Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gentoo linux vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-4280
Untrusted search path vulnerability in CMake prior to 2.2.0-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
NA
CVE-2005-4278
Untrusted search path vulnerability in Perl prior to 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Larry Wall Perl 5.4
Larry Wall Perl 5.4.5
Larry Wall Perl 5.8.4.1
Larry Wall Perl 5.8.4.2
Larry Wall Perl 5.3
Larry Wall Perl 5.8.3
Larry Wall Perl 5.8.4
Larry Wall Perl
Larry Wall Perl 5.5
Larry Wall Perl 5.5.3
Larry Wall Perl 5.6.1
Larry Wall Perl 5.8.4.2.3
Larry Wall Perl 5.8.4.3
Larry Wall Perl 5.8.0
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.4.4
Larry Wall Perl 5.8.4.5
NA
CVE-2005-3785
Second-order symlink vulnerability in eix-sync.in in Ebuild IndeX (eix) prior to 0.5.0_pre2 allows local users to overwrite arbitrary files via a symlink attack on the exi.X.sync temporary file, which is processed by the diff-eix program.
Gentoo Linux Eix
NA
CVE-2005-2557
Cross-site scripting (XSS) vulnerability in view_all_set.php in Mantis 0.19.0a1 up to and including 1.0.0a3 allows remote malicious users to inject arbitrary web script or HTML via the dir parameter, as identified by bug#0005959, and a different vulnerability than CVE-2005-3090.
Mantis Mantis 0.19.0
Mantis Mantis 1.0.0a2
Mantis Mantis 1.0.0a3
Mantis Mantis 0.19.0a2
Mantis Mantis 0.19.1
Mantis Mantis 0.19.2
Mantis Mantis 1.0.0a1
Mantis Mantis 0.19.0 Rc1
Mantis Mantis 0.19.0a1
Debian Debian Linux 3.1
Gentoo Linux
1 EDB exploit
NA
CVE-2005-2811
Untrusted search path vulnerability in Net-SNMP 5.2.1.2 and previous versions, on Gentoo Linux, installs certain Perl modules with an insecure DT_RPATH, which could allow local users to gain privileges.
Net-snmp Net-snmp 5.0.7
Net-snmp Net-snmp 5.0.8
Net-snmp Net-snmp 5.0.9
Net-snmp Net-snmp 5.1.2
Net-snmp Net-snmp 5.1.3
Net-snmp Net-snmp 5.0
Net-snmp Net-snmp 5.0.1
Net-snmp Net-snmp 5.0.10
Net-snmp Net-snmp 5.0.2
Net-snmp Net-snmp 5.0.4 Pre2
Net-snmp Net-snmp 5.0.6
Net-snmp Net-snmp 5.2.1
Net-snmp Net-snmp 5.0.3
Net-snmp Net-snmp 5.0.5
Net-snmp Net-snmp 5.2
Net-snmp Net-snmp
NA
CVE-2005-1267
The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote malicious users to cause a denial of service (infinite loop) via a crafted BGP packet.
Lbl Tcpdump 3.6.3
Lbl Tcpdump 3.7
Lbl Tcpdump 3.9.1
Lbl Tcpdump 3.5 Alpha
Lbl Tcpdump 3.6.2
Lbl Tcpdump 3.8.3
Lbl Tcpdump 3.9
Lbl Tcpdump 3.5
Lbl Tcpdump 3.5.2
Lbl Tcpdump 3.8.1
Lbl Tcpdump 3.8.2
Lbl Tcpdump 3.4
Lbl Tcpdump 3.4a6
Lbl Tcpdump 3.7.1
Lbl Tcpdump 3.7.2
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Mandrakesoft Mandrake Linux 10.2
Redhat Fedora Core Core 3.0
Redhat Fedora Core Core 4.0
Mandrakesoft Mandrake Linux 10.1
Gentoo Linux
1 EDB exploit
NA
CVE-2005-1707
The fn_show_postinst function in Gentoo webapp-config prior to 1.10-r14 allows local users to overwrite arbitrary files via a symlink attack on the postinst.txt temporary file.
Gentoo Linux Webapp-config 1.10
1 EDB exploit
NA
CVE-2005-1545
Integer overflow in the ELF parser in HT Editor prior to 0.8.0 allows remote malicious users to execute arbitrary code via a crafted ELF file, which leads to a heap-based buffer overflow.
Ht Editor Ht Editor 0.3.991
Ht Editor Ht Editor 0.3.992
Ht Editor Ht Editor 0.4.0
Ht Editor Ht Editor 0.4.1
Ht Editor Ht Editor 0.4.2
Ht Editor Ht Editor 0.7.3
Ht Editor Ht Editor 0.4.4d
Ht Editor Ht Editor 0.4.5
Ht Editor Ht Editor 0.5.0
Ht Editor Ht Editor 0.6.0
Ht Editor Ht Editor 0.4.3
Ht Editor Ht Editor 0.4.4b
Ht Editor Ht Editor 0.7.0
Ht Editor Ht Editor 0.7.2
Ht Editor Ht Editor 2000-01-14
Ht Editor Ht Editor 0.7.4
Ht Editor Ht Editor 0.7.5
Ht Editor Ht Editor 0.8.0
Ht Editor Ht Editor 0.4.4
Ht Editor Ht Editor 0.4.4c
Ht Editor Ht Editor 0.6.0b
Ht Editor Ht Editor 0.7.1
NA
CVE-2005-1546
Buffer overflow in the PE parser in HT Editor prior to 0.8.0 allows remote malicious users to execute arbitrary code via a crafted PE file.
Ht Editor Ht Editor 0.4.1
Ht Editor Ht Editor 0.4.2
Ht Editor Ht Editor 0.3.991
Ht Editor Ht Editor 0.4.0
Ht Editor Ht Editor 0.4.4b
Ht Editor Ht Editor 0.4.4d
Ht Editor Ht Editor 0.7.2
Ht Editor Ht Editor 0.7.4
Ht Editor Ht Editor 0.4.3
Ht Editor Ht Editor 0.4.4
Ht Editor Ht Editor 0.7.5
Ht Editor Ht Editor 0.8.0
Ht Editor Ht Editor 2000-01-14
Ht Editor Ht Editor 0.5.0
Ht Editor Ht Editor 0.6.0
Ht Editor Ht Editor 0.6.0b
Ht Editor Ht Editor 0.7.0
Ht Editor Ht Editor 0.3.992
Ht Editor Ht Editor 0.4.4c
Ht Editor Ht Editor 0.4.5
Ht Editor Ht Editor 0.7.1
Ht Editor Ht Editor 0.7.3
NA
CVE-2005-0077
The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.
Debian Debian Linux 3.0
Gentoo Linux
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 4.0
Ubuntu Ubuntu Linux 4.10
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »