Gentoo Linux Security Advisories
GLSA 201803-04 (normal) - Newsbeuter: User-assisted execution of arbitrary code
A vulnerability in Newsbeuter may allow remote attackers to execute arbitrary shell commands.
A vulnerability in Newsbeuter may allow remote attackers to execute arbitrary shell commands.
GLSA 201803-03 (high) - Go: User-assisted execution of arbitrary code
A vulnerability in Go might allow remote attackers to execute arbitrary commands during source code build.
A vulnerability in Go might allow remote attackers to execute arbitrary commands during source code build.
GLSA 201803-02 (high) - util-linux: User-assisted execution of arbitrary code
A vulnerability was discovered in util-linux, which could potentially lead to the execution of arbitrary code.
A vulnerability was discovered in util-linux, which could potentially lead to the execution of arbitrary code.
GLSA 201803-01 (high) - Exim: Multiple vulnerabilities
Multiple vulnerabilities have been found in Exim, the worst of which allows remote attackers to execute arbitrary code.
Multiple vulnerabilities have been found in Exim, the worst of which allows remote attackers to execute arbitrary code.
GLSA 201802-06 (normal) - LibreOffice: Information disclosure
A vulnerability in LibreOffice might allow remote attackers to read arbitrary files.
A vulnerability in LibreOffice might allow remote attackers to read arbitrary files.
GLSA 201802-05 (normal) - Ruby: Command injection
A vulnerability has been found in Ruby which may allow for arbitrary command execution.
A vulnerability has been found in Ruby which may allow for arbitrary command execution.
GLSA 201802-04 (high) - MySQL: Multiple vulnerabilities
Multiple vulnerabilities were found in MySQL, the worst of which may allow remote execution of arbitrary code.
Multiple vulnerabilities were found in MySQL, the worst of which may allow remote execution of arbitrary code.
GLSA 201802-03 (high) - Mozilla Firefox: Multiple vulnerabilities
Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which may allow execution of arbitrary code.
Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which may allow execution of arbitrary code.
GLSA 201802-02 (normal) - Chromium, Google Chrome: Multiple vulnerabilities
Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the execution of arbitrary code.
Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the execution of arbitrary code.
GLSA 201802-01 (high) - VirtualBox: Multiple vulnerabilities
Multiple vulnerabilities have been found in VirtualBox, the worst of which could allow an attacker to take control of VirtualBox.
Multiple vulnerabilities have been found in VirtualBox, the worst of which could allow an attacker to take control of VirtualBox.
GLSA 201801-20 (normal) - Fossil: User-assisted execution of arbitrary code
A vulnerability has been discovered in Fossil allowing for user-assisted remote execution of arbitrary code.
A vulnerability has been discovered in Fossil allowing for user-assisted remote execution of arbitrary code.
GLSA 201801-19 (high) - ClamAV: Multiple vulnerabilities
Multiple vulnerabilities have been found in ClamAV, the worst of which may allow execution of arbitrary code.
Multiple vulnerabilities have been found in ClamAV, the worst of which may allow execution of arbitrary code.
GLSA 201801-18 (normal) - Newsbeuter: User-assisted execution of arbitrary code
Insufficient input validation in Newsbeuter may allow remote attackers to execute arbitrary shell commands.
Insufficient input validation in Newsbeuter may allow remote attackers to execute arbitrary shell commands.
GLSA 201801-17 (normal) - Poppler: Multiple vulnerabilities
Multiple vulnerabilities have been found in Poppler, the worst of which could allow the execution of arbitrary code.
Multiple vulnerabilities have been found in Poppler, the worst of which could allow the execution of arbitrary code.
GLSA 201801-16 (normal) - rsync: Multiple vulnerabilities
Multiple vulnerabilities have been found in rsync, the worst of which could allow remote attackers to bypass access restrictions.
Multiple vulnerabilities have been found in rsync, the worst of which could allow remote attackers to bypass access restrictions.
GLSA 201801-15 (normal) - PolarSSL: Multiple vulnerabilities
Multiple vulnerabilities have been found in PolarSSL, the worst of which may allow remote attackers to execute arbitrary code.
Multiple vulnerabilities have been found in PolarSSL, the worst of which may allow remote attackers to execute arbitrary code.
GLSA 201801-14 (high) - Xen: Multiple vulnerabilities
Multiple vulnerabilities have been found in Xen, the worst of which could allow for privilege escalation.
Multiple vulnerabilities have been found in Xen, the worst of which could allow for privilege escalation.
GLSA 201801-13 (normal) - TigerVNC: Multiple vulnerabilities
Multiple vulnerabilities have been found in TigerVNC, the worst of which may lead to arbitrary code execution.
Multiple vulnerabilities have been found in TigerVNC, the worst of which may lead to arbitrary code execution.
GLSA 201801-12 (normal) - icoutils: Multiple vulnerabilities
Multiple vulnerabilities have been found in icoutils, the worst of which may lead to arbitrary code execution.
Multiple vulnerabilities have been found in icoutils, the worst of which may lead to arbitrary code execution.
GLSA 201801-11 (normal) - PySAML2: Security bypass
A vulnerability in PySAML2 might allow remote attackers to bypass authentication.
A vulnerability in PySAML2 might allow remote attackers to bypass authentication.
« Previous 1 ... 57 58 59 60 61 ... 190 Next »
Also available in: Atom