Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
abrt vulnerabilities and exploits
(subscribe to this query)
6.9
CVSSv2
CVE-2015-1862
The crash reporting feature in Abrt allows local users to gain privileges by leveraging an execve by root after a chroot into a user-specified directory in a namedspaced environment.
Abrt Project Abrt
2 EDB exploits
5
CVSSv2
CVE-2011-4088
ABRT might allow malicious users to obtain sensitive information from crash reports.
Abrt Project Abrt 2.0.6
Fedoraproject Fedora 16
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
7.2
CVSSv2
CVE-2015-1318
The crash reporting feature in Apport 2.13 up to and including 2.17.x prior to 2.17.1 allows local users to gain privileges via a crafted usr/share/apport/apport file in a namespace (container).
Apport Project Apport 2.13.3
Apport Project Apport 2.14
Apport Project Apport 2.14.1
Apport Project Apport 2.15
Apport Project Apport 2.15.1
Apport Project Apport 2.14.2
Apport Project Apport 2.14.3
Apport Project Apport 2.16
Apport Project Apport 2.16.1
Apport Project Apport 2.13.1
Apport Project Apport 2.13.2
Apport Project Apport 2.14.6
Apport Project Apport 2.14.7
Apport Project Apport 2.13
Apport Project Apport 2.14.4
Apport Project Apport 2.14.5
Apport Project Apport 2.16.2
Apport Project Apport 2.17
3 EDB exploits
1 Github repository
3.7
CVSSv2
CVE-2012-5659
Untrusted search path vulnerability in plugins/abrt-action-install-debuginfo-to-abrt-cache.c in Automatic Bug Reporting Tool (ABRT) 2.0.9 and previous versions allows local users to load and execute arbitrary Python modules by modifying the PYTHONPATH environment variable to refe...
Redhat Automatic Bug Reporting Tool 2.0.4.980
Redhat Automatic Bug Reporting Tool 2.0.4
Redhat Automatic Bug Reporting Tool 2.0.3
Redhat Automatic Bug Reporting Tool 2.0.2
Redhat Automatic Bug Reporting Tool
Redhat Automatic Bug Reporting Tool 2.0.8
Redhat Automatic Bug Reporting Tool 2.0.7
Redhat Automatic Bug Reporting Tool 2.0.5
Redhat Automatic Bug Reporting Tool 2.0.0
Redhat Automatic Bug Reporting Tool 2.0.6
Redhat Automatic Bug Reporting Tool 2.0.4.981
Redhat Automatic Bug Reporting Tool 2.0.1
6.9
CVSSv2
CVE-2012-5660
abrt-action-install-debuginfo in Automatic Bug Reporting Tool (ABRT) 2.0.9 and previous versions allows local users to set world-writable permissions for arbitrary files and possibly gain privileges via a symlink attack on "the directories used to store information about cra...
Redhat Automatic Bug Reporting Tool 2.0.6
Redhat Automatic Bug Reporting Tool 2.0.4.981
Redhat Automatic Bug Reporting Tool 2.0.8
Redhat Automatic Bug Reporting Tool
Redhat Automatic Bug Reporting Tool 2.0.5
Redhat Automatic Bug Reporting Tool 2.0.2
Redhat Automatic Bug Reporting Tool 2.0.7
Redhat Automatic Bug Reporting Tool 2.0.4.980
Redhat Automatic Bug Reporting Tool 2.0.1
Redhat Automatic Bug Reporting Tool 2.0.0
Redhat Automatic Bug Reporting Tool 2.0.4
Redhat Automatic Bug Reporting Tool 2.0.3
1.9
CVSSv2
CVE-2012-1106
The C handler plug-in in Automatic Bug Reporting Tool (ABRT), possibly 2.0.8 and previous versions, does not properly set the group (GID) permissions on core dump files for setuid programs when the sysctl fs.suid_dumpable option is set to 2, which allows local users to obtain sen...
Redhat Automatic Bug Reporting Tool
7.2
CVSSv2
CVE-2015-3159
The abrt-action-install-debuginfo-to-abrt-cache help program in Automatic Bug Reporting Tool (ABRT) does not properly handle the process environment before invoking abrt-action-install-debuginfo, which allows local users to gain privileges.
Redhat Automatic Bug Reporting Tool -
4.9
CVSSv2
CVE-2015-3147
daemon/abrt-handle-upload.in in Automatic Bug Reporting Tool (ABRT), when moving problem reports from /var/spool/abrt-upload, allows local users to write to arbitrary files or possibly have other unspecified impact via a symlink attack on (1) /var/spool/abrt or (2) /var/tmp/abrt.
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Automatic Bug Reporting Tool -
Redhat Enterprise Linux Server Eus 7.2
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Server Tus 7.3
Redhat Enterprise Linux Server Aus 7.3
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Server Eus 7.3
Redhat Enterprise Linux Server Eus 7.4
Redhat Enterprise Linux Server Eus 7.5
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Server Eus 7.7
Redhat Enterprise Linux Server Aus 7.7
Redhat Enterprise Linux Server Tus 7.7
7.2
CVSSv2
CVE-2015-3151
Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.
Redhat Automatic Bug Reporting Tool -
7.2
CVSSv2
CVE-2015-3150
abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to delete or change the ownership of arbitrary files via the problem directory argument to the (1) ChownProblemDir, (2) DeleteElement, or (3) DeleteProblem method.
Redhat Automatic Bug Reporting Tool -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »