Логотип exploitDog
bind:CVE-2026-3888
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-3888

Количество 5

Количество 5

ubuntu логотип

CVE-2026-3888

9 дней назад

Local privilege escalation in snapd in Ubuntu on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is enabled to automatically clean up this directory.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2026-3888

9 дней назад

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2026-3888

9 дней назад

Local privilege escalation in snapd on Linux allows local attackers to ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-grpw-jgrw-ccqr

9 дней назад

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2026-03419

9 дней назад

Уязвимость службы snapd операционных систем Ubuntu, позволяющая нарушителю повысить свои привилегии до уровня root

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-3888

Local privilege escalation in snapd in Ubuntu on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is enabled to automatically clean up this directory.

CVSS3: 7.8
0%
Низкий
9 дней назад
nvd логотип
CVE-2026-3888

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

CVSS3: 7.8
0%
Низкий
9 дней назад
debian логотип
CVE-2026-3888

Local privilege escalation in snapd on Linux allows local attackers to ...

CVSS3: 7.8
0%
Низкий
9 дней назад
github логотип
GHSA-grpw-jgrw-ccqr

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

CVSS3: 7.8
0%
Низкий
9 дней назад
fstec логотип
BDU:2026-03419

Уязвимость службы snapd операционных систем Ubuntu, позволяющая нарушителю повысить свои привилегии до уровня root

CVSS3: 7.8
0%
Низкий
9 дней назад

Уязвимостей на страницу