canonical ltd. Apport Vulnerabilities
Canonical%20ltd. Apport vulnerabilities.
Vulnerability Published:
- ποΈ Published - - Anytime 
Sort By:
- ποΈ Published Date - - Descending 
- Privilege Escalation Vulnerability in gdbus by UbuntuCVE-2020-11936Canonical Ltd.Apport3.1LOW
- Disk Space Consumption Vulnerability in System Crash Logs by Vendor ACVE-2022-28653Canonical Ltd.Apport7.5HIGH
- Apport Settings Vulnerable to 'Billion Laughs' AttackCVE-2022-28652Canonical Ltd.Apport5.5MEDIUM
- Log Overflow Vulnerability in Ubuntu's Apport Logging SystemCVE-2022-28654Canonical Ltd.Apport5.5MEDIUM
- Arbitrary TCP DBus Connections Possible with is_closing_session()CVE-2022-28655Canonical Ltd.Apport7.1HIGH
- Apport's is_closing_session() Function Allows RAM Consumption in Apport ProcessCVE-2022-28656Canonical Ltd.Apport5.5MEDIUM
- Apport Disables Python Crash Handler Before Entering ChrootCVE-2022-28657Canonical Ltd.Apport7.8HIGH
- Argument Spoofing Vulnerability in Apport's Filename SplittingCVE-2022-28658Canonical Ltd.Apport5.5MEDIUM
- Apport Vulnerability Allows Arbitrary Socket Connections as RootCVE-2022-1242Canonical Ltd.Apport7.8HIGH
- Race Condition in Replaced Executable Detection Allows Arbitrary Code Execution as RootCVE-2021-3899Canonical Ltd.Apport
- local privilege escalation in apport-cliCVE-2023-1326Canonical Ltd.ApportπΎπ‘7.7HIGH
