Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apport vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2016-9949
An issue exists in Apport prior to 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote malicious users to execute arbitrary Python code.
Apport Project Apport
Canonical Ubuntu Linux
1 EDB exploit
1 Github repository
1 Article
NA
CVE-2009-1295
Apport prior to 0.108.4 on Ubuntu 8.04 LTS, prior to 0.119.2 on Ubuntu 8.10, and prior to 1.0-0ubuntu5.2 on Ubuntu 9.04 does not properly remove files from the application's crash-report directory, which allows local users to delete arbitrary files via unspecified vectors.
Ubuntu Ubuntu 9.0.4
Apport Apport
Ubuntu Ubuntu 8.0.4 Lts
Ubuntu Ubuntu 8.1.0
3.3
CVSSv3
CVE-2021-32556
It exists that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.
Canonical Apport
7.1
CVSSv3
CVE-2021-32557
It exists that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.
Canonical Apport
7.8
CVSSv3
CVE-2021-25682
It exists that the get_pid_info() function in data/apport did not properly parse the /proc/pid/status file from the kernel.
Canonical Apport
7.8
CVSSv3
CVE-2021-25683
It exists that the get_starttime() function in data/apport did not properly parse the /proc/pid/stat file from the kernel.
Canonical Apport
7.8
CVSSv3
CVE-2021-25684
It exists that apport in data/apport did not properly open a report file to prevent hanging reads on a FIFO.
Canonical Apport
NA
CVE-2015-1338
kernel_crashdump in Apport prior to 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.
Apport Project Apport
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 15.04
1 EDB exploit
5.5
CVSSv3
CVE-2020-8831
Apport creates a world writable lock file with root ownership in the world writable /var/lock/apport directory. If the apport/ directory does not exist (this is not uncommon as /var/lock is a tmpfs), it will create the directory, otherwise it will simply continue execution using ...
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 16.04
Apport Project Apport -
4.7
CVSSv3
CVE-2020-8833
Time-of-check Time-of-use Race Condition vulnerability on crash report ownership change in Apport allows for a possible privilege escalation opportunity. If fs.protected_symlinks is disabled, this can be exploited between the os.open and os.chown calls when the Apport cron script...
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 16.04
Apport Project Apport -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »