CVE-2025-12744
- EPSS 0.02%
- Veröffentlicht 03.12.2025 08:33:06
- Zuletzt bearbeitet 04.12.2025 17:15:08
A flaw was found in the ABRT daemon’s handling of user-supplied mount information.ABRT copies up to 12 characters from an untrusted input and places them directly into a shell command (docker inspect %s) without proper validation. An unprivileged loc...
CVE-2015-1869
- EPSS 0.15%
- Veröffentlicht 14.01.2020 18:15:10
- Zuletzt bearbeitet 21.11.2024 02:26:18
The default event handling scripts in Automatic Bug Reporting Tool (ABRT) allow local users to gain privileges as demonstrated by a symlink attack on a var_log_messages file.
CVE-2015-3147
- EPSS 0.54%
- Veröffentlicht 14.01.2020 18:15:10
- Zuletzt bearbeitet 21.11.2024 02:28:46
daemon/abrt-handle-upload.in in Automatic Bug Reporting Tool (ABRT), when moving problem reports from /var/spool/abrt-upload, allows local users to write to arbitrary files or possibly have other unspecified impact via a symlink attack on (1) /var/sp...
CVE-2015-3150
- EPSS 0.05%
- Veröffentlicht 14.01.2020 18:15:10
- Zuletzt bearbeitet 21.11.2024 02:28:46
abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to delete or change the ownership of arbitrary files via the problem directory argument to the (1) ChownProblemDir, (2) DeleteElement, or (3) DeleteProblem method.
CVE-2015-3151
- EPSS 0.07%
- Veröffentlicht 14.01.2020 18:15:10
- Zuletzt bearbeitet 21.11.2024 02:28:46
Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) Dele...
CVE-2015-3159
- EPSS 0.16%
- Veröffentlicht 14.01.2020 18:15:10
- Zuletzt bearbeitet 21.11.2024 02:28:47
The abrt-action-install-debuginfo-to-abrt-cache help program in Automatic Bug Reporting Tool (ABRT) does not properly handle the process environment before invoking abrt-action-install-debuginfo, which allows local users to gain privileges.
CVE-2013-4209
- EPSS 0.04%
- Veröffentlicht 01.05.2018 19:29:00
- Zuletzt bearbeitet 21.11.2024 01:55:08
Automatic Bug Reporting Tool (ABRT) before 2.1.6 allows local users to obtain sensitive information about arbitrary files via vectors related to sha1sums.
CVE-2015-1870
- EPSS 0.11%
- Veröffentlicht 26.06.2017 15:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The event scripts in Automatic Bug Reporting Tool (ABRT) uses world-readable permission on a copy of sosreport file in problem directories, which allows local users to obtain sensitive information from /var/log/messages via unspecified vectors.
CVE-2015-3142
- EPSS 0.11%
- Veröffentlicht 26.06.2017 15:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The kernel-invoked coredump processor in Automatic Bug Reporting Tool (ABRT) does not properly check the ownership of files before writing core dumps to them, which allows local users to obtain sensitive information by leveraging write permissions to...
CVE-2015-3315
- EPSS 5.52%
- Veröffentlicht 26.06.2017 15:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-r...