CVE-2014-7206
- EPSS 0.05%
- Published 15.10.2014 14:55:09
- Last modified 12.04.2025 10:46:40
The changelog command in Apt before 1.0.9.2 allows local users to write to arbitrary files via a symlink attack on the changelog file.
CVE-2014-6273
- EPSS 0.68%
- Published 30.09.2014 14:55:11
- Last modified 12.04.2025 10:46:40
Buffer overflow in the HTTP transport code in apt-get in APT 1.0.1 and earlier allows man-in-the-middle attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted URL.
- EPSS 0.23%
- Published 17.06.2014 14:55:06
- Last modified 12.04.2025 10:46:40
APT before 1.0.4 does not properly validate source packages, which allows man-in-the-middle attackers to download and install Trojan horse packages by removing the Release signature.
CVE-2011-3634
- EPSS 0.16%
- Published 01.03.2014 00:55:04
- Last modified 12.04.2025 10:46:40
methods/https.cc in apt before 0.8.11 accepts connections when the certificate host name fails validation and Verify-Host is enabled, which allows man-in-the-middle attackers to obtain repository credentials via unspecified vectors.
CVE-2013-1051
- EPSS 0.13%
- Published 21.03.2013 17:55:01
- Last modified 11.04.2025 00:51:21
apt 0.8.16, 0.9.7, and possibly other versions does not properly handle InRelease files, which allows man-in-the-middle attackers to modify packages before installation via unknown vectors, possibly related to integrity checking and the use of third-...
CVE-2012-0961
- EPSS 0.05%
- Published 26.12.2012 22:55:02
- Last modified 11.04.2025 00:51:21
Apt 0.8.16~exp5ubuntu13.x before 0.8.16~exp5ubuntu13.6, 0.8.16~exp12ubuntu10.x before 0.8.16~exp12ubuntu10.7, and 0.9.7.5ubuntu5.x before 0.9.7.5ubuntu5.2, as used in Ubuntu, uses world-readable permissions for /var/log/apt/term.log, which allows loc...
CVE-2012-3587
- EPSS 0.16%
- Published 19.06.2012 20:55:08
- Last modified 11.04.2025 00:51:21
APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install Trojan horse packages via a man-in-the...
CVE-2012-0954
- EPSS 0.37%
- Published 19.06.2012 20:55:05
- Last modified 11.04.2025 00:51:21
APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install altered packages via a man-in-the-midd...
CVE-2011-1829
- EPSS 0.18%
- Published 27.07.2011 02:55:01
- Last modified 11.04.2025 00:51:21
APT before 0.8.15.2 does not properly validate inline GPG signatures, which allows man-in-the-middle attackers to install modified packages via vectors involving lack of an initial clearsigned message.
- EPSS 1.37%
- Published 21.04.2009 23:30:00
- Last modified 09.04.2025 00:30:58
apt-get in apt before 0.7.21 does not check for the correct error code from gpgv, which causes apt to treat a repository as valid even when it has been signed with a key that has been revoked or expired, which might allow remote attackers to trick ap...