Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gentoo linux vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2004-1161
rssh 2.2.2 and previous versions does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via (1) rdist -P, (2) rsync, or (3) scp -S.
Rssh Rssh 2.2.1
Rssh Rssh 2.2.2
Rssh Rssh 2.0
Rssh Rssh 2.1
Rssh Rssh 2.2
Gentoo Linux
1 EDB exploit
7.2
CVSSv2
CVE-2004-0667
Rule Set Based Access Control (RSBAC) 1.2.2 up to and including 1.2.3 allows access to sys_creat, sys_open, and sys_mknod inside jails, which could allow local users to gain elevated privileges.
Rsbac Rule Set Based Access Control 1.2.2
Rsbac Rule Set Based Access Control 1.2.3
Gentoo Linux 1.4
10
CVSSv2
CVE-2004-0333
Buffer overflow in the UUDeview package, as used in WinZip 6.2 through WinZip 8.1 SR-1, and possibly other packages, allows remote malicious users to execute arbitrary code via a MIME archive with certain long MIME parameters.
Winzip Winzip 8.1
Uudeview Uudeview 0.5.18
Uudeview Uudeview 0.5.19
Openpkg Openpkg
Winzip Winzip 7.0
Winzip Winzip 8.0
Gentoo Linux 1.4
1 EDB exploit
5
CVSSv2
CVE-2005-1121
Format string vulnerability in the my_xlog function in lib.c for Oops! Proxy Server 1.5.23 and previous versions, as called by the auth functions in the passwd_mysql and passwd_pgsql modules, may allow malicious users to execute arbitrary code via a URL.
Igor Khasilev Oops Proxy Server 1.4.22
Igor Khasilev Oops Proxy Server 1.5.19
Igor Khasilev Oops Proxy Server 1.5.53
Gentoo Linux
2.1
CVSSv2
CVE-2004-0565
Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Mandrakesoft Mandrake Linux 10.0
Trustix Secure Linux 2
Trustix Secure Linux 2.0
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.1
Gentoo Linux
Linux Linux Kernel 2.4.0
Trustix Secure Linux 2.1
10
CVSSv2
CVE-2004-0557
Multiple buffer overflows in the st_wavstartread function in wav.c for Sound eXchange (SoX) 12.17.2 up to and including 12.17.4 allow remote malicious users to execute arbitrary code via certain WAV file header fields.
Sox Sox 12.17.4
Conectiva Linux 10.0
Sox Sox 12.17.2
Sox Sox 12.17.3
Conectiva Linux 8.0
Conectiva Linux 9.0
Gentoo Linux 1.4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 3.0
Redhat Fedora Core Core 1.0
Redhat Fedora Core Core 2.0
2 EDB exploits
10
CVSSv2
CVE-2004-0947
Buffer overflow in unarj prior to 2.63a-r2 allows remote malicious users to execute arbitrary code via an arj archive that contains long filenames.
Arj Software Inc. Unarj 2.64
Arj Software Inc. Unarj 2.65
Arj Software Inc. Unarj 2.62
Arj Software Inc. Unarj 2.63 A
Suse Suse Linux 9.0
Suse Suse Linux 9.1
Suse Suse Linux 9.2
Gentoo Linux
10
CVSSv2
CVE-2004-1034
Buffer overflow in the http_open function in Kaffeine prior to 0.5, whose code is also used in gxine prior to 0.3.3, allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a long Content-Type header for a Real Audio ...
Kaffeine Kaffeine Player 0.4.3b
Kaffeine Kaffeine Player 0.5 Rc1
Xine Gxine 0.3
Kaffeine Kaffeine Player 0.4.2
Kaffeine Kaffeine Player 0.4.3
Gentoo Linux
6.9
CVSSv2
CVE-2009-1527
Race condition in the ptrace_attach function in kernel/ptrace.c in the Linux kernel prior to 2.6.30-rc4 allows local users to gain privileges via a PTRACE_ATTACH ptrace call during an exec system call that is launching a setuid application, related to locking an incorrect cred_ex...
Linux Linux Kernel 2.6.30
Linux Linux Kernel
1 EDB exploit
2.1
CVSSv2
CVE-2004-0996
main.c in cscope 15-4 and 15-5 creates temporary files with predictable filenames, which allows local users to overwrite arbitrary files via a symlink attack.
Cscope Cscope 15.3
Cscope Cscope 15.4
Cscope Cscope 15.5
Cscope Cscope 13.0
Cscope Cscope 15.1
Debian Debian Linux 3.0
Sco Unixware 7.1.1
Sco Unixware 7.1.3
Gentoo Linux
Sco Unixware 7.1.4
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »