Lucene search

K

5 matches found

CVE
CVE
added 2020/05/15 2:15 p.m.233 views

CVE-2020-3810

Missing input validation in the ar/tar implementations of APT before version 2.1.2 could result in denial of service when processing specially crafted deb files.

5.5CVSS5.2AI score0.00443EPSS
CVE
CVE
added 2014/10/15 2:55 p.m.64 views

CVE-2014-7206

The changelog command in Apt before 1.0.9.2 allows local users to write to arbitrary files via a symlink attack on the changelog file.

3.6CVSS6.2AI score0.00048EPSS
CVE
CVE
added 2009/04/21 11:30 p.m.62 views

CVE-2009-1358

apt-get in apt before 0.7.21 does not check for the correct error code from gpgv, which causes apt to treat a repository as valid even when it has been signed with a key that has been revoked or expired, which might allow remote attackers to trick apt into installing malicious repositories.

10CVSS6.8AI score0.01368EPSS
CVE
CVE
added 2012/12/26 10:55 p.m.57 views

CVE-2012-0961

Apt 0.8.16~exp5ubuntu13.x before 0.8.16~exp5ubuntu13.6, 0.8.16~exp12ubuntu10.x before 0.8.16~exp12ubuntu10.7, and 0.9.7.5ubuntu5.x before 0.9.7.5ubuntu5.2, as used in Ubuntu, uses world-readable permissions for /var/log/apt/term.log, which allows local users to obtain sensitive shell information by...

2.1CVSS5.8AI score0.00052EPSS
CVE
CVE
added 2013/03/21 5:55 p.m.57 views

CVE-2013-1051

apt 0.8.16, 0.9.7, and possibly other versions does not properly handle InRelease files, which allows man-in-the-middle attackers to modify packages before installation via unknown vectors, possibly related to integrity checking and the use of third-party repositories.

4.3CVSS6.4AI score0.00125EPSS