📦 Lxd
by Canonical
🔍 What is Lxd?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows attackers with read permissions in Canonical LXD to hijack terminal or console sessions via WebSocket connection hijacking, enabling arbitrary command execution and privilege...
This CSRF vulnerability in LXD-UI allows attackers to create and start container instances without user consent by tricking authenticated users into submitting malicious HTML forms. It affects Canonic...
This path traversal vulnerability in Canonical LXD 5.0 LTS allows authenticated remote attackers to read arbitrary files on the host system by manipulating log file names or symbolic links. It affects...
This vulnerability allows unauthenticated network attackers to determine whether specific LXD projects exist by sending crafted requests with wildcard fingerprints to the image export API. It affects ...
This vulnerability allows unauthenticated remote attackers to determine whether specific projects exist in Canonical LXD by observing different HTTP status code responses from the images API. This aff...
This path traversal vulnerability in Canonical LXD LXD-UI allows authenticated attackers to access or modify resources outside intended directories by manipulating URL paths. It affects all platforms ...
This vulnerability allows attackers with instance configuration permissions in Canonical LXD to perform template injection when creating instance snapshots. Using the Pongo2 template engine, they can ...
This vulnerability allows attackers with root privileges inside any LXD container to spoof their process names to impersonate other containers. This enables them to access metadata, configuration, and...