Gentoo Linux Security Advisories
GLSA 200709-12 (normal) - Poppler: Two buffer overflow vulnerabilities
Poppler is vulnerable to an integer overflow and a stack overflow.
Poppler is vulnerable to an integer overflow and a stack overflow.
GLSA 200709-11 (low) - GDM: Local Denial of Service
GDM can be crashed by a local user, preventing it from managing future displays.
GDM can be crashed by a local user, preventing it from managing future displays.
GLSA 200709-10 (low) - PhpWiki: Authentication bypass
A vulnerability has been discovered in PhpWiki authentication mechanism.
A vulnerability has been discovered in PhpWiki authentication mechanism.
GLSA 200709-09 (normal) - GNU Tar: Directory traversal vulnerability
A directory traversal vulnerability has been discovered in GNU Tar.
A directory traversal vulnerability has been discovered in GNU Tar.
GLSA 200709-08 (normal) - id3lib: Insecure temporary file creation
A vulnerability has been discovered in id3lib allowing local users to overwrite arbitrary files via a symlink attack.
A vulnerability has been discovered in id3lib allowing local users to overwrite arbitrary files via a symlink attack.
GLSA 200709-07 (normal) - Eggdrop: Buffer overflow
A remote stack-based buffer overflow has been discovered in Eggdrop.
A remote stack-based buffer overflow has been discovered in Eggdrop.
GLSA 200709-06 (normal) - flac123: Buffer overflow
flac123 is affected by a buffer overflow vulnerability, which could allow for the execution of arbitrary code.
flac123 is affected by a buffer overflow vulnerability, which could allow for the execution of arbitrary code.
GLSA 200709-05 (normal) - RealPlayer: Buffer overflow
RealPlayer is vulnerable to a buffer overflow allowing for execution of arbitrary code.
RealPlayer is vulnerable to a buffer overflow allowing for execution of arbitrary code.
GLSA 200709-04 (normal) - po4a: Insecure temporary file creation
A vulnerability has been discovered in po4a, allowing for a symlink attack.
A vulnerability has been discovered in po4a, allowing for a symlink attack.
GLSA 200709-03 (normal) - Streamripper: Buffer overflow
A buffer overflow vulnerability has been discovered in Streamripper, allowing for user-assisted execution of arbitrary code.
A buffer overflow vulnerability has been discovered in Streamripper, allowing for user-assisted execution of arbitrary code.
GLSA 200709-02 (normal) - KVIrc: Remote arbitrary code execution
A vulnerability has been discovered in KVIrc, allowing for the remote execution of arbitrary code.
A vulnerability has been discovered in KVIrc, allowing for the remote execution of arbitrary code.
GLSA 200709-01 (high) - MIT Kerberos 5: Multiple vulnerabilities
Two vulnerabilities have been found in MIT Kerberos 5, which could allow a remote unauthenticated user to execute arbitrary code with root privileges.
Two vulnerabilities have been found in MIT Kerberos 5, which could allow a remote unauthenticated user to execute arbitrary code with root privileges.
GLSA 200708-17 (normal) - Opera: Multiple vulnerabilities
Opera contain several vulnerabilities, some of which may allow the execution of arbitrary code.
Opera contain several vulnerabilities, some of which may allow the execution of arbitrary code.
GLSA 200708-16 (normal) - Qt: Multiple format string vulnerabilities
Format string vulnerabilities in Qt 3 may lead to the remote execution of arbitrary code in some Qt applications.
Format string vulnerabilities in Qt 3 may lead to the remote execution of arbitrary code in some Qt applications.
GLSA 200708-15 (low) - Apache mod_jk: Directory traversal
A directory traversal vulnerability has been discovered in Apache mod_jk.
A directory traversal vulnerability has been discovered in Apache mod_jk.
GLSA 200708-14 (normal) - NVIDIA drivers: Denial of Service
A vulnerability has been discovered in the NVIDIA graphic drivers, allowing for a Denial of Service.
A vulnerability has been discovered in the NVIDIA graphic drivers, allowing for a Denial of Service.
GLSA 200708-13 (normal) - BIND: Weak random number generation
The ISC BIND random number generator uses a weak algorithm, making it easier to guess the next query ID and perform a DNS cache poisoning attack.
The ISC BIND random number generator uses a weak algorithm, making it easier to guess the next query ID and perform a DNS cache poisoning attack.
GLSA 200708-12 (normal) - Wireshark: Multiple vulnerabilities
Multiple vulnerabilities have been discovered in Wireshark, allowing for the remote execution of arbitrary code and a Denial of Service.
Multiple vulnerabilities have been discovered in Wireshark, allowing for the remote execution of arbitrary code and a Denial of Service.
GLSA 200708-11 (normal) - Lighttpd: Multiple vulnerabilities
Several vulnerabilities were reported in Lighttpd, most of them allowing a Denial of Service and potentially the remote execution of arbitrary code.
Several vulnerabilities were reported in Lighttpd, most of them allowing a Denial of Service and potentially the remote execution of arbitrary code.
GLSA 200708-10 (normal) - MySQL: Denial of Service and information leakage
A Denial of Service vulnerability and a table structure information leakage vulnerability were found in MySQL.
A Denial of Service vulnerability and a table structure information leakage vulnerability were found in MySQL.
« Previous 1 ... 120 121 122 123 124 ... 173 Next »
Also available in: Atom