 16.04 ESM / 18.04 ESM host has packages installed that
are affected by a vulnerability as referenced in the USN-6242-2 advisory.
It was discovered that Python did not properly handle XML entity declarations
in plist files. An attacker could possibly use this vulnerability to perform an
XML External Entity (XXE) injection, resulting in a denial of service or
information disclosure.
Proof of concept and
steps of verification of
vulnerability with clearly
visible screenshots
The remote Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS host has packages
installed that are affected by multiple vulnerabilities as referenced in the
USN-6305-2 advisory.
The remote Ubuntu 16.04 LTS / 18.04 LTS host has packages installed that
are affected by multiple vulnerabilities as referenced in the USN-6885-3
advisory.
USN-6885-1 fixed several vulnerabilities in Apache. This update provides the
corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS
Proof of concept and
steps of verification of
vulnerability with clearly
visible screenshots
Location of ~
Vulnerability/Error
Vulnerable location, /
parameter, path, link
Name of Ubuntu 16.04 LTS / 18.04 LTS : Git vulnerabilities (USN-7023-1)
Vulnerability/Summary
The remote Ubuntu 16.04 LTS / 18.04 LTS host has packages installed that
are affected by a vulnerability as referenced in the USN-7153-1 advisory.
It was discovered that PHP incorrectly handled long string inputs in two
database drivers. An attacker could possibly use this
issue to write files in locations they would not normally have access to. (CVE-
2024-11236)
.
Proof of concept and
steps of verification of
vulnerability with clearly
visible screenshots
Location of ~
Vulnerability/Error
Vulnerable location, /
parameter, path, link
Name of Ubuntu 16.04 LTS / 18.04 LTS : Wget vulnerability (USN-6852-2)
Vulnerability/Summary
The remote Ubuntu 16.04 LTS / 18.04 LTS host has a package installed that is
affected by a vulnerability as referenced in the USN-6852-2 advisory
Location of ~
Vulnerability/Error
Vulnerable location, /
parameter, path, link
Name of Ubuntu 18.04 ESM / 20.04 LTS / 22.04 LTS : Vim vulnerabilities (USN-6420-1)
Vulnerability/Summary
The remote Ubuntu 18.04 ESM, 20.04 LTS, and 22.04 LTS systems
are impacted by multiple vulnerabilities in Vim, as outlined in USN-
6420-1. These vulnerabilities primarily involve improper memory
handling and insufficient input validation when opening specially
crafted files or executing certain commands. Exploiting these flaws
could lead to crashes, denial of service, or potentially allow
attackers to execute arbitrary code. Several issues are specific to
certain Ubuntu versions, with some affecting only 22.04 LTS and
others impacting multiple versions. Updates have been released to
address these security concerns.
Proof of concept and
steps of verification of
vulnerability with clearly
visible screenshots
Location of ~
Vulnerability/Error
Vulnerable location, /
parameter, path, link
Name of Ubuntu 18.04 ESM : Python vulnerability (USN-5931-1)
Vulnerability/Summary
The remote Ubuntu 18.04 ESM host has packages installed that are affected
by a vulnerability as referenced in the USN-5931-1 advisory.
The remote Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04
LTS / 23.10 / 24.04 LTS host has packages installed that are affected by a
vulnerability as referenced in the USN-6855-1 advisory.
The remote Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04
LTS / 23.10 / 24.04 LTS. host has a package installed that is affected by a
vulnerability as referenced in the USN-6756-1 advisory.
Tenable has extracted the preceding description block directly from the
Ubuntu security advisory.
Proof of concept and
steps of verification of
vulnerability with clearly
visible screenshots
Workaround / Solutions Update the affected packages.
VULNERABILITY -30 # Ubuntu 14.04 LTS / 16.04 LTS /
18.04 LTS / 20.04 LTS / 22.04 LTS / 23.10 : Vim
vulnerability (USN-6698-1)
Location of ~
Vulnerability/Error
Vulnerable location, /
parameter, path, link
Name of Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 23.10 :
Vulnerability/Summary Vim vulnerability (USN-6698-1) The remote Ubuntu 14.04 LTS / 16.04 LTS /
18.04 LTS / 20.04 LTS / 22.04 LTS / 23.10 host has packages installed that are
affected by a vulnerability as referenced in the USN-6698-1 advisory.
Zhen Zhou discovered that Vim did not properly manage memory. An
attacker could possibly use this issue to cause a denial of service.
Proof of concept and
steps of verification of
vulnerability with clearly
visible screenshots
The remote Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04
LTS / 23.10 host has packages installed that are affected by multiple
vulnerabilities as referenced in the USN-6721-1 advisory.
The remote Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04
LTS / 23.10 host has packages installed that are affected by multiple
vulnerabilities as referenced in the USN-6721-1 advisory.
The remote Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04
LTS / 24.04 LTS host has packages installed that are affected by a
vulnerability as referenced in the USN-7002-1 advisory.
The remote Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04
LTS host has packages installed that are affected by multiple vulnerabilities
as referenced in the USN-7015-5 advisory.
The remote Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 23.10
host has packages installed that are affected by multiple vulnerabilities as
referenced in the USN-6644-1 advisory
It was discovered that LibTIFF incorrectly handled certain image files with
the tiffcp utility. If a user were tricked into opening a specially crafted image
file, an attacker could possibly use this issue to cause tiffcp to crash,
resulting in a denial of service. (CVE-2023-6228)
The remote Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS host has packages
installed that are affected by multiple vulnerabilities as referenced in the
USN-6723-1 advisory.
The remote Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS host has packages
installed that are affected by a vulnerability as referenced in the USN-7249-1
advisory.
The remote Ubuntu 14.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS host has
packages installed that are affected by multiple vulnerabilities as referenced
in the USN-7273-1 advisory.
The remote Ubuntu 14.04 LTS / 18.04 LTS / 20.04 LTS host has packages
installed that are affected by multiple vulnerabilities as referenced in the
USN-6958-1 advisory.
An attacker could possibly use this issue to cause a denial of service. (CVE-
2017-8834, CVE-2017-8871)
The remote Ubuntu 16.04 ESM / 18.04 ESM / 20.04 ESM / 22.04 ESM host
has packages installed that are affected by multiple vulnerabilities as
referenced in the USN-5958-1 advisory.
Location of ~
Vulnerability/Error
Vulnerable location, /
parameter, path, link
Name of Ubuntu 16.04 ESM / 18.04 ESM / 20.04 ESM : Wireshark vulnerabilities (USN-
Vulnerability/Summary 6262-1)
The remote Ubuntu 16.04 ESM / 18.04 ESM / 20.04 ESM host has packages
installed that are affected by multiple vulnerabilities as referenced in the
USN-6262-1 advisory
It was discovered that Wireshark did not properly handle certain NFS
packages when certain configuration options were enabled. An attacker
could possibly use this issue to cause Wireshark to crash, resulting in a
denial of service. (CVE-2020-13164)
It was discovered that Wireshark did not properly handle certain GVCP
packages. An attacker could possibly use this issue to cause Wireshark to
crash, resulting in a denial of service. This issue only affected Ubuntu 20.04
LTS. (CVE-2020-15466)
It was discovered that Wireshark did not properly handle certain Kafka
packages. An attacker could possibly use this issue to cause Wireshark to
crash, resulting in a denial of service. This issue only affected Ubuntu 20.04
LTS. (CVE-2020-17498)
It was discovered that Wireshark did not properly handle certain TCP
packages containing an invalid 0xFFFF checksum. An attacker could
possibly use this issue to cause Wireshark to crash, resulting in a denial of
service. (CVE-2020-25862)
It was discovered that Wireshark did not properly handle certain MIME
packages containing invalid parts.
(CVE-2020-25863)
Proof of concept and
steps of verification of
vulnerability with clearly
visible screenshots
The remote Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 LTS / 23.04 /
23.10 host has a package installed that is affected by a vulnerability as
referenced in the USN-6485-1 advisory.
Benoit Morgan, Paul Grosen, Thais Moreira Hamasaki, Ke Sun, Alyssa Milburn,
Hisham Shafi, Nir Shlomovich, Tavis Ormandy, Daniel Moghimi, Josh Eads,
Salman Qazi, Alexandra Sandulescu, Andy Nguyen, Eduardo Vela, Doug Kwan,
and Kostik Shtoyk discovered that some Intel(R) Processors did not properly
handle certain sequences of processor instructions. A local attacker could
possibly use this to cause a core hang (resulting in a denial of service), gain
access to sensitive information or possibly escalate their privileges.
Proof of concept and
steps of verification of
vulnerability with clearly
visible screenshots
Workaround / Solutions Update the affected intel-microcode package.
Location of ~
Vulnerability/Error
Vulnerable location, /
parameter, path, link
Name of Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 LTS / 23.04 / 23.10 : Vim
Vulnerability/Summary vulnerabilities (USN-6452-1)
The remote Ubuntu 16.04 ESM, 18.04 ESM, 20.04 LTS, 22.04 LTS, 23.04,
and 23.10 systems are affected by multiple vulnerabilities in Vim, as outlined
in USN-6452-1. These include issues such as divide-by-zero errors, improper
memory management, arithmetic overflows, and multiple out-of-bounds
write conditions. Exploitation of these flaws could lead to application crashes
(denial of service) or potentially allow attackers to execute arbitrary code.
Several vulnerabilities affect specific Ubuntu versions, highlighting the
importance of applying security updates to protect against these threats.
Proof of concept and
steps of verification of
vulnerability with clearly
visible screenshots
The remote Ubuntu systems (16.04 ESM, 18.04 ESM, 20.04 LTS, 22.04 LTS,
23.04, and 23.10) are impacted by multiple vulnerabilities in Vim, as
described in USN-6557-1. These flaws include invalid memory
dereferencing, infinite recursion, out-of-bounds writes, divide-by-zero
errors, and improper memory management in various commands (e.g.,
`put`, `spell`, `substitute`). Exploiting these vulnerabilities could allow
attackers to cause application crashes (denial of service) or potentially
execute arbitrary code. Many of these issues are specific to certain Ubuntu
versions, underlining the importance of applying updates promptly to
maintain system security.
Proof of concept and
steps of verification of
vulnerability with clearly
visible screenshots
Location of ~
Vulnerability/Error
Vulnerable location, /
parameter, path, link
Name of Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 LTS / 23.04 / 23.10 :
Vulnerability/Summary libsndfile vulnerability (USN-6471-1)
The remote Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 LTS / 23.04 /
23.10 host has packages installed that are affected by a vulnerability as
referenced in the USN-6471-1 advisory.
The remote Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 LTS / 23.04 /
23.10 host has packages installed that are affected by multiple vulnerabilities
as referenced in the USN-6473-2 advisory.
The remote Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 LTS / 23.04 /
23.10 host has packages installed that are affected by multiple vulnerabilities
as referenced in the USN-6473-1 advisory.
issue to obtain sensitive information. This issue only affected Ubuntu 16.04
LTS and Ubuntu 18.04 LTS.
(CVE-2018-25091)
It was discovered that urllib3 didn't strip HTTP body on status code 303
redirects under certain circumstances. A remote attacker could
The remote Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 LTS / 23.04
host has packages installed that are affected by multiple vulnerabilities as
referenced in the USN-6541-1 advisory.
It was discovered that the GNU C Library was not properly handling certain
memory operations. An attacker could possibly use this issue to cause a
denial of service (application crash). (CVE-2023-4806, CVE-2023-4813)
It was discovered that the GNU C library was not properly implementing a
fix for CVE-2023-4806 in certain cases, which could lead to a memory leak.
An attacker could possibly use this issue to cause a denial of service
(application crash). This issue only affected Ubuntu 22.04 LTS and Ubuntu
23.04. (CVE-2023-5156))
Proof of concept and
steps of verification of
vulnerability with clearly
visible screenshots