Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gentoo vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2005-4443
Untrusted search path vulnerability in Gauche prior to 0.8.6-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Gauche Gauche 0.8
Gauche Gauche 0.8.5
Gauche Gauche 0.8.1
Gauche Gauche 0.8.2
Gauche Gauche 0.8.3
Gauche Gauche 0.8.4
7.2
CVSSv2
CVE-2005-4279
Untrusted search path vulnerability in Qt-UnixODBC prior to 3.3.4-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Gentoo Qt-unixodbc
7.2
CVSSv2
CVE-2005-4280
Untrusted search path vulnerability in CMake prior to 2.2.0-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
7.2
CVSSv2
CVE-2005-4278
Untrusted search path vulnerability in Perl prior to 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Larry Wall Perl 5.4
Larry Wall Perl 5.4.5
Larry Wall Perl 5.8.4.1
Larry Wall Perl 5.8.4.2
Larry Wall Perl 5.3
Larry Wall Perl 5.8.3
Larry Wall Perl 5.8.4
Larry Wall Perl
Larry Wall Perl 5.5
Larry Wall Perl 5.5.3
Larry Wall Perl 5.6.1
Larry Wall Perl 5.8.4.2.3
Larry Wall Perl 5.8.4.3
Larry Wall Perl 5.8.0
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.4.4
Larry Wall Perl 5.8.4.5
7.2
CVSSv2
CVE-2005-0457
Opera 7.54 and previous versions on Gentoo Linux uses an insecure path for plugins, which could allow local users to gain privileges by inserting malicious libraries into the PORTAGE_TMPDIR (portage) temporary directory.
Opera Opera Browser
7.2
CVSSv2
CVE-2004-1031
fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to bypass access restrictions and load an arbitrary configuration file by starting an suid process and pointing the fcronsighup configuration file to a /proc entry that is owned by root but modifi...
Thibault Godouet Fcron 2.9.4
Thibault Godouet Fcron 2.0.1
Gentoo Linux
7.2
CVSSv2
CVE-2004-1117
The init scripts in ChessBrain 20407 and previous versions execute user-owned programs with root privileges, which allows local users to gain privileges by modifying the programs.
Gentoo Linux
7.2
CVSSv2
CVE-2004-1115
The init scripts in Search for Extraterrestrial Intelligence (SETI) project 3.08-r3 and previous versions execute user-owned programs with root privileges, which allows local users to gain privileges by modifying the programs.
Gentoo Linux
7.2
CVSSv2
CVE-2004-1116
The init scripts in Great Internet Mersenne Prime Search (GIMPS) 23.9 and previous versions execute user-owned programs with root privileges, which allows local users to gain privileges by modifying the programs.
Gentoo Linux
7.2
CVSSv2
CVE-2004-1452
Tomcat prior to 5.0.27-r3 in Gentoo Linux sets the default permissions on the init scripts as tomcat:tomcat, but executes the scripts with root privileges, which could allow local users in the tomcat group to execute arbitrary commands as root by modifying the scripts.
Gentoo Linux 1.1a
Gentoo Linux 1.2
Gentoo Linux 1.4
Gentoo Linux 0.5
Gentoo Linux 0.7
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »