Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
advanced package tool advanced package tool vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2012-0214
The pkgAcqMetaClearSig::Failed method in apt-pkg/acquire-item.cc in Advanced Package Tool (APT) 0.8.11 up to and including 0.8.15.10 and 0.8.16 prior to 0.8.16~exp13, when updating from repositories that use InRelease files, allows man-in-the-middle malicious users to install arb...
Advanced Package Tool Advanced Package Tool 0.8.13
Advanced Package Tool Advanced Package Tool 0.8.14
Advanced Package Tool Advanced Package Tool 0.8.15
Advanced Package Tool Advanced Package Tool
Advanced Package Tool Advanced Package Tool 0.8.12
Advanced Package Tool Advanced Package Tool 0.8.11
2.6
CVSSv2
CVE-2012-3587
APT 0.7.x prior to 0.7.25 and 0.8.x prior to 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote malicious users to install Trojan horse packages via a man-in-the-middle (MITM) attac...
Debian Advanced Package Tool 0.7.21
Debian Advanced Package Tool 0.7.20.2
Debian Advanced Package Tool 0.7.20.1
Debian Advanced Package Tool 0.7.20
Debian Advanced Package Tool 0.7.15
Debian Advanced Package Tool 0.7.14
Debian Advanced Package Tool 0.7.13
Debian Advanced Package Tool 0.8.15.1
Debian Advanced Package Tool 0.8.15
Debian Advanced Package Tool 0.8.14.1
Debian Advanced Package Tool 0.8.14
Debian Advanced Package Tool 0.8.10
Debian Advanced Package Tool 0.8.1
Debian Advanced Package Tool 0.8.0
Debian Advanced Package Tool 0.7.23.1
Debian Advanced Package Tool 0.7.22.2
Debian Advanced Package Tool 0.7.22
Debian Advanced Package Tool 0.7.2-0.1
Debian Advanced Package Tool 0.7.19
Debian Advanced Package Tool 0.7.16
Debian Advanced Package Tool 0.7.12
Debian Advanced Package Tool 0.7.10
2.6
CVSSv2
CVE-2012-0954
APT 0.7.x prior to 0.7.25 and 0.8.x prior to 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote malicious users to install altered packages via a man-in-the-middle (MITM) attack. NO...
Debian Advanced Package Tool 0.7.24
Debian Advanced Package Tool 0.7.23.1
Debian Advanced Package Tool 0.7.23
Debian Advanced Package Tool 0.7.22.2
Debian Advanced Package Tool 0.7.17
Debian Advanced Package Tool 0.7.16
Debian Advanced Package Tool 0.7.15
Debian Advanced Package Tool 0.8.15.8
Debian Advanced Package Tool 0.8.15.7
Debian Advanced Package Tool 0.8.15.6
Debian Advanced Package Tool 0.8.15
Debian Advanced Package Tool 0.8.11.2
Debian Advanced Package Tool 0.8.11.1
Debian Advanced Package Tool 0.8.11
Debian Advanced Package Tool 0.8.10.3
Debian Advanced Package Tool 0.7.22.1
Debian Advanced Package Tool 0.7.21
Debian Advanced Package Tool 0.7.18
Debian Advanced Package Tool 0.7.14
Debian Advanced Package Tool 0.7.1
Debian Advanced Package Tool 0.8.15.10
Debian Advanced Package Tool 0.8.11.5
7.5
CVSSv2
CVE-2014-0489
APT prior to 1.0.9, when the Acquire::GzipIndexes option is enabled, does not validate checksums, which allows remote malicious users to execute arbitrary code via a crafted package.
Debian Advanced Package Tool 1.0.5
Debian Advanced Package Tool 1.0.3
Debian Advanced Package Tool 1.0.7
2.6
CVSSv2
CVE-2011-3634
methods/https.cc in apt prior to 0.8.11 accepts connections when the certificate host name fails validation and Verify-Host is enabled, which allows man-in-the-middle malicious users to obtain repository credentials via unspecified vectors.
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 10.04
Debian Advanced Package Tool 0.8.0
Debian Advanced Package Tool 0.8.1
Debian Advanced Package Tool 0.8.10
Debian Advanced Package Tool 0.8.10.1
Debian Advanced Package Tool 0.8.10.2
Debian Advanced Package Tool
7.5
CVSSv2
CVE-2014-0487
APT prior to 1.0.9 does not verify downloaded files if they have been modified as indicated using the If-Modified-Since header, which has unspecified impact and attack vectors.
Debian Advanced Package Tool 1.0.3
Debian Advanced Package Tool 1.0.7
1 Article
6.8
CVSSv2
CVE-2014-0488
APT prior to 1.0.9 does not "invalidate repository data" when moving from an unauthenticated to authenticated state, which allows remote malicious users to have unspecified impact via crafted repository data.
Debian Advanced Package Tool 1.0.3
Debian Advanced Package Tool 1.0.7
4.3
CVSSv2
CVE-2018-0501
The mirror:// method implementation in Advanced Package Tool (APT) 1.6.x prior to 1.6.4 and 1.7.x prior to 1.7.0~alpha3 mishandles gpg signature verification for the InRelease file of a fallback mirror, aka mirrorfail.
Canonical Ubuntu Linux 18.04
Debian Advanced Package Tool
Debian Advanced Package Tool 1.7.0
3.6
CVSSv2
CVE-2014-7206
The changelog command in Apt prior to 1.0.9.2 allows local users to write to arbitrary files via a symlink attack on the changelog file.
Debian Apt 1.0.9
Debian Advanced Package Tool
Debian Apt 0.9.7.9
Debian Advanced Package Tool 1.0.8
4
CVSSv2
CVE-2014-0478
APT prior to 1.0.4 does not properly validate source packages, which allows man-in-the-middle malicious users to download and install Trojan horse packages by removing the Release signature.
Debian Advanced Package Tool
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »