Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gentoo portage 2.1.12 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2013-2100
The urlopen function in pym/portage/util/_urlopen.py in Gentoo Portage 2.1.12, when using HTTPS, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and modify binary package lists via a crafted certificate.
Gentoo Portage 2.1.12
7.2
CVSSv2
CVE-2005-4442
Untrusted search path vulnerability in OpenLDAP prior to 2.2.28-r3 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Openldap Openldap 2.0.13
Openldap Openldap 2.0.15
Openldap Openldap 2.0.21
Openldap Openldap 2.0.23
Openldap Openldap 2.0.3
Openldap Openldap 2.0.5
Openldap Openldap 2.1.12
Openldap Openldap 2.1.14
Openldap Openldap 2.1.20
Openldap Openldap 2.1.22
Openldap Openldap 2.1.27
Openldap Openldap 2.1.29
Openldap Openldap 2.1.8
Openldap Openldap 2.2.10
Openldap Openldap 2.2.17
Openldap Openldap 2.2.19
Openldap Openldap 2.2.24
Openldap Openldap 2.2.26
Openldap Openldap 2.2.9
Openldap Openldap 2.0.12
Openldap Openldap 2.0.14
Openldap Openldap 2.0.16
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started