Gentoo Linux Security Advisories
GLSA 201512-12 (normal) - KDE Systemsettings: Privilege escalation
Data validation in KDE Systemsettings could lead to local privilege escalation.
Data validation in KDE Systemsettings could lead to local privilege escalation.
GLSA 201512-11 (high) - Firebird: Buffer Overflow
A buffer overflow in Firebird might allow remote attackers to execute arbitrary code.
A buffer overflow in Firebird might allow remote attackers to execute arbitrary code.
GLSA 201512-10 (normal) - Mozilla Products: Multiple vulnerabilities
Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird, the worst of which may allow user-assisted execution of arbitrary code.
Multiple vulnerabilities have been found in Mozilla Firefox and Thunderbird, the worst of which may allow user-assisted execution of arbitrary code.
GLSA 201512-09 (normal) - encfs: Multiple vulnerabilities
Multiple vulnerabilities have been found in encfs, the worst of which can allow remote attackers to execute arbitrary code or cause a Denial of Service condition.
Multiple vulnerabilities have been found in encfs, the worst of which can allow remote attackers to execute arbitrary code or cause a Denial of Service condition.
GLSA 201512-08 (normal) - ClamAV: Multiple vulnerabilities
Multiple vulnerabilities have been found in ClamAV, possibly resulting in Denial of Service.
Multiple vulnerabilities have been found in ClamAV, possibly resulting in Denial of Service.
GLSA 201512-07 (normal) - GStreamer: User-assisted execution of arbitrary code
A buffer overflow in GStreamer could allow remote attackers to execute arbitrary code or cause Denial of Service.
A buffer overflow in GStreamer could allow remote attackers to execute arbitrary code or cause Denial of Service.
GLSA 201512-06 (normal) - MPFR: User-assisted execution of arbitrary code
A buffer overflow vulnerability in MPFR could allow remote attackers to execute arbitrary code or cause Denial of Service.
A buffer overflow vulnerability in MPFR could allow remote attackers to execute arbitrary code or cause Denial of Service.
GLSA 201512-05 (normal) - gdk-pixbuf: Multiple Vulnerabilities
Multiple buffer overflow vulnerabilities in gdk-pixbuf may allow remote attackers to execute arbitrary code or cause Denial of Service.
Multiple buffer overflow vulnerabilities in gdk-pixbuf may allow remote attackers to execute arbitrary code or cause Denial of Service.
GLSA 201512-04 (normal) - OpenSSH: Multiple vulnerabilities
Multiple vulnerabilities have been found in OpenSSH, the worst of which could lead to arbitrary code execution, or cause a Denial of Service condition.
Multiple vulnerabilities have been found in OpenSSH, the worst of which could lead to arbitrary code execution, or cause a Denial of Service condition.
GLSA 201512-03 (normal) - GRUB: Authentication bypass
GRUB's authentication prompt can be bypassed by entering a sequence of backspace characters.
GRUB's authentication prompt can be bypassed by entering a sequence of backspace characters.
GLSA 201512-02 (normal) - IPython: User-assisted execution of arbitrary code
A vulnerability in IPython could result in execution of arbitrary JavaScript.
A vulnerability in IPython could result in execution of arbitrary JavaScript.
GLSA 201512-01 (normal) - Dnsmasq: Denial of Service
A vulnerability in Dnsmasq can lead to a Denial of Service condition.
A vulnerability in Dnsmasq can lead to a Denial of Service condition.
GLSA 201511-02 (normal) - Adobe Flash Player: Multiple vulnerabilities
Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code.
Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code.
GLSA 201511-01 (normal) - MirBSD Korn Shell: Arbitrary code execution
An attacker who already had access to the environment could so append values to parameters passed through programs.
An attacker who already had access to the environment could so append values to parameters passed through programs.
GLSA 201510-08 (normal) - cups-filters: Multiple vulnerabilities
Multiple vulnerabilities have been found in cups-filters, the worst of which could lead to arbitrary code execution.
Multiple vulnerabilities have been found in cups-filters, the worst of which could lead to arbitrary code execution.
GLSA 201510-07 (normal) - CUPS: Multiple vulnerabilities
Multiple vulnerabilities have been found in CUPS, the worst of which could lead to arbitrary code execution.
Multiple vulnerabilities have been found in CUPS, the worst of which could lead to arbitrary code execution.
GLSA 201510-06 (normal) - Django: Multiple vulnerabilities
Multiple vulnerabilities have been found in Django, the worst of which may allow a remote attacker to cause Denial of Service.
Multiple vulnerabilities have been found in Django, the worst of which may allow a remote attacker to cause Denial of Service.
GLSA 201510-05 (normal) - MediaWiki: Multiple vulnerabilities
Multiple vulnerabilities have been found in MediaWiki, the worst of which may allow remote attackers to cause a Denial of Service.
Multiple vulnerabilities have been found in MediaWiki, the worst of which may allow remote attackers to cause a Denial of Service.
GLSA 201510-04 (normal) - tcpdump: Multiple vulnerabilities
Multiple vulnerabilities have been found in tcpdump, the worst of which can allow remote attackers to cause Denial of Service condition or executive arbitrary code.
Multiple vulnerabilities have been found in tcpdump, the worst of which can allow remote attackers to cause Denial of Service condition or executive arbitrary code.
GLSA 201510-03 (normal) - Wireshark: Multiple vulnerabilities
Multiple vulnerabilities have been found in Wireshark, allowing attackers to cause Denial of Service condition.
Multiple vulnerabilities have been found in Wireshark, allowing attackers to cause Denial of Service condition.
« Previous 1 ... 80 81 82 83 84 ... 190 Next »
Also available in: Atom