Gentoo Linux Security Advisories
GLSA 201711-10 (normal) - Cacti: Multiple vulnerabilities
Multiple vulnerabilities have been found in Cacti, the worst of which could lead to the remote execution of arbitrary code.
Multiple vulnerabilities have been found in Cacti, the worst of which could lead to the remote execution of arbitrary code.
GLSA 201711-09 (normal) - LXC: Remote security bypass
A vulnerability in LXC may lead to an unauthorized security bypass.
A vulnerability in LXC may lead to an unauthorized security bypass.
GLSA 201711-08 (normal) - LibXfont, LibXfont2: Multiple vulnerabilities
Multiple vulnerabilities have been found in LibXfont and Libxfont2, the worst of which could allow attackers to cause a Denial of Service condition.
Multiple vulnerabilities have been found in LibXfont and Libxfont2, the worst of which could allow attackers to cause a Denial of Service condition.
GLSA 201711-07 (normal) - ImageMagick: Multiple vulnerabilities
Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition.
Multiple vulnerabilities have been found in ImageMagick, the worst of which may allow remote attackers to cause a Denial of Service condition.
GLSA 201711-06 (normal) - GNU Wget: Multiple vulnerabilities
Multiple vulnerabilities have been found in Wget, the worst of which could allow remote attackers to execute arbitrary code.
Multiple vulnerabilities have been found in Wget, the worst of which could allow remote attackers to execute arbitrary code.
GLSA 201711-05 (normal) - X.Org Server: Multiple vulnerabilities
Multiple vulnerabilities have been found in X.Org Server, the worst of which could allow an attacker to execute arbitrary code.
Multiple vulnerabilities have been found in X.Org Server, the worst of which could allow an attacker to execute arbitrary code.
GLSA 201711-04 (normal) - MariaDB, MySQL: Root privilege escalation
A vulnerability was discovered in MariaDB and MySQL which may allow local users to gain root privileges.
A vulnerability was discovered in MariaDB and MySQL which may allow local users to gain root privileges.
GLSA 201711-03 (normal) - hostapd and wpa_supplicant: Key Reinstallation (KRACK) attacks
A flaw was discovered in the 4-way handshake in hostapd and wpa_supplicant that allows attackers to conduct a Man in the Middle attack.
A flaw was discovered in the 4-way handshake in hostapd and wpa_supplicant that allows attackers to conduct a Man in the Middle attack.
GLSA 201711-02 (normal) - Chromium, Google Chrome: Multiple vulnerabilities
Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the execution of arbitrary code.
Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the execution of arbitrary code.
GLSA 201711-01 (normal) - libxml2: Multiple vulnerabilities
Multiple vulnerabilities have been found in libxml2, the worst of which could result in the execution of arbitrary code.
Multiple vulnerabilities have been found in libxml2, the worst of which could result in the execution of arbitrary code.
GLSA 201710-32 (normal) - Apache: Multiple vulnerabilities
Multiple vulnerabilities have been found in Apache, the worst of which may result in the loss of secrets.
Multiple vulnerabilities have been found in Apache, the worst of which may result in the loss of secrets.
GLSA 201710-31 (normal) - Oracle JDK/JRE: Multiple vulnerabilities
Multiple vulnerabilities have been found in Oracle's JDK and JRE software suites, the worst of which can be remotely exploited without authentication.
Multiple vulnerabilities have been found in Oracle's JDK and JRE software suites, the worst of which can be remotely exploited without authentication.
GLSA 201710-30 (normal) - X.Org Server: Multiple vulnerabilities
Multiple vulnerabilities have been found in X.Org Server the worst of which could allow a local attacker to replace shared memory segments.
Multiple vulnerabilities have been found in X.Org Server the worst of which could allow a local attacker to replace shared memory segments.
GLSA 201710-29 (normal) - Asterisk: Multiple vulnerabilities
Multiple vulnerabilities have been found in Asterisk, the worst of which allows remote execution of arbitrary shell commands.
Multiple vulnerabilities have been found in Asterisk, the worst of which allows remote execution of arbitrary shell commands.
GLSA 201710-28 (normal) - Jython: Arbitrary code execution
A vulnerability in Jython may lead to arbitrary code execution.
A vulnerability in Jython may lead to arbitrary code execution.
GLSA 201710-27 (normal) - Dnsmasq: Multiple vulnerabilities
Multiple vulnerabilities have been found in Dnsmasq, the worst of which may allow remote attackers to execute arbitrary code.
Multiple vulnerabilities have been found in Dnsmasq, the worst of which may allow remote attackers to execute arbitrary code.
GLSA 201710-26 (normal) - OpenJPEG: Multiple vulnerabilities
Multiple vulnerabilities have been found in OpenJPEG, the worst of which may allow remote attackers to execute arbitrary code.
Multiple vulnerabilities have been found in OpenJPEG, the worst of which may allow remote attackers to execute arbitrary code.
GLSA 201710-25 (normal) - PCRE: Multiple vulnerabilities
Multiple vulnerabilities have been found in the PCRE Library, the worst of which may allow remote attackers to cause a Denial of Service condition.
Multiple vulnerabilities have been found in the PCRE Library, the worst of which may allow remote attackers to cause a Denial of Service condition.
GLSA 201710-24 (normal) - Chromium, Google Chrome: Multiple vulnerabilities
Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the execution of arbitrary code.
Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the execution of arbitrary code.
GLSA 201710-23 (normal) - Go: Multiple vulnerabilities
Multiple vulnerabilities have been found in Go, the worst of which may result in the execution of arbitrary commands.
Multiple vulnerabilities have been found in Go, the worst of which may result in the execution of arbitrary commands.
« Previous 1 ... 59 60 61 62 63 ... 190 Next »
Also available in: Atom