Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gentoo vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2006-1539
Multiple buffer overflows in the checkscores function in scores.c in tetris-bsd in bsd-games prior to 2.17-r1 in Gentoo Linux might allow local users with games group membership to gain privileges by modifying tetris-bsd.scores to contain crafted executable content, which is exec...
Bsd-games Tetris-bsd Gold
7.5
CVSSv2
CVE-2006-0460
Multiple buffer overflows in BomberClone prior to 0.11.6.2 allow remote malicious users to execute arbitrary code via long error messages.
Bomberclone Bomberclone 0.11.3
Bomberclone Bomberclone 0.11.4
Bomberclone Bomberclone 0.6
Bomberclone Bomberclone 0.7
Bomberclone Bomberclone 0.1
Bomberclone Bomberclone 0.10.0
Bomberclone Bomberclone 0.4
Bomberclone Bomberclone 0.5
Bomberclone Bomberclone 0.9.9
Bomberclone Bomberclone 0.11.5
Bomberclone Bomberclone 0.11.6
Bomberclone Bomberclone 0.8
Bomberclone Bomberclone 0.9.5
Bomberclone Bomberclone 0.2
Bomberclone Bomberclone 0.3
Bomberclone Bomberclone 0.9.6
Bomberclone Bomberclone 0.9.7
Bomberclone Bomberclone 0.9.8
2 EDB exploits
7.5
CVSSv2
CVE-2005-1109
The filtering of URLs in JunkBuster prior to 2.0.2-r3 allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via heap corruption.
Junkbuster Internet Junkbuster 2.0.2
Junkbuster Internet Junkbuster 2.0.2 R2
Junkbuster Internet Junkbuster 2.0.1
7.5
CVSSv2
CVE-2005-0005
Heap-based buffer overflow in psd.c for ImageMagick 6.1.0, 6.1.7, and possibly earlier versions allows remote malicious users to execute arbitrary code via a .PSD image file with a large number of layers.
Graphicsmagick Graphicsmagick 1.1.3
Graphicsmagick Graphicsmagick 1.1.4
Imagemagick Imagemagick 6.0.2.5
Imagemagick Imagemagick 6.0.3
Imagemagick Imagemagick 6.1.1.6
Imagemagick Imagemagick 6.1.2
Imagemagick Imagemagick 6.2.0.7
Sgi Propack 3.0
Graphicsmagick Graphicsmagick 1.0.6
Graphicsmagick Graphicsmagick 1.1
Imagemagick Imagemagick 6.0.1
Imagemagick Imagemagick 6.0.2
Imagemagick Imagemagick 6.0.8
Imagemagick Imagemagick 6.1
Imagemagick Imagemagick 6.2
Imagemagick Imagemagick 6.2.0.4
Graphicsmagick Graphicsmagick 1.0
Imagemagick Imagemagick 5.4.7
Imagemagick Imagemagick 6.0
Imagemagick Imagemagick 6.0.6
Imagemagick Imagemagick 6.0.7
Imagemagick Imagemagick 6.1.6
7.5
CVSSv2
CVE-2005-0206
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
Easy Software Products Cups 1.0.4
Easy Software Products Cups 1.0.4 8
Easy Software Products Cups 1.1.1
Easy Software Products Cups 1.1.17
Easy Software Products Cups 1.1.18
Easy Software Products Cups 1.1.4 5
Easy Software Products Cups 1.1.6
Kde Koffice 1.3.3
Kde Koffice 1.3 Beta1
Pdftohtml Pdftohtml 0.33a
Pdftohtml Pdftohtml 0.34
Tetex Tetex 2.0.1
Tetex Tetex 2.0.2
Xpdf Xpdf 2.0
Xpdf Xpdf 2.1
Ascii Ptex 3.1.4
Cstex Cstetex 2.0.2
Easy Software Products Cups 1.1.15
Easy Software Products Cups 1.1.16
Easy Software Products Cups 1.1.4 2
Easy Software Products Cups 1.1.4 3
Kde Koffice 1.3
7.5
CVSSv2
CVE-2005-0754
Kommander in KDE 3.2 through KDE 3.4.0 executes data files without confirmation from the user, which allows remote malicious users to execute arbitrary code.
Kde Quanta 3.1
Conectiva Linux 10.0
Conectiva Linux 9.0
Kde Kde 3.2.1
Kde Kde 3.2.2
Ubuntu Ubuntu Linux 4.1
Ubuntu Ubuntu Linux 5.04
Kde Kde 3.2.3
Kde Kde 3.3
Gentoo Linux
Kde Kde 3.2
Redhat Fedora Core Core 3.0
Kde Kde 3.3.1
Kde Kde 3.3.2
Kde Kde 3.4
7.5
CVSSv2
CVE-2004-1175
fish.c in midnight commander allows remote malicious users to execute arbitrary programs via "insecure filename quoting," possibly using shell metacharacters.
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.48
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.54
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.55
Midnight Commander Midnight Commander 4.6
Debian Debian Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Suse Suse Linux 9.0
Suse Suse Linux 9.1
Gentoo Linux
7.5
CVSSv2
CVE-2004-1004
Multiple format string vulnerabilities in Midnight Commander (mc) 4.5.55 and previous versions allow remote malicious users to have an unknown impact.
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.48
Midnight Commander Midnight Commander 4.6
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.54
Midnight Commander Midnight Commander 4.5.55
Debian Debian Linux 3.0
Gentoo Linux
Suse Suse Linux 8.0
Turbolinux Turbolinux Server 8.0
Turbolinux Turbolinux Workstation 7.0
Redhat Enterprise Linux 2.1
7.5
CVSSv2
CVE-2004-1005
Multiple buffer overflows in Midnight Commander (mc) 4.5.55 and previous versions allow remote malicious users to have an unknown impact.
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.54
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.48
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.55
Midnight Commander Midnight Commander 4.6
Debian Debian Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Suse Suse Linux 9.1
Suse Suse Linux 9.2
Gentoo Linux
7.5
CVSSv2
CVE-2004-1176
Buffer underflow in extfs.c in Midnight Commander (mc) 4.5.55 and previous versions allows remote malicious users to cause a denial of service and possibly execute arbitrary code.
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.5.54
Midnight Commander Midnight Commander 4.5.55
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.48
Midnight Commander Midnight Commander 4.6
Debian Debian Linux 3.0
Redhat Enterprise Linux 2.1
Suse Suse Linux 8.1
Suse Suse Linux 8.2
Turbolinux Turbolinux Workstation 8.0
Redhat Linux Advanced Workstation 2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »