Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gentoo linux vulnerabilities and exploits
(subscribe to this query)
755
VMScore
CVE-2004-1161
rssh 2.2.2 and previous versions does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via (1) rdist -P, (2) rsync, or (3) scp -S.
Rssh Rssh 2.2
Rssh Rssh 2.2.2
Rssh Rssh 2.1
Rssh Rssh 2.0
Rssh Rssh 2.2.1
Gentoo Linux
1 EDB exploit
641
VMScore
CVE-2004-0667
Rule Set Based Access Control (RSBAC) 1.2.2 up to and including 1.2.3 allows access to sys_creat, sys_open, and sys_mknod inside jails, which could allow local users to gain elevated privileges.
Rsbac Rule Set Based Access Control 1.2.2
Rsbac Rule Set Based Access Control 1.2.3
Gentoo Linux 1.4
1000
VMScore
CVE-2004-0333
Buffer overflow in the UUDeview package, as used in WinZip 6.2 through WinZip 8.1 SR-1, and possibly other packages, allows remote malicious users to execute arbitrary code via a MIME archive with certain long MIME parameters.
Winzip Winzip 7.0
Winzip Winzip 8.1
Uudeview Uudeview 0.5.18
Uudeview Uudeview 0.5.19
Openpkg Openpkg
Winzip Winzip 8.0
Gentoo Linux 1.4
1 EDB exploit
445
VMScore
CVE-2005-1121
Format string vulnerability in the my_xlog function in lib.c for Oops! Proxy Server 1.5.23 and previous versions, as called by the auth functions in the passwd_mysql and passwd_pgsql modules, may allow malicious users to execute arbitrary code via a URL.
Igor Khasilev Oops Proxy Server 1.5.19
Igor Khasilev Oops Proxy Server 1.5.53
Igor Khasilev Oops Proxy Server 1.4.22
Gentoo Linux
187
VMScore
CVE-2004-0565
Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Trustix Secure Linux 2.0
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.2
Trustix Secure Linux 2
Linux Linux Kernel 2.4.0
Mandrakesoft Mandrake Linux 10.0
Trustix Secure Linux 2.1
Mandrakesoft Mandrake Linux 9.1
Gentoo Linux
890
VMScore
CVE-2004-0947
Buffer overflow in unarj prior to 2.63a-r2 allows remote malicious users to execute arbitrary code via an arj archive that contains long filenames.
Arj Software Inc. Unarj 2.65
Arj Software Inc. Unarj 2.63 A
Arj Software Inc. Unarj 2.62
Arj Software Inc. Unarj 2.64
Suse Suse Linux 9.2
Suse Suse Linux 9.0
Suse Suse Linux 9.1
Gentoo Linux
1000
VMScore
CVE-2004-0557
Multiple buffer overflows in the st_wavstartread function in wav.c for Sound eXchange (SoX) 12.17.2 up to and including 12.17.4 allow remote malicious users to execute arbitrary code via certain WAV file header fields.
Conectiva Linux 9.0
Sox Sox 12.17.4
Sox Sox 12.17.2
Conectiva Linux 8.0
Sox Sox 12.17.3
Conectiva Linux 10.0
Redhat Fedora Core Core 2.0
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux 3.0
Redhat Fedora Core Core 1.0
Gentoo Linux 1.4
2 EDB exploits
890
VMScore
CVE-2004-1034
Buffer overflow in the http_open function in Kaffeine prior to 0.5, whose code is also used in gxine prior to 0.3.3, allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a long Content-Type header for a Real Audio ...
Xine Gxine 0.3
Kaffeine Kaffeine Player 0.5 Rc1
Kaffeine Kaffeine Player 0.4.3
Kaffeine Kaffeine Player 0.4.3b
Kaffeine Kaffeine Player 0.4.2
Gentoo Linux
220
VMScore
CVE-2004-0996
main.c in cscope 15-4 and 15-5 creates temporary files with predictable filenames, which allows local users to overwrite arbitrary files via a symlink attack.
Cscope Cscope 15.5
Cscope Cscope 15.3
Cscope Cscope 13.0
Cscope Cscope 15.1
Cscope Cscope 15.4
Sco Unixware 7.1.3
Sco Unixware 7.1.4
Debian Debian Linux 3.0
Sco Unixware 7.1.1
Gentoo Linux
2 EDB exploits
890
VMScore
CVE-2004-1052
Buffer overflow in the getnickuserhost function in BNC 2.8.9, and possibly other versions, allows remote IRC servers to execute arbitrary code via an IRC server response that contains many (1) ! (exclamation) or (2) @ (at sign) characters.
Bnc Bnc 2.4.8
Bnc Bnc 2.6
Bnc Bnc 2.8.8
Bnc Bnc 2.6.4
Bnc Bnc 2.2.4
Bnc Bnc 2.8.9
Bnc Bnc 2.6.2
Bnc Bnc 2.4.6
Debian Debian Linux 3.0
Gentoo Linux
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »