Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gentoo linux vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2007-3532
NVIDIA drivers (nvidia-drivers) prior to 1.0.7185, 1.0.9639, and 100.14.11, as used in Gentoo Linux and possibly other distributions, creates /dev/nvidia* device files with insecure permissions, which allows local users to modify video card settings, cause a denial of service (cr...
Nvidia Video Driver
7.2
CVSSv2
CVE-2005-4595
Untrusted search path vulnerability (RPATH) in XnView 1.70 and NView 4.51 on Gentoo Linux allows local users to execute arbitrary code via a malicious library in the current working directory.
Gentoo Nview 4.51
Gentoo Xnview 1.70
7.2
CVSSv2
CVE-2005-4442
Untrusted search path vulnerability in OpenLDAP prior to 2.2.28-r3 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Openldap Openldap 2.0.13
Openldap Openldap 2.0.15
Openldap Openldap 2.0.21
Openldap Openldap 2.0.23
Openldap Openldap 2.0.3
Openldap Openldap 2.0.5
Openldap Openldap 2.1.12
Openldap Openldap 2.1.14
Openldap Openldap 2.1.20
Openldap Openldap 2.1.22
Openldap Openldap 2.1.27
Openldap Openldap 2.1.29
Openldap Openldap 2.1.8
Openldap Openldap 2.2.10
Openldap Openldap 2.2.17
Openldap Openldap 2.2.19
Openldap Openldap 2.2.24
Openldap Openldap 2.2.26
Openldap Openldap 2.2.9
Openldap Openldap 2.0.12
Openldap Openldap 2.0.14
Openldap Openldap 2.0.16
7.2
CVSSv2
CVE-2005-4443
Untrusted search path vulnerability in Gauche prior to 0.8.6-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Gauche Gauche 0.8
Gauche Gauche 0.8.5
Gauche Gauche 0.8.1
Gauche Gauche 0.8.2
Gauche Gauche 0.8.3
Gauche Gauche 0.8.4
7.2
CVSSv2
CVE-2005-4278
Untrusted search path vulnerability in Perl prior to 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Larry Wall Perl 5.4
Larry Wall Perl 5.4.5
Larry Wall Perl 5.8.4.1
Larry Wall Perl 5.8.4.2
Larry Wall Perl 5.3
Larry Wall Perl 5.8.3
Larry Wall Perl 5.8.4
Larry Wall Perl
Larry Wall Perl 5.5
Larry Wall Perl 5.5.3
Larry Wall Perl 5.6.1
Larry Wall Perl 5.8.4.2.3
Larry Wall Perl 5.8.4.3
Larry Wall Perl 5.8.0
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.4.4
Larry Wall Perl 5.8.4.5
7.2
CVSSv2
CVE-2005-4280
Untrusted search path vulnerability in CMake prior to 2.2.0-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
7.2
CVSSv2
CVE-2005-4279
Untrusted search path vulnerability in Qt-UnixODBC prior to 3.3.4-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Gentoo Qt-unixodbc
7.2
CVSSv2
CVE-2005-0457
Opera 7.54 and previous versions on Gentoo Linux uses an insecure path for plugins, which could allow local users to gain privileges by inserting malicious libraries into the PORTAGE_TMPDIR (portage) temporary directory.
Opera Opera Browser
7.2
CVSSv2
CVE-2004-1031
fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to bypass access restrictions and load an arbitrary configuration file by starting an suid process and pointing the fcronsighup configuration file to a /proc entry that is owned by root but modifi...
Thibault Godouet Fcron 2.9.4
Thibault Godouet Fcron 2.0.1
Gentoo Linux
7.2
CVSSv2
CVE-2004-1115
The init scripts in Search for Extraterrestrial Intelligence (SETI) project 3.08-r3 and previous versions execute user-owned programs with root privileges, which allows local users to gain privileges by modifying the programs.
Gentoo Linux
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-40673
CVE-2024-36674
CVE-2024-27348
unspecified
CVE-2024-24919
CVE-2024-4870
malicious code
CVE-2024-2019
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »