Gentoo Linux Security Advisories
GLSA 201402-24 (normal) - GnuPG, Libgcrypt: Multiple vulnerabilities
Multiple vulnerabilities have been discovered in GnuPG and Libgcrypt, which may result in execution of arbitrary code, Denial of Service, or the disclosure of private keys.
Multiple vulnerabilities have been discovered in GnuPG and Libgcrypt, which may result in execution of arbitrary code, Denial of Service, or the disclosure of private keys.
GLSA 201402-23 (high) - libXfont: Multiple vulnerabilities
Multiple vulnerabilities have been found in libXfont, the worst of which allow for local privilege escalation.
Multiple vulnerabilities have been found in libXfont, the worst of which allow for local privilege escalation.
GLSA 201402-22 (normal) - TCPTrack: Arbitrary code execution
A heap-based buffer overflow in TCPTrack might allow a remote attacker to execute arbitrary code.
A heap-based buffer overflow in TCPTrack might allow a remote attacker to execute arbitrary code.
GLSA 201402-21 (normal) - libTIFF: Multiple vulnerabilities
Multiple vulnerabilities have been found in libTIFF, allowing remote attackers to execute arbitrary code or cause Denial of Service.
Multiple vulnerabilities have been found in libTIFF, allowing remote attackers to execute arbitrary code or cause Denial of Service.
GLSA 201402-20 (high) - KVIrc: Multiple vulnerabilities
Multiple vulnerabilities have been found in KVIrc, the worst of which allows remote attackers to execute arbitrary code.
Multiple vulnerabilities have been found in KVIrc, the worst of which allows remote attackers to execute arbitrary code.
GLSA 201402-19 (normal) - libtar: Arbitraty code execution
A buffer overflow in libtar might allow remote attackers to execute arbitrary code or cause a Denial of Service condition.
A buffer overflow in libtar might allow remote attackers to execute arbitrary code or cause a Denial of Service condition.
GLSA 201402-18 (normal) - GNU Midnight Commander: User-assisted execution of arbitrary code
GNU Midnight Commander does not properly sanitize environment variables, possibly resulting in execution of arbitrary code or Denial of Service.
GNU Midnight Commander does not properly sanitize environment variables, possibly resulting in execution of arbitrary code or Denial of Service.
GLSA 201402-17 (normal) - Xpdf: User-assisted execution of arbitrary code
Multiple vulnerabilities in Xpdf could result in execution of arbitrary code.
Multiple vulnerabilities in Xpdf could result in execution of arbitrary code.
GLSA 201402-16 (normal) - FreeType: Multiple vulnerabilities
Multiple vulnerabilities have been found in FreeType, allowing context-dependent attackers to possibly execute arbitrary code or cause Denial of Service.
Multiple vulnerabilities have been found in FreeType, allowing context-dependent attackers to possibly execute arbitrary code or cause Denial of Service.
GLSA 201402-15 (high) - Roundcube: Arbitrary code execution
A vulnerability in Roundcube could result in arbitrary code execution, SQL injection, or reading of arbitrary files.
A vulnerability in Roundcube could result in arbitrary code execution, SQL injection, or reading of arbitrary files.
GLSA 201402-14 (normal) - International Components for Unicode: Denial of Service
Two vulnerabilities in International Components for Unicode might allow remote attackers to cause a Denial of Service condition.
Two vulnerabilities in International Components for Unicode might allow remote attackers to cause a Denial of Service condition.
GLSA 201402-13 (normal) - DjVu: User-assisted execution of arbitrary code
A vulnerability in DjVu could result in execution of arbitrary code or Denial of Service.
A vulnerability in DjVu could result in execution of arbitrary code or Denial of Service.
GLSA 201402-12 (normal) - PAM S/Key: Information disclosure
PAM S/Key does not clear provided credentials from memory, allowing local attackers to gain access to cleartext credentials.
PAM S/Key does not clear provided credentials from memory, allowing local attackers to gain access to cleartext credentials.
GLSA 201402-11 (normal) - Links: Denial of Service
An integer overflow in Links might allow remote attackers to cause a Denial of Service condition.
An integer overflow in Links might allow remote attackers to cause a Denial of Service condition.
GLSA 201402-10 (normal) - PulseAudio: Insecure temporary file usage
An insecure temporary file usage has been reported in PulseAudio, possibly allowing symlink attacks.
An insecure temporary file usage has been reported in PulseAudio, possibly allowing symlink attacks.
GLSA 201402-09 (normal) - Apache mod_fcgid: Arbitrary code execution
A buffer overflow in Apache mod_fcgid might allow remote attackers to execute arbitrary code or cause a Denial of Service condition.
A buffer overflow in Apache mod_fcgid might allow remote attackers to execute arbitrary code or cause a Denial of Service condition.
GLSA 201402-08 (normal) - stunnel: Arbitrary code execution
A vulnerability has been found in stunnel, allowing for the execution of arbitrary code.
A vulnerability has been found in stunnel, allowing for the execution of arbitrary code.
GLSA 201402-07 (normal) - Freeciv: User-assisted execution of arbitrary code
A vulnerability in Freeciv may allow a remote attacker to execute arbitrary code.
A vulnerability in Freeciv may allow a remote attacker to execute arbitrary code.
GLSA 201402-06 (normal) - Adobe Flash Player: Multiple vulnerabilities
Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which could result in execution of arbitrary code.
Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which could result in execution of arbitrary code.
GLSA 201402-05 (low) - Banshee: Arbitrary code execution
An environment variable processing error has been reported in Banshee, possibly allowing local attacker to load a specially crafted shared library.
An environment variable processing error has been reported in Banshee, possibly allowing local attacker to load a specially crafted shared library.
« Previous 1 ... 94 95 96 97 98 ... 190 Next »
Also available in: Atom
