Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apport project apport 2.14.1 vulnerabilities and exploits
(subscribe to this query)
7
CVSSv3
CVE-2019-7307
Apport prior to 2.14.1-0ubuntu3.29+esm1, 2.20.1-0ubuntu2.19, 2.20.9-0ubuntu7.7, 2.20.10-0ubuntu27.1, 2.20.11-0ubuntu5 contained a TOCTTOU vulnerability when reading the users ~/.apport-ignore.xml file, which allows a local malicious user to replace this file with a symlink to any...
Apport Project Apport 2.14.1
Apport Project Apport 2.20.1
Apport Project Apport 2.20.9
Apport Project Apport 2.20.10
7.8
CVSSv3
CVE-2018-6552
Apport does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privileges, or escape from containers. The is_...
Apport Project Apport 2.14.1
Apport Project Apport 2.20.9
Apport Project Apport 2.20.7
Apport Project Apport 2.20.1
NA
CVE-2015-1318
The crash reporting feature in Apport 2.13 up to and including 2.17.x prior to 2.17.1 allows local users to gain privileges via a crafted usr/share/apport/apport file in a namespace (container).
Apport Project Apport 2.15.1
Apport Project Apport 2.16
Apport Project Apport 2.16.2
Apport Project Apport 2.14.3
Apport Project Apport 2.14.5
Apport Project Apport 2.15
Apport Project Apport 2.13
Apport Project Apport 2.16.1
Apport Project Apport 2.14.2
Apport Project Apport 2.13.2
Apport Project Apport 2.14.7
Apport Project Apport 2.13.1
Apport Project Apport 2.14.4
Apport Project Apport 2.13.3
Apport Project Apport 2.14.6
Apport Project Apport 2.17
Apport Project Apport 2.14.1
Apport Project Apport 2.14
3 EDB exploits
1 Github repository
3.3
CVSSv3
CVE-2019-15790
Apport reads and writes information on a crashed process to /proc/pid with elevated privileges. Apport then determines which user the crashed process belongs to by reading /proc/pid through get_pid_info() in data/apport. An unprivileged user could exploit this to read information...
Apport Project Apport -
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 19.10
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started