| Ubuntu | Number Of NVD | 4093 | CRITICAL | 341 | HIGH | 1595 | MEDIUM | 1941 | LOW | 216 |
| URL | https://ubuntu.com/ | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Explanation | A release without LTS is a normal release and provides support for 9 months after it is released. LTS (Long Term Support) provides support for five years. After the end of LTS, we also offer a service that provides extended support (about 5 years) for a fee. |
||||||||
| Tag | |||||||||
| No | Type | Name | URL |
|---|---|---|---|
| 1 | https://ubuntu.com/about/release-cycle | ||
| 2 | https://wiki.ubuntu.com/ | ||
| 3 | https://wiki.ubuntu.com/Releases | ||
| 4 | https://ubuntu.com/licensing | ||
| 5 | https://ubuntu.com/security/notices |
| No | Name | Latest Version | Release date | Initial release | Normal Support | Security Support Service Pack Support |
Extended for a fee |
Critical | High | Medium | Low |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 191 | Ubuntu 24 | 24.04.3 | Aug. 7, 2025 | April 25, 2024 | 0 | 0 | 1 | 0 | |||
| 192 | Ubuntu 23.04 | 23.04 | April 24, 2023 | April 24, 2023 | April 30, 2024 | 1 | 5 | 2 | 0 | ||
| 193 | Ubuntu 22.04 LTS | 22.04.5 | Sept. 12, 2024 | April 21, 2022 | April 30, 2027 | April 30, 2032 | 1 | 25 | 11 | 0 | |
| 194 | Ubuntu 21.10 | 21.10 | Oct. 14, 2021 | Oct. 14, 2021 | June 14, 2022 | June 14, 2022 | 1 | 18 | 19 | 0 | |
| 195 | Ubuntu 21.04 | 21.04 | April 22, 2021 | April 22, 2021 | Jan. 30, 2022 | 0 | 12 | 11 | 0 | ||
| 196 | Ubuntu 20.10 | 20.10 | Oct. 22, 2020 | Oct. 22, 2020 | July 30, 2021 | 0 | 5 | 13 | 1 | ||
| 197 | Ubuntu 20.04 LTS | 20.04.6 | March 23, 2023 | April 23, 2020 | April 30, 2025 | April 30, 2030 | 21 | 144 | 239 | 32 | |
| 198 | Ubuntu 19.10 | Oct. 17, 2019 | July 30, 2020 | 32 | 133 | 227 | 44 | ||||
| 199 | Ubuntu 19.04 | April 18, 2019 | Jan. 30, 2020 | 45 | 126 | 184 | 23 | ||||
| 200 | Ubuntu 18.10 | Oct. 18, 2018 | July 31, 2019 | 66 | 174 | 182 | 5 | ||||
| 201 | Ubuntu 18.04 LTS | 18.04.6 | Sept. 17, 2021 | April 26, 2018 | April 30, 2023 | April 30, 2028 | 202 | 645 | 891 | 80 | |
| 202 | Ubuntu 17.10 | Oct. 18, 2017 | July 19, 2018 | 4 | 18 | 14 | 0 | ||||
| 203 | Ubuntu 17.04 | April 13, 2017 | July 20, 2017 | 4 | 18 | 14 | 0 | ||||
| 204 | Ubuntu 16.10 | Oct. 13, 2016 | July 28, 2016 | 6 | 24 | 8 | 0 | ||||
| 205 | Ubuntu 16.04 LTS | 16.04.7 | Aug. 13, 2020 | April 21, 2016 | April 30, 2021 | April 30, 2024 | 239 | 852 | 1060 | 83 | |
| 206 | Ubuntu 15.10 | Oct. 22, 2015 | Feb. 4, 2016 | 20 | 148 | 162 | 24 | ||||
| 207 | Ubuntu 15.04 | April 23, 2015 | July 23, 2015 | 5 | 100 | 130 | 29 | ||||
| 208 | Ubuntu 14.10 | Oct. 23, 2014 | July 14, 2014 | 0 | 3 | 1 | 0 | ||||
| 209 | Ubuntu 14.04 LTS | 14.04.6 | March 7, 2019 | April 17, 2014 | April 30, 2019 | April 30, 2022 | 216 | 844 | 1015 | 82 | |
| 210 | Ubuntu 13.10 | Oct. 17, 2013 | July 14, 2014 | 15 | 56 | 68 | 15 | ||||
| 211 | Ubuntu 13.04 | April 25, 2013 | Jan. 27, 2014 | 6 | 16 | 60 | 9 | ||||
| 212 | Ubuntu 12.04 LTS | April 26, 2012 | April 28, 2017 | April 30, 2019 | 90 | 577 | 669 | 83 | |||
| 213 | Ubuntu 11.10 | Oct. 13, 2011 | May 9, 2013 | 1 | 111 | 108 | 13 | ||||
| 214 | Ubuntu 11.04 | April 28, 2011 | Oct. 28, 2012 | 1 | 56 | 56 | 8 | ||||
| 215 | Ubuntu 10.10 | Oct. 10, 2010 | April 10, 2012 | 2 | 47 | 52 | 17 | ||||
| 216 | Ubuntu 9.10 | Oct. 29, 2009 | April 30, 2011 | 5 | 56 | 56 | 16 | ||||
| 217 | Ubuntu 9.04 | April 23, 2009 | Oct. 23, 2010 | 3 | 46 | 57 | 8 | ||||
| 218 | Ubuntu 8.10 | Oct. 30, 2008 | April 30, 2010 | 2 | 49 | 47 | 6 | ||||
| 219 | Ubuntu 8.04 LTS | 8.04.4 | Jan. 28, 2010 | April 24, 2008 | May 9, 2013 | 7 | 99 | 119 | 18 | ||
| 220 | Ubuntu 7.10 | Oct. 18, 2007 | April 18, 2009 | 3 | 48 | 37 | 5 | ||||
| 221 | Ubuntu 7.04 | April 19, 2007 | Oct. 19, 2008 | 4 | 46 | 28 | 4 | ||||
| 222 | Ubuntu 6.10 | Oct. 26, 2006 | April 26, 2008 | 2 | 33 | 32 | 4 | ||||
| 223 | Ubuntu 5.10 | Oct. 13, 2005 | April 13, 2007 | 0 | 22 | 19 | 1 | ||||
| 224 | Ubuntu 5.04 | April 8, 2005 | Oct. 31, 2006 | 0 | 14 | 13 | 2 | ||||
| 225 | Ubuntu 4.10 | Oct. 20, 2004 | April 30, 2006 | 1 | 13 | 8 | 2 |
| No | CVSS3 CVSS2 |
Level Attach Vector |
Title | CWE | CVE | cpe23Uri | or higher | or less | more than | less than | Update date Published date |
Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 191 |
8.8 9.3 |
HIGH
Network |
JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only … |
CWE-843
Type Confusion |
CVE-2020-15656 |
cpe:2.3:o:canonical:ubuntu_linux:20.04:* cpe:2.3:o:canonical:ubuntu_linux:18.04:* cpe:2.3:o:canonical:ubuntu_linu… |
2024-11-21 14:05 2020-08-11 |
Show | GitHub Exploit DB Packet Storm | ||||
| 192 |
6.5 4.3 |
MEDIUM
Network |
A redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information. This vulnerability affe… |
NVD-CWE-noinfo
|
CVE-2020-15655 |
cpe:2.3:o:canonical:ubuntu_linux:20.04:* cpe:2.3:o:canonical:ubuntu_linux:18.04:* cpe:2.3:o:canonical:ubuntu_linu… |
2024-11-21 14:05 2020-08-11 |
Show | GitHub Exploit DB Packet Storm | ||||
| 193 |
6.5 4.3 |
MEDIUM
Network |
When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived brok… |
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop') |
CVE-2020-15654 |
cpe:2.3:o:canonical:ubuntu_linux:20.04:* cpe:2.3:o:canonical:ubuntu_linux:18.04:* cpe:2.3:o:canonical:ubuntu_linu… |
2024-11-21 14:05 2020-08-11 |
Show | GitHub Exploit DB Packet Storm | ||||
| 194 |
6.5 4.3 |
MEDIUM
Network |
An iframe sandbox element with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed po… |
NVD-CWE-Other
|
CVE-2020-15653 |
cpe:2.3:o:canonical:ubuntu_linux:20.04:* cpe:2.3:o:canonical:ubuntu_linux:18.04:* cpe:2.3:o:canonical:ubuntu_linu… |
2024-11-21 14:05 2020-08-11 |
Show | GitHub Exploit DB Packet Storm | ||||
| 195 |
6.5 4.3 |
MEDIUM
Network |
By observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect. This applied only to content that can be parsed as script. This vulne… |
CWE-346
Origin Validation Error |
CVE-2020-15652 |
cpe:2.3:o:canonical:ubuntu_linux:20.04:* cpe:2.3:o:canonical:ubuntu_linux:18.04:* cpe:2.3:o:canonical:ubuntu_linu… |
2024-11-21 14:05 2020-08-11 |
Show | GitHub Exploit DB Packet Storm | ||||
| 196 |
7.5 5.0 |
HIGH
Network |
Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resou… |
CWE-444
HTTP Request Smuggling |
CVE-2020-9490 |
cpe:2.3:o:canonical:ubuntu_linux:20.04:* cpe:2.3:o:canonical:ubuntu_linux:18.04:* cpe:2.3:o:canonical:ubuntu_linu… |
2024-11-21 14:40 2020-08-8 |
Show | GitHub Exploit DB Packet Storm | ||||
| 197 |
7.5 4.3 |
HIGH
Network |
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing con… |
CWE-444
HTTP Request Smuggling |
CVE-2020-11993 |
cpe:2.3:o:canonical:ubuntu_linux:20.04:* cpe:2.3:o:canonical:ubuntu_linux:18.04:* cpe:2.3:o:canonical:ubuntu_linu… |
2024-11-21 13:59 2020-08-8 |
Show | GitHub Exploit DB Packet Storm | ||||
| 198 |
9.8 7.5 |
CRITICAL
Network |
Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE |
CWE-120
Classic Buffer Overflow |
CVE-2020-11984 |
cpe:2.3:o:canonical:ubuntu_linux:20.04:* cpe:2.3:o:canonical:ubuntu_linux:18.04:* cpe:2.3:o:canonical:ubuntu_linu… |
2024-11-21 13:59 2020-08-8 |
Show | GitHub Exploit DB Packet Storm | ||||
| 199 |
7.0 4.4 |
HIGH
Local |
TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a … |
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition |
CVE-2020-15702 | cpe:2.3:o:canonical:ubuntu_linux:14.04:* |
2024-11-21 14:06 2020-08-7 |
Show | GitHub Exploit DB Packet Storm | ||||
| 200 |
5.5 2.1 |
MEDIUM
Local |
An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will… |
CWE-755
Improper Handling of Exceptional Conditions |
CVE-2020-15701 |
cpe:2.3:o:canonical:ubuntu_linux:20.04:* cpe:2.3:o:canonical:ubuntu_linux:18.04:* cpe:2.3:o:canonical:ubuntu_linu… |
2024-11-21 14:06 2020-08-7 |
Show | GitHub Exploit DB Packet Storm |