Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gentoo linux vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2004-1116
The init scripts in Great Internet Mersenne Prime Search (GIMPS) 23.9 and previous versions execute user-owned programs with root privileges, which allows local users to gain privileges by modifying the programs.
Gentoo Linux
7.2
CVSSv2
CVE-2004-1117
The init scripts in ChessBrain 20407 and previous versions execute user-owned programs with root privileges, which allows local users to gain privileges by modifying the programs.
Gentoo Linux
7.2
CVSSv2
CVE-2004-1452
Tomcat prior to 5.0.27-r3 in Gentoo Linux sets the default permissions on the init scripts as tomcat:tomcat, but executes the scripts with root privileges, which could allow local users in the tomcat group to execute arbitrary commands as root by modifying the scripts.
Gentoo Linux 1.1a
Gentoo Linux 1.2
Gentoo Linux 1.4
Gentoo Linux 0.5
Gentoo Linux 0.7
7.2
CVSSv2
CVE-2004-0834
Format string vulnerability in Speedtouch USB driver prior to 1.3.1 allows local users to execute arbitrary code via (1) modem_run, (2) pppoa2, or (3) pppoa3.
Speedtouch Speedtouch Usb Driver 1.1
Speedtouch Speedtouch Usb Driver 1.2 Beta3
Speedtouch Speedtouch Usb Driver 1.2 Beta2
Speedtouch Speedtouch Usb Driver 1.0
Speedtouch Speedtouch Usb Driver 1.3
Mandrakesoft Mandrake Multi Network Firewall 8.2
Speedtouch Speedtouch Usb Driver 1.2 Beta1
Speedtouch Speedtouch Usb Driver 1.2
Mandrakesoft Mandrake Linux 8.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.1
Mandrakesoft Mandrake Linux 9.0
Gentoo Linux 1.4
Mandrakesoft Mandrake Linux 9.1
Mandrakesoft Mandrake Linux 10.0
7.2
CVSSv2
CVE-2004-0496
Multiple unknown vulnerabilities in Linux kernel 2.6 allow local users to gain privileges or access kernel memory, a different set of vulnerabilities than those identified in CVE-2004-0495, as found by the Sparse source code checking tool.
Suse Suse Linux Office Server
Suse Suse Email Server 3.1
Suse Suse Linux Connectivity Server
Suse Suse Linux Database Server
Suse Suse Linux Firewall
Mandrakesoft Mandrake Multi Network Firewall 8.2
Suse Suse Email Server 3
Sun Sunos 5.8
Mandrakesoft Mandrake Linux 10.0
Mandrakesoft Mandrake Linux 9.1
Sun Sunos 5.9
Suse Suse Linux 7
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Suse Suse Linux 8
Gentoo Linux
Linux Linux Kernel 2.6.0
Sun Solaris 9.0
7.2
CVSSv2
CVE-2004-0495
Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.
Avaya Converged Communications Server 2.0
Avaya Modular Messaging Message Storage Server S3400
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.7
Suse Suse Linux 7
Suse Suse Linux 8.0
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 3.0
Suse Suse Linux 8.2
Suse Suse Linux 8
Suse Suse Linux 9.0
Gentoo Linux 1.4
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.6
7.2
CVSSv2
CVE-2004-0548
Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspell allow local users to execute arbitrary code via a long entry in the wordlist that is not properly handled when using the (1) "c" compress option or (2) "d" d...
Gnu Aspell 0.50.5
Gentoo Linux 1.4
1 EDB exploit
7.2
CVSSv2
CVE-2004-0667
Rule Set Based Access Control (RSBAC) 1.2.2 up to and including 1.2.3 allows access to sys_creat, sys_open, and sys_mknod inside jails, which could allow local users to gain elevated privileges.
Rsbac Rule Set Based Access Control 1.2.2
Rsbac Rule Set Based Access Control 1.2.3
Gentoo Linux 1.4
7.1
CVSSv2
CVE-2004-1471
Format string vulnerability in wrapper.c in CVS 1.12.x up to and including 1.12.8, and 1.11.x up to and including 1.11.16 allows remote attackers with CVSROOT commit access to cause a denial of service (application crash) and possibly execute arbitrary code via format string spec...
Cvs Cvs 1.11.10
Cvs Cvs 1.11.11
Cvs Cvs 1.11.5
Cvs Cvs 1.11.6
Openpkg Openpkg 2.0
Openpkg Openpkg Current
Cvs Cvs 1.10.7
Cvs Cvs 1.10.8
Cvs Cvs 1.11
Cvs Cvs 1.11.16
Cvs Cvs 1.11.2
Cvs Cvs 1.12.5
Cvs Cvs 1.12.7
Cvs Cvs 1.11.14
Cvs Cvs 1.11.15
Cvs Cvs 1.12.1
Cvs Cvs 1.12.2
Sgi Propack 2.4
Sgi Propack 3.0
Cvs Cvs 1.11.1
Cvs Cvs 1.11.1 P1
Cvs Cvs 1.11.3
1 EDB exploit
6.9
CVSSv2
CVE-2019-19882
shadow 4.8, in certain circumstances affecting at least Gentoo, Arch Linux, and Void Linux, allows local users to obtain root access because setuid programs are misconfigured. Specifically, this affects shadow 4.8 when compiled using --with-libpam but without explicitly passing -...
Shadow Project Shadow 4.8
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
CVE-2023-52162
CVE-2024-23670
CVE-2024-5404
man-in-the-middle
CVE-2024-5214
CVE-2024-4358
CVE-2024-20696
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »