Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian advanced package tool vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-6273
Buffer overflow in the HTTP transport code in apt-get in APT 1.0.1 and previous versions allows man-in-the-middle malicious users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted URL.
Debian Advanced Package Tool
NA
CVE-2014-0478
APT prior to 1.0.4 does not properly validate source packages, which allows man-in-the-middle malicious users to download and install Trojan horse packages by removing the Release signature.
Debian Advanced Package Tool
NA
CVE-2009-1300
apt 0.7.20 does not check when the date command returns an "invalid date" error, which can prevent apt from loading security updates in time zones for which DST occurs at midnight.
Debian Advanced Package Tool 0.7.20
NA
CVE-2012-0961
Apt 0.8.16~exp5ubuntu13.x prior to 0.8.16~exp5ubuntu13.6, 0.8.16~exp12ubuntu10.x prior to 0.8.16~exp12ubuntu10.7, and 0.9.7.5ubuntu5.x prior to 0.9.7.5ubuntu5.2, as used in Ubuntu, uses world-readable permissions for /var/log/apt/term.log, which allows local users to obtain sensi...
Debian Apt 0.9.7
Debian Advanced Package Tool 0.8.16
NA
CVE-2011-1829
APT prior to 0.8.15.2 does not properly validate inline GPG signatures, which allows man-in-the-middle malicious users to install modified packages via vectors involving lack of an initial clearsigned message.
Debian Advanced Package Tool
Canonical Ubuntu Linux 11.04
5.7
CVSSv3
CVE-2020-27350
APT had several integer overflows and underflows while parsing .deb packages, aka GHSL-2020-168 GHSL-2020-169, in files apt-pkg/contrib/extracttar.cc, apt-pkg/deb/debfile.cc, and apt-pkg/contrib/arfile.cc. This issue affects: apt 1.2.32ubuntu0 versions before 1.2.32ubuntu0.2; 1.6...
Debian Advanced Package Tool
Netapp Solidfire Baseboard Management Controller Firmware -
1 Github repository
3.7
CVSSv3
CVE-2011-3374
It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.
Debian Advanced Package Tool
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
8 Github repositories
NA
CVE-2009-1358
apt-get in apt prior to 0.7.21 does not check for the correct error code from gpgv, which causes apt to treat a repository as valid even when it has been signed with a key that has been revoked or expired, which might allow remote malicious users to trick apt into installing mali...
Debian Apt 0.7.5
Debian Apt 0.3.12
Debian Apt 0.5.28
Debian Apt 0.7.7
Debian Apt 0.6.12
Debian Apt 0.3.13
Debian Apt 0.6.14
Debian Apt 0.6.27
Debian Apt 0.7.6
Debian Apt 0.6.46.3-0.1
Debian Apt 0.1.5
Debian Apt 0.0.13-bo1
Debian Apt 0.5.8
Debian Apt 0.6.17
Debian Apt 0.6.1
Debian Apt 0.6.43.3
Debian Apt 0.0.10
Debian Apt 0.6.36
Debian Apt 0.6.10
Debian Apt 0.3.3
Debian Apt 0.6.42
Debian Apt 0.6.11
5.9
CVSSv3
CVE-2016-1252
The apt package in Debian jessie prior to 1.0.9.8.4, in Debian unstable prior to 1.4~beta2, in Ubuntu 14.04 LTS prior to 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS prior to 1.2.15ubuntu0.2, and in Ubuntu 16.10 prior to 1.3.2ubuntu0.1 allows man-in-the-middle malicious users to bypass a...
Debian Advanced Package Tool
Canonical Ubuntu Linux 16.10
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
1 EDB exploit
5 Github repositories
NA
CVE-2013-1051
apt 0.8.16, 0.9.7, and possibly other versions does not properly handle InRelease files, which allows man-in-the-middle malicious users to modify packages before installation via unknown vectors, possibly related to integrity checking and the use of third-party repositories.
Debian Apt 0.9.7
Debian Advanced Package Tool 0.8.16
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 12.04
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
malicious code
XML injection
CVE-2024-28020
CVE-2024-35252
CVE-2024-5833
CVE-2024-30066
injection
CVE-2024-23282
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »