Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gentoo linux vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2004-0980
Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 up to and including 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code.
Angus Mackay Ez-ipupdate 3.0.11b5
Angus Mackay Ez-ipupdate 3.0.11b8
Debian Debian Linux 3.0
Gentoo Linux
3.6
CVSSv2
CVE-2008-1734
Interpretation conflict in PHP Toolkit prior to 1.0.1 on Gentoo Linux might allow local users to cause a denial of service (PHP outage) and read contents of PHP scripts by creating a file with a one-letter lowercase alphabetic name, which triggers interpretation of a certain unqu...
Gentoo Php Toolkit
Gentoo Php Toolkit 1.0
5
CVSSv2
CVE-2004-1027
Directory traversal vulnerability in the -x (extract) command line option in unarj allows remote malicious users to overwrite arbitrary files via an arj archive with filenames that contain .. (dot dot) sequences.
Arjsoftware Unarj 2.62
Arjsoftware Unarj 2.63
Arjsoftware Unarj 2.64
Arjsoftware Unarj 2.65
Gentoo Linux
Debian Debian Linux 3.0
5
CVSSv2
CVE-2004-0626
The tcp_find_option function of the netfilter subsystem in Linux kernel 2.6, when using iptables and TCP options rules, allows remote malicious users to cause a denial of service (CPU consumption by infinite loop) via a large option length that produces a negative integer after a...
Conectiva Linux 10
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Suse Suse Linux 8.0
Linux Linux Kernel 2.6.0
Suse Suse Linux 9.1
Gentoo Linux
Suse Suse Linux 8.1
2.1
CVSSv2
CVE-2007-6249
etc-update in Portage prior to 2.1.3.11 on Gentoo Linux relies on the umask to set permissions for the merge file, often resulting in permissions weaker than those of the original files, which might allow local users to obtain sensitive information by reading the merge file.
Gentoo Portage
6.3
CVSSv2
CVE-2011-1549
The default configuration of logrotate on Gentoo Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directorie...
Gentoo Logrotate
5
CVSSv2
CVE-2004-0633
The iSNS dissector for Ethereal 0.10.3 up to and including 0.10.4 allows remote malicious users to cause a denial of service (process abort) via an integer overflow.
Ethereal Group Ethereal 0.10.3
Ethereal Group Ethereal 0.10.4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.0
Gentoo Linux
1 EDB exploit
5
CVSSv2
CVE-2004-0634
The SMB SID snooping capability in Ethereal 0.9.15 to 0.10.4 allows remote malicious users to cause a denial of service (process crash) via a handle without a policy name, which causes a null dereference.
Ethereal Group Ethereal 0.9.15
Ethereal Group Ethereal 0.10.4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.0
Gentoo Linux
6.3
CVSSv2
CVE-2011-1548
The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted direct...
Gentoo Logrotate
7.2
CVSSv2
CVE-2005-4279
Untrusted search path vulnerability in Qt-UnixODBC prior to 3.3.4-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Gentoo Qt-unixodbc
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37884
CVE-2024-6003
remote
brute force
information disclosure
CVE-2024-27801
CVE-2024-30078
CVE-2024-31870
CVE-2024-6042
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »