Page 2 of 13 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

17 Jan 2008 — Untrusted search path vulnerability in apt-listchanges.py in apt-listchanges before 2.82 allows local users to execute arbitrary code via a malicious apt-listchanges program in the current working directory. Vulnerabilidad de ruta de búsqueda no confiable en apt-listchanges.py de apt-listchanges versiones anteriores a 2.82 permite a usuarios locales ejecutar código de su elección mediante un programa apt-listchanges malicioso en el directorio actual de trabajo. • http://git.madism.org/?p=apt-listchanges.git%3Ba=commitdiff%3Bh=1bcfbf3dc55413bb83a1782dc9a54515a963fb32 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

05 Aug 2005 — Unknown vulnerability in apt-cacher in Debian 3.1, related to "missing input sanitising," allows remote attackers to execute arbitrary commands on the caching server. Vulnerabilidad desconocida en apt-catcher en Debian 3.1 relacionada con "missing input sanitising", permite que atacantes remotos ejecuten código arbitrario en el servidor donde se cachea. • http://secunia.com/advisories/16327 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

11 Jul 2005 — apt-setup in Debian GNU/Linux installs the apt.conf file with insecure permissions, which allows local users to obtain sensitive information such as passwords. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305142 •