| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-5467 | Ubuntu Apport Insecure File Permissions Vulnerability | Canonical | apport | - | - | 2025-12-10 18:00:36 | Deep Dive |
| CVE-2025-5054 | Race Condition in Canonical Apport | Canonical | Apport | Medium | 4.7 | 2025-05-30 17:37:01 | Deep Dive |
| CVE-2020-11936 | Apport 安全漏洞 | Canonical Ltd. | Apport | Low | 3.1 | 2025-01-31 01:18:22 | Deep Dive |
| CVE-2022-28653 | Apport 安全漏洞 | Canonical Ltd. | Apport | 中危 | - | 2025-01-31 00:50:50 | Deep Dive |
| CVE-2022-28658 | Canonical Apport 品安全漏洞 | Canonical Ltd. | Apport | - | - | 2024-06-04 22:03:54 | Deep Dive |
| CVE-2022-28657 | Canonical Apport 安全特征问题漏洞 | Canonical Ltd. | Apport | 中危 | - | 2024-06-04 22:02:26 | Deep Dive |
| CVE-2022-28656 | Canonical Apport 安全漏洞 | Canonical Ltd. | Apport | 中危 | - | 2024-06-04 21:58:45 | Deep Dive |
| CVE-2022-28655 | Canonical Apport 安全特征问题漏洞 | Canonical Ltd. | Apport | 低危 | - | 2024-06-04 21:56:51 | Deep Dive |
| CVE-2022-28654 | Canonical Apport 安全漏洞 | Canonical Ltd. | Apport | 中危 | - | 2024-06-04 21:54:37 | Deep Dive |
| CVE-2022-28652 | Canonical Apport 资源管理错误漏洞 | Canonical Ltd. | Apport | 中危 | - | 2024-06-04 21:38:44 | Deep Dive |
| CVE-2022-1242 | Canonical Apport 安全特征问题漏洞 | Canonical Ltd. | Apport | 低危 | - | 2024-06-03 18:48:02 | Deep Dive |
| CVE-2021-3899 | Canonical Apport 竞争条件问题漏洞 | Canonical Ltd. | Apport | 高危 | - | 2024-06-03 18:40:33 | Deep Dive |
| CVE-2023-1326 | local privilege escalation in apport-cli | Canonical Ltd. | Apport | High | 7.7 | 2023-04-13 22:35:20 | Deep Dive |
| CVE-2021-3710 | Apport info disclosure via path traversal bug in read_file | Canonical | apport | Medium | 6.5 | 2021-10-01 02:35:23 | Deep Dive |
| CVE-2021-3709 | Apport file permission bypass through emacs byte compilation errors | Canonical | apport | Medium | 6.5 | 2021-10-01 02:35:21 | Deep Dive |
| CVE-2021-32556 | apport get_modified_conffiles() function command injection | Canonical | apport | Low | 3.8 | 2021-06-12 03:40:43 | Deep Dive |
| CVE-2021-32557 | apport process_report() arbitrary file write | Canonical | apport | Medium | 5.2 | 2021-06-12 03:40:43 | Deep Dive |
| CVE-2021-32555 | apport read_file() function could follow maliciously constructed symbolic links | Canonical | apport | High | 7.3 | 2021-06-12 03:40:42 | Deep Dive |
| CVE-2021-32554 | apport read_file() function could follow maliciously constructed symbolic links | Canonical | apport | High | 7.3 | 2021-06-12 03:40:41 | Deep Dive |
| CVE-2021-32553 | apport read_file() function could follow maliciously constructed symbolic links | Canonical | apport | High | 7.3 | 2021-06-12 03:40:41 | Deep Dive |