Lucene search

K
DebianAdvanced Package Tool

8 matches found

CVE
CVE
added 2014/11/03 10:55 p.m.73 views

CVE-2014-0487

APT before 1.0.9 does not verify downloaded files if they have been modified as indicated using the If-Modified-Since header, which has unspecified impact and attack vectors.

7.5CVSS6.5AI score0.00121EPSS
CVE
CVE
added 2014/09/30 2:55 p.m.69 views

CVE-2014-6273

Buffer overflow in the HTTP transport code in apt-get in APT 1.0.1 and earlier allows man-in-the-middle attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted URL.

6.8CVSS9.5AI score0.00677EPSS
CVE
CVE
added 2014/10/15 2:55 p.m.64 views

CVE-2014-7206

The changelog command in Apt before 1.0.9.2 allows local users to write to arbitrary files via a symlink attack on the changelog file.

3.6CVSS6.2AI score0.00048EPSS
CVE
CVE
added 2014/03/01 12:55 a.m.59 views

CVE-2011-3634

methods/https.cc in apt before 0.8.11 accepts connections when the certificate host name fails validation and Verify-Host is enabled, which allows man-in-the-middle attackers to obtain repository credentials via unspecified vectors.

2.6CVSS6.2AI score0.00163EPSS
CVE
CVE
added 2014/11/03 10:55 p.m.55 views

CVE-2014-0489

APT before 1.0.9, when the Acquire::GzipIndexes option is enabled, does not validate checksums, which allows remote attackers to execute arbitrary code via a crafted package.

7.5CVSS7.5AI score0.00688EPSS
CVE
CVE
added 2014/06/17 2:55 p.m.54 views

CVE-2014-0478

APT before 1.0.4 does not properly validate source packages, which allows man-in-the-middle attackers to download and install Trojan horse packages by removing the Release signature.

4CVSS6.2AI score0.0023EPSS
CVE
CVE
added 2014/11/03 10:55 p.m.54 views

CVE-2014-0488

APT before 1.0.9 does not "invalidate repository data" when moving from an unauthenticated to authenticated state, which allows remote attackers to have unspecified impact via crafted repository data.

6.8CVSS6.8AI score0.00202EPSS
CVE
CVE
added 2014/11/03 10:55 p.m.54 views

CVE-2014-0490

The apt-get download command in APT before 1.0.9 does not properly validate signatures for packages, which allows remote attackers to execute arbitrary code via a crafted package.

7.5CVSS7.6AI score0.00688EPSS