Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apt vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2020-15703
There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. T...
Aptdaemon Project Aptdaemon 1.1.1
2.1
CVSSv2
CVE-2020-15709
Versions of add-apt-repository prior to 0.98.9.2, 0.96.24.32.14, 0.96.20.10, and 0.92.37.8ubuntu0.1~esm1, printed a PPA (personal package archive) description to the terminal as-is, which allowed PPA owners to provide ANSI terminal escapes to modify terminal contents in unexpecte...
Canonical Add-apt-repository
7.6
CVSSv2
CVE-2020-1380
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who...
Microsoft Internet Explorer 11
5 Articles
7.2
CVSSv2
CVE-2020-0986
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-...
Microsoft Windows Server 2012 R2
Microsoft Windows 10 1607
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
Microsoft Windows 10 1709
Microsoft Windows 10 1803
Microsoft Windows Server 2016 1803
Microsoft Windows 10 1809
Microsoft Windows 10 1903
Microsoft Windows 10 1909
Microsoft Windows 10 2004
Microsoft Windows Server 2016 1903
Microsoft Windows Server 2016 1909
Microsoft Windows Server 2016 2004
Microsoft Windows Server 2019 -
4 Articles
3.5
CVSSv2
CVE-2020-11091
In Weave Net before version 2.6.3, an attacker able to run a process as root in a container is able to respond to DNS requests from the host and thereby insert themselves as a fake service. In a cluster with an IPv4 internal network, if IPv6 is not totally disabled on the host (v...
Weave Weave Net
4.3
CVSSv2
CVE-2020-3810
Missing input validation in the ar/tar implementations of APT before version 2.1.2 could result in denial of service when processing specially crafted deb files.
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Apt
Fedoraproject Fedora 32
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 12.04
6.8
CVSSv2
CVE-2019-11480
The pc-kernel snap build process hardcoded the --allow-insecure-repositories and --allow-unauthenticated apt options when creating the build chroot environment. This could allow an attacker who is able to perform a MITM attack between the build environment and the Ubuntu archive ...
Canonical C-kernel
2.6
CVSSv2
CVE-2019-15795
python-apt only checks the MD5 sums of downloaded files in `Version.fetch_binary()` and `Version.fetch_source()` of apt/package.py in version 1.9.0ubuntu1 and previous versions. This allows a man-in-the-middle attack which could potentially be used to install altered packages and...
Ubuntu Python-apt 0.8.0
Ubuntu Python-apt 0.8.1
Ubuntu Python-apt 0.8.3
Ubuntu Python-apt 0.8.9.1
Ubuntu Python-apt 0.9.0
Ubuntu Python-apt 0.9.1
Ubuntu Python-apt 0.9.3.1
Ubuntu Python-apt 0.9.3.2
Ubuntu Python-apt 0.9.3.3
Ubuntu Python-apt 0.9.3.4
Ubuntu Python-apt 0.9.3.5
Ubuntu Python-apt 1.0.1
Ubuntu Python-apt 1.1.0
Debian Python-apt 1.8.4
Ubuntu Python-apt 1.4.0
Ubuntu Python-apt 1.6.0
Ubuntu Python-apt 1.6.1
Ubuntu Python-apt 1.6.2
Ubuntu Python-apt 1.6.3
Ubuntu Python-apt 1.6.4
Ubuntu Python-apt 1.8.4
Ubuntu Python-apt 1.9.0
2.6
CVSSv2
CVE-2019-15796
Python-apt doesn't check if hashes are signed in `Version.fetch_binary()` and `Version.fetch_source()` of apt/package.py or in `_fetch_archives()` of apt/cache.py in version 1.9.3ubuntu2 and previous versions. This allows downloads from unsigned repositories which shouldn...
Ubuntu Python-apt 0.8.0
Ubuntu Python-apt 0.8.1
Ubuntu Python-apt 0.8.3
Ubuntu Python-apt 0.8.9.1
Ubuntu Python-apt 0.9.0
Ubuntu Python-apt 0.9.1
Ubuntu Python-apt 0.9.3.1
Ubuntu Python-apt 0.9.3.2
Ubuntu Python-apt 0.9.3.3
Ubuntu Python-apt 0.9.3.4
Ubuntu Python-apt 0.9.3.5
Ubuntu Python-apt 1.0.1
Ubuntu Python-apt 1.1.0
Debian Python-apt 1.8.4
Ubuntu Python-apt 1.4.0
Ubuntu Python-apt 1.6.0
Ubuntu Python-apt 1.6.1
Ubuntu Python-apt 1.6.2
Ubuntu Python-apt 1.6.3
Ubuntu Python-apt 1.6.4
Ubuntu Python-apt 1.8.4
Ubuntu Python-apt 1.9.0
1.9
CVSSv2
CVE-2020-0551
Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/c...
Intel Core I7-6700k -
Intel Atom C2750 -
Intel Celeron N2840 -
Intel Xeon E5-2658 V2 -
Intel Core I7-4500u -
Intel Core I7-3632qm -
Intel Xeon E3-1240 V5 -
Intel Xeon D-1649n -
Intel Xeon D-1633n -
Intel Xeon D-1637 -
Intel Xeon D-1627 -
Intel Xeon D-1623n -
Intel Xeon D-1622 -
Intel Xeon D-1653n -
Intel Xeon D-1602 -
Intel Xeon D-2141i -
Intel Xeon D-2177nt -
Intel Xeon D-2161i -
Intel Xeon D-2143it -
Intel Xeon D-2146nt -
Intel Xeon D-2145nt -
Intel Xeon D-2123it -
17 Github repositories
2 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »