Vulnerabilities > Canonical > Apport > 2.19.1.0ubuntu3
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-04-13 | CVE-2023-1326 | Improper Privilege Management vulnerability in Canonical Apport A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. | 7.8 |
2020-08-06 | CVE-2020-15702 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Canonical Apport TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. | 7.0 |
2020-08-06 | CVE-2020-15701 | Improper Handling of Exceptional Conditions vulnerability in Canonical Apport An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. | 5.5 |
2019-04-22 | CVE-2015-1341 | Permissions, Privileges, and Access Controls vulnerability in Canonical Apport and Ubuntu Linux Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Apport before 2.19.2 function _python_module_path. | 7.8 |