Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gentoo linux vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-0980
Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 up to and including 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code.
Angus Mackay Ez-ipupdate 3.0.11b5
Angus Mackay Ez-ipupdate 3.0.11b8
Debian Debian Linux 3.0
Gentoo Linux
NA
CVE-2005-0005
Heap-based buffer overflow in psd.c for ImageMagick 6.1.0, 6.1.7, and possibly earlier versions allows remote malicious users to execute arbitrary code via a .PSD image file with a large number of layers.
Graphicsmagick Graphicsmagick 1.1.3
Graphicsmagick Graphicsmagick 1.1.4
Imagemagick Imagemagick 6.0.2.5
Imagemagick Imagemagick 6.0.3
Imagemagick Imagemagick 6.1.1.6
Imagemagick Imagemagick 6.1.2
Imagemagick Imagemagick 6.2.0.7
Sgi Propack 3.0
Graphicsmagick Graphicsmagick 1.0.6
Graphicsmagick Graphicsmagick 1.1
Imagemagick Imagemagick 6.0.1
Imagemagick Imagemagick 6.0.2
Imagemagick Imagemagick 6.0.8
Imagemagick Imagemagick 6.1
Imagemagick Imagemagick 6.2
Imagemagick Imagemagick 6.2.0.4
Graphicsmagick Graphicsmagick 1.0
Imagemagick Imagemagick 5.4.7
Imagemagick Imagemagick 6.0
Imagemagick Imagemagick 6.0.6
Imagemagick Imagemagick 6.0.7
Imagemagick Imagemagick 6.1.6
NA
CVE-2004-1027
Directory traversal vulnerability in the -x (extract) command line option in unarj allows remote malicious users to overwrite arbitrary files via an arj archive with filenames that contain .. (dot dot) sequences.
Arjsoftware Unarj 2.62
Arjsoftware Unarj 2.63
Arjsoftware Unarj 2.64
Arjsoftware Unarj 2.65
Gentoo Linux
Debian Debian Linux 3.0
NA
CVE-2004-0626
The tcp_find_option function of the netfilter subsystem in Linux kernel 2.6, when using iptables and TCP options rules, allows remote malicious users to cause a denial of service (CPU consumption by infinite loop) via a large option length that produces a negative integer after a...
Conectiva Linux 10
Gentoo Linux
Linux Linux Kernel 2.6.0
Suse Suse Linux 9.0
Suse Suse Linux 9.1
Suse Suse Linux 8.0
Suse Suse Linux 8.1
Suse Suse Linux 8.2
NA
CVE-2007-6249
etc-update in Portage prior to 2.1.3.11 on Gentoo Linux relies on the umask to set permissions for the merge file, often resulting in permissions weaker than those of the original files, which might allow local users to obtain sensitive information by reading the merge file.
Gentoo Portage
NA
CVE-2011-1549
The default configuration of logrotate on Gentoo Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directorie...
Gentoo Logrotate
NA
CVE-2011-1548
The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted direct...
Gentoo Logrotate
NA
CVE-2005-4279
Untrusted search path vulnerability in Qt-UnixODBC prior to 3.3.4-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Gentoo Qt-unixodbc
NA
CVE-2004-0634
The SMB SID snooping capability in Ethereal 0.9.15 to 0.10.4 allows remote malicious users to cause a denial of service (process crash) via a handle without a policy name, which causes a null dereference.
Ethereal Group Ethereal 0.9.15
Ethereal Group Ethereal 0.10.4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.0
Gentoo Linux
NA
CVE-2004-0633
The iSNS dissector for Ethereal 0.10.3 up to and including 0.10.4 allows remote malicious users to cause a denial of service (process abort) via an integer overflow.
Ethereal Group Ethereal 0.10.3
Ethereal Group Ethereal 0.10.4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.0
Gentoo Linux
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »