Gentoo Linux Security Advisories

GLSA 201006-13 (normal) - Smarty: Multiple vulnerabilities
Multiple vulnerabilities in the Smarty template engine might allow remote attackers to execute arbitrary PHP code.
GLSA 201006-12 (normal) - Fetchmail: Multiple vulnerabilities
Multiple vulnerabilities have been reported in Fetchmail, allowing remote attackers to execute arbitrary code or to conduct Man-in-the-Middle attacks.
GLSA 201006-11 (normal) - BIND: Multiple vulnerabilities
Several cache poisoning vulnerabilities have been found in BIND.
GLSA 201006-10 (normal) - multipath-tools: World-writeable socket
multipath-tools does not set correct permissions on the socket file, making it possible to send arbitrary commands to the multipath daemon for local users.
GLSA 201006-09 (high) - sudo: Privilege escalation
A flaw in sudo's -e option may allow local attackers to execute arbitrary commands.
GLSA 201006-08 (normal) - nano: Multiple vulnerabilities
Race conditions when editing files could lead to symlink attacks or changes of ownerships of important files.
GLSA 201006-07 (normal) - SILC: Multiple vulnerabilities
Multiple vulnerabilities were discovered in SILC Toolkit and SILC Client, the worst of which allowing for execution of arbitrary code.
GLSA 201006-06 (normal) - Transmission: Multiple vulnerabilities
Stack-based buffer overflows in Transmission may allow for remote execution of arbitrary code.
GLSA 201006-05 (normal) - Wireshark: Multiple vulnerabilities
Multiple vulnerabilities were found in Wireshark.
GLSA 201006-04 (normal) - xine-lib: User-assisted execution of arbitrary code
Multiple vulnerabilities in xine-lib might result in the remote execution of arbitrary code.
GLSA 201006-03 (normal) - ImageMagick: User-assisted execution of arbitrary code
An integer overflow in ImageMagick might allow remote attackers to cause the remote execution of arbitrary code.
GLSA 201006-02 (normal) - CamlImages: User-assisted execution of arbitrary code
Multiple integer overflows in CamlImages might result in the remote execution of arbitrary code.
GLSA 201006-01 (normal) - FreeType 1: User-assisted execution of arbitrary code
Multiple vulnerabilities in FreeType might result in the remote execution of arbitrary code.
GLSA 201003-01 (high) - sudo: Privilege escalation
Two vulnerabilities in sudo might allow local users to escalate privileges and execute arbitrary code with root privileges.
GLSA 201001-09 (normal) - Ruby: Terminal Control Character Injection
An input sanitation flaw in the WEBrick HTTP server included in Ruby might allow remote attackers to inject arbitrary control characters into terminal sessions.
GLSA 201001-08 (high) - SquirrelMail: Multiple vulnerabilities
Multiple vulnerabilities were found in SquirrelMail of which the worst results in remote code execution.
GLSA 201001-07 (normal) - Blender: Untrusted search path
An untrusted search path vulnerability in Blender might result in the execution of arbitrary code.
GLSA 201001-06 (normal) - aria2: Multiple vulnerabilities
A buffer overflow and a format string vulnerability in aria2 allow remote attackers to execute arbitrary code.
GLSA 201001-05 (normal) - net-snmp: Authorization bypass
A remote attacker can bypass the tcp-wrappers client authorization in net-snmp.
GLSA 201001-04 (normal) - VirtualBox: Multiple vulnerabilities
Multiple vulnerabilities in VirtualBox were found, the worst of which allowing for privilege escalation.

« Previous 1 ... 96 97 98 99 100 ... 173 Next »

Also available in: Atom

Thank you!