Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gentoo linux vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2004-0419
XDM in XFree86 opens a chooserFd TCP socket even when DisplayManager.requestPort is 0, which could allow remote malicious users to connect to the port, in violation of the intended restrictions.
X.org X11r6 6.7.0
Xfree86 Project Xdm Cvs
Gentoo Linux 1.4
2.1
CVSSv2
CVE-2004-1032
fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to delete arbitrary files or create arbitrary empty files via a target filename with a large number of leading slash (/) characters such that fcronsighup does not properly append the intended fcro...
Thibault Godouet Fcron 2.0.1
Thibault Godouet Fcron 2.9.4
Gentoo Linux
7.2
CVSSv2
CVE-2004-1031
fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to bypass access restrictions and load an arbitrary configuration file by starting an suid process and pointing the fcronsighup configuration file to a /proc entry that is owned by root but modifi...
Thibault Godouet Fcron 2.9.4
Thibault Godouet Fcron 2.0.1
Gentoo Linux
2.1
CVSSv2
CVE-2004-1030
fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to gain sensitive information by calling fcronsighup with an arbitrary file, which reveals the contents of the file that can not be parsed in an error message.
Thibault Godouet Fcron 2.0.1
Thibault Godouet Fcron 2.9.4
Gentoo Linux
2.1
CVSSv2
CVE-2004-1033
Fcron 2.0.1, 2.9.4, and possibly earlier versions leak file descriptors of open files, which allows local users to bypass access restrictions and read fcron.allow and fcron.deny via the EDITOR environment variable.
Thibault Godouet Fcron 2.9.4
Thibault Godouet Fcron 2.0.1
Gentoo Linux
3.6
CVSSv2
CVE-2008-1734
Interpretation conflict in PHP Toolkit prior to 1.0.1 on Gentoo Linux might allow local users to cause a denial of service (PHP outage) and read contents of PHP scripts by creating a file with a one-letter lowercase alphabetic name, which triggers interpretation of a certain unqu...
Gentoo Php Toolkit
Gentoo Php Toolkit 1.0
2.1
CVSSv2
CVE-2005-0077
The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.
Debian Debian Linux 3.0
Gentoo Linux
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 4.0
Ubuntu Ubuntu Linux 4.10
2.1
CVSSv2
CVE-2004-0231
Multiple vulnerabilities in Midnight Commander (mc) prior to 4.6.0, with unknown impact, related to "Insecure temporary file and directory creations."
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.6
Sgi Propack 2.3
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.55
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.48
Sgi Propack 2.4
Gentoo Linux 1.4
Gentoo Linux 0.5
Gentoo Linux 0.7
Slackware Slackware Linux
Slackware Slackware Linux 9.0
10
CVSSv2
CVE-2004-0226
Multiple buffer overflows in Midnight Commander (mc) prior to 4.6.0 may allow malicious users to cause a denial of service or execute arbitrary code.
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.55
Midnight Commander Midnight Commander 4.6
Sgi Propack 2.3
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.48
Sgi Propack 2.4
Gentoo Linux 0.5
Gentoo Linux 0.7
Slackware Slackware Linux
Slackware Slackware Linux 9.0
Gentoo Linux 1.4
5
CVSSv2
CVE-2004-0232
Multiple format string vulnerabilities in Midnight Commander (mc) prior to 4.6.0 may allow malicious users to cause a denial of service or execute arbitrary code.
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.55
Midnight Commander Midnight Commander 4.6
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.48
Sgi Propack 2.3
Sgi Propack 2.4
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.52
Gentoo Linux 1.2
Gentoo Linux 1.4
Gentoo Linux 0.5
Slackware Slackware Linux
Slackware Slackware Linux 9.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »