Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gentoo linux vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-1452
Tomcat prior to 5.0.27-r3 in Gentoo Linux sets the default permissions on the init scripts as tomcat:tomcat, but executes the scripts with root privileges, which could allow local users in the tomcat group to execute arbitrary commands as root by modifying the scripts.
Gentoo Linux 1.1a
Gentoo Linux 1.2
Gentoo Linux 1.4
Gentoo Linux 0.5
Gentoo Linux 0.7
NA
CVE-2006-1390
The configuration of NetHack 3.4.3-r1 and previous versions, Falcon's Eye 1.9.4a and previous versions, and Slash'EM 0.0.760 and previous versions on Gentoo Linux allows local users in the games group to modify saved games files to execute arbitrary code via buffer over...
Gentoo Linux 1.4
Gentoo Linux 1.1a
Gentoo Linux 1.2
Gentoo Linux 0.5
Gentoo Linux 0.7
NA
CVE-2007-0476
The gencert.sh script, when installing OpenLDAP prior to 2.1.30-r10, 2.2.x prior to 2.2.28-r7, and 2.3.x prior to 2.3.30-r2 as an ebuild in Gentoo Linux, does not create temporary directories in /tmp securely during emerge, which allows local users to overwrite arbitrary files vi...
Gentoo Linux 2.2.28
Gentoo Linux 2.3.30
Gentoo Linux 2.1.30
NA
CVE-2004-0432
ProFTPD 1.2.9 treats the Allow and Deny directives for CIDR based ACL entries as if they were AllowAll, which could allow FTP clients to bypass intended access restrictions.
Proftpd Project Proftpd 1.2.9
Gentoo Linux 1.1a
Gentoo Linux 1.2
Gentoo Linux 1.4
Trustix Secure Linux 2.0
Gentoo Linux 0.5
Gentoo Linux 0.7
Trustix Secure Linux 2.1
5.5
CVSSv3
CVE-2004-1901
Portage prior to 2.0.50-r3 allows local users to overwrite arbitrary files via a hard link attack on the lockfiles.
Gentoo Linux 1.4
Gentoo Portage
Gentoo Portage 2.0.50
NA
CVE-2004-0456
Stack-based buffer overflow in pavuk 0.9pl28, 0.9pl27, and possibly other versions allows remote web sites to execute arbitrary code via a long HTTP Location header.
Pavuk Pavuk 0.9pl28i
Pavuk Pavuk 0.928r1
Debian Debian Linux 3.0
Gentoo Linux 1.4
Gentoo Linux 1.1a
Gentoo Linux 1.2
NA
CVE-2004-0386
Buffer overflow in the HTTP parser for MPlayer 1.0pre3 and previous versions, 0.90, and 0.91 allows remote malicious users to execute arbitrary code via a long Location header.
Mplayer Mplayer 0.90 Pre
Mplayer Mplayer 0.90 Rc
Mplayer Mplayer 0.90
Mplayer Mplayer 0.91
Mplayer Mplayer 1.0 Pre1
Mplayer Mplayer 1.0 Pre2
Mplayer Mplayer 1.0 Pre3
Gentoo Linux 0.7
Gentoo Linux 1.1a
Gentoo Linux 0.5
Gentoo Linux 1.4
Mandrakesoft Mandrake Linux 10.0
Mandrakesoft Mandrake Linux 9.2
Gentoo Linux 1.2
1 EDB exploit
NA
CVE-2006-3005
The JPEG library in media-libs/jpeg prior to 6b-r7 on Gentoo Linux is built without the -maxmem feature, which could allow context-dependent malicious users to cause a denial of service (memory exhaustion) via a crafted JPEG file that exceeds the intended memory limits.
Gentoo Media-libs Jpeg 6b
Gentoo Linux
NA
CVE-2006-0071
The ebuild for pinentry prior to 0.7.2-r2 on Gentoo Linux sets setgid bits for pinentry programs, which allows local users to read or overwrite arbitrary files as gid 0.
Gentoo App-crypt Pinentry 0.7.2
Gentoo Linux
NA
CVE-2004-0749
The mod_authz_svn module in Subversion 1.0.7 and previous versions does not properly restrict access to all metadata on unreadable paths, which could allow remote malicious users to gain sensitive information via (1) svn log -v, (2) svn propget, or (3) svn blame, and other comman...
Subversion Subversion 1.0.1
Subversion Subversion 1.0.2
Subversion Subversion 1.1.0 Rc3
Subversion Subversion 1.0.3
Subversion Subversion 1.0.4
Subversion Subversion 1.0.5
Subversion Subversion 1.0.6
Subversion Subversion 1.0.7
Subversion Subversion 1.0
Subversion Subversion 1.1.0 Rc1
Subversion Subversion 1.1.0 Rc2
Gentoo Linux 1.4
Gentoo Linux 0.5
Gentoo Linux 0.7
Gentoo Linux 1.1a
Gentoo Linux 1.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »