Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Gentoo Linux

This vulnerability report for Gentoo Linux contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Gentoo Linux then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Gentoo

Product Link N/A

Affected By 2089 Secunia advisories
8101 Vulnerabilities

Monitor Product Receive alerts for this product





270 Secunia Advisories in 2004

Secunia has issued a total of 270 Secunia advisories in 2004 for Gentoo Linux. Currently, 0% (0 out of 270) are marked as unpatched.

More information about the specific Secunia advisories affecting Gentoo Linux can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Gentoo update for phprojekt
Vendor Patch. Secunia Advisory 1 of 270 in 2004. 7,899 views.
Release Date:
2004-12-30
Secunia Advisory ID:
SA13698
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for phprojekt. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for ViewCVS
Vendor Patch. Secunia Advisory 2 of 270 in 2004. 9,530 views.
Release Date:
2004-12-29
Secunia Advisory ID:
SA13683
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Where:
From remote
Short Description:
Gentooo has issued an update for ViewCVS. This fixes two vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and conduct cross-site scripting attacks. [Read More]


Gentoo update for xpdf/gpdf
Vendor Patch. Secunia Advisory 3 of 270 in 2004. 6,805 views.
Release Date:
2004-12-28
Secunia Advisory ID:
SA13628
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for xpdf and gpdf. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for cups
Vendor Patch. Secunia Advisory 4 of 270 in 2004. 7,528 views.
Release Date:
2004-12-28
Secunia Advisory ID:
SA13672
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for cups. This fixes multiple vulnerabilities, which can be exploited by malicious users to manipulate certain files, cause a DoS (Denial of Service), or compromise a vulnerable system. [Read More]


Gentoo update for Zwiki
Vendor Patch. Secunia Advisory 5 of 270 in 2004. 11,630 views.
Release Date:
2004-12-22
Secunia Advisory ID:
SA13606
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for Zwiki. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Gentoo update for mpg123
Vendor Patch. Secunia Advisory 6 of 270 in 2004. 11,018 views.
Release Date:
2004-12-22
Secunia Advisory ID:
SA13616
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mpg123. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for mplayer
Vendor Patch. Secunia Advisory 7 of 270 in 2004. 11,485 views.
Release Date:
2004-12-21
Secunia Advisory ID:
SA13585
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mplayer. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for PHP
Vendor Patch. Secunia Advisory 8 of 270 in 2004. 11,447 views.
Release Date:
2004-12-20
Secunia Advisory ID:
SA13562
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Privilege escalation
Exposure of sensitive information
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for PHP. This fixes some vulnerabilities, which can be exploited to gain escalated privileges, bypass certain security restrictions, gain knowledge of sensitive information, or compromise a vulnerable system. [Read More]


Gentoo update for Ethereal
Vendor Patch. Secunia Advisory 9 of 270 in 2004. 12,192 views.
Release Date:
2004-12-20
Secunia Advisory ID:
SA13561
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Ethereal. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for kdelibs / kdebase
Vendor Patch. Secunia Advisory 10 of 270 in 2004. 13,863 views.
Release Date:
2004-12-20
Secunia Advisory ID:
SA13560
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued updates for kdebase and kdelibs. These fix some vulnerabilities, which can be exploited by malicious people to spoof the content of websites. [Read More]


Gentoo update for KDE kfax
Vendor Patch. Secunia Advisory 11 of 270 in 2004. 12,176 views.
Release Date:
2004-12-20
Secunia Advisory ID:
SA13559
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for KDE kfax. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for abcm2ps
Vendor Patch. Secunia Advisory 12 of 270 in 2004. 11,906 views.
Release Date:
2004-12-20
Secunia Advisory ID:
SA13558
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for abcm2ps. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for phpMyAdmin
Vendor Patch. Secunia Advisory 13 of 270 in 2004. 11,016 views.
Release Date:
2004-12-20
Secunia Advisory ID:
SA13557
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for phpMyAdmin. This fixes two vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system and by malicious users to disclose sensitive information. [Read More]


Gentoo update for nasm
Vendor Patch. Secunia Advisory 14 of 270 in 2004. 11,998 views.
Release Date:
2004-12-20
Secunia Advisory ID:
SA13587
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for nasm. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for Samba
Vendor Patch. Secunia Advisory 15 of 270 in 2004. 11,982 views.
Release Date:
2004-12-20
Secunia Advisory ID:
SA13570
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Gentoo update for cscope
Vendor Patch. Secunia Advisory 16 of 270 in 2004. 11,776 views.
Release Date:
2004-12-17
Secunia Advisory ID:
SA13503
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for cscope. This fixes a vulnerability, which potentially can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo update for acroread
Vendor Patch. Secunia Advisory 17 of 270 in 2004. 11,687 views.
Release Date:
2004-12-17
Secunia Advisory ID:
SA13499
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for acroread. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for vim/gvim
Vendor Patch. Secunia Advisory 18 of 270 in 2004. 12,855 views.
Release Date:
2004-12-16
Secunia Advisory ID:
SA13498
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates for vim and gvim. These fix some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for ncpfs
Vendor Patch. Secunia Advisory 19 of 270 in 2004. 8,225 views.
Release Date:
2004-12-15
Secunia Advisory ID:
SA13480
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Gentoo has issued an update for ncpfs. This fixes a potential vulnerability, which can be exploited by malicious, local users. [Read More]


Gentoo update for nfs-utils
Vendor Patch. Secunia Advisory 20 of 270 in 2004. 7,441 views.
Release Date:
2004-12-14
Secunia Advisory ID:
SA13459
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for nfs-utils. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Gentoo update for file
Vendor Patch. Secunia Advisory 21 of 270 in 2004. 6,899 views.
Release Date:
2004-12-14
Secunia Advisory ID:
SA13439
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for file. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for phprojekt
Vendor Patch. Secunia Advisory 22 of 270 in 2004. 8,445 views.
Release Date:
2004-12-13
Secunia Advisory ID:
SA13428
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for phprojekt. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for imlib
Vendor Patch. Secunia Advisory 23 of 270 in 2004. 12,447 views.
Release Date:
2004-12-07
Secunia Advisory ID:
SA13382
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for imlib. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo mirrorselect Insecure Temporary File Creation Vulnerability
Vendor Patch. Secunia Advisory 24 of 270 in 2004. 15,473 views.
Release Date:
2004-12-07
Secunia Advisory ID:
SA13392
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Ervin Nemeth has reported a vulnerability in mirrorselect, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo update for perl
Vendor Patch. Secunia Advisory 25 of 270 in 2004. 12,306 views.
Release Date:
2004-12-07
Secunia Advisory ID:
SA13388
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for perl. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo rssh Arbitrary Command Execution Vulnerability
Vendor Workaround. Secunia Advisory 26 of 270 in 2004. 8,565 views.
Release Date:
2004-12-06
Secunia Advisory ID:
SA13379
Solution Status:
Vendor Workaround
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Gentoo has acknowledged a vulnerability in rssh, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


Gentoo update for scponly
Vendor Patch. Secunia Advisory 27 of 270 in 2004. 7,968 views.
Release Date:
2004-12-06
Secunia Advisory ID:
SA13369
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Gentoo has issued an update for scponly. This fixes a vulnerability, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


Gentoo update for pdflib
Vendor Patch. Secunia Advisory 28 of 270 in 2004. 8,735 views.
Release Date:
2004-12-06
Secunia Advisory ID:
SA13373
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for pdflib. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system or cause a DoS (Denial of Service). [Read More]


Gentoo update for sun-jdk/sun-jre-bin/blackdown-jdk/blackdown-jre
Vendor Patch. Secunia Advisory 29 of 270 in 2004. 9,179 views.
Release Date:
2004-11-30
Secunia Advisory ID:
SA13332
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for sun-jdk, sun-jre-bin, blackdown-jdk, and blackdown-jre. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for phpmyadmin
Vendor Patch. Secunia Advisory 30 of 270 in 2004. 7,821 views.
Release Date:
2004-11-29
Secunia Advisory ID:
SA13322
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for phpmyadmin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Gentoo update for opendchub
Vendor Patch. Secunia Advisory 31 of 270 in 2004. 8,329 views.
Release Date:
2004-11-29
Secunia Advisory ID:
SA13326
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for opendchub. This fixes a vulnerability, which can be exploited by certain malicious users to compromise a vulnerable system. [Read More]


Gentoo update for phpwebsite
Vendor Patch. Secunia Advisory 32 of 270 in 2004. 7,474 views.
Release Date:
2004-11-29
Secunia Advisory ID:
SA13324
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for phpwebsite. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Gentoo update for cyrus-imapd
Vendor Patch. Secunia Advisory 33 of 270 in 2004. 7,117 views.
Release Date:
2004-11-25
Secunia Advisory ID:
SA13309
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for cyrus-imapd. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo prozilla Multiple Buffer Overflow Vulnerabilities
Vendor Workaround. Secunia Advisory 34 of 270 in 2004. 7,459 views.
Release Date:
2004-11-24
Secunia Advisory ID:
SA13295
Solution Status:
Vendor Workaround
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has acknowledged some vulnerabilities in the prozilla package, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for phpbb
Vendor Patch. Secunia Advisory 35 of 270 in 2004. 8,126 views.
Release Date:
2004-11-24
Secunia Advisory ID:
SA13293
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
System access
Where:
From remote
Short Description:
Gentoo has issued an update for phpbb. This fixes some vulnerabilities, which can be exploited by malicious people to execute arbitrary commands, conduct SQL injection and cross-site scripting attacks. [Read More]


Gentoo update for twiki
Vendor Patch. Secunia Advisory 36 of 270 in 2004. 7,352 views.
Release Date:
2004-11-24
Secunia Advisory ID:
SA13296
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for twiki. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for pdftohtml
Vendor Patch. Secunia Advisory 37 of 270 in 2004. 7,682 views.
Release Date:
2004-11-23
Secunia Advisory ID:
SA13281
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for pdftohtml. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for xorg-x11/xfree
Vendor Patch. Secunia Advisory 38 of 270 in 2004. 7,738 views.
Release Date:
2004-11-22
Secunia Advisory ID:
SA13249
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for xorg-x11 and xfree. These fix some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Gentoo update for unarj
Vendor Patch. Secunia Advisory 39 of 270 in 2004. 6,615 views.
Release Date:
2004-11-22
Secunia Advisory ID:
SA13231
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for unarj. This fixes two vulnerabilities, which potentially can be exploited by malicious people to overwrite files or compromise a user's system. [Read More]


Gentoo update for fcron
Vendor Patch. Secunia Advisory 40 of 270 in 2004. 7,944 views.
Release Date:
2004-11-19
Secunia Advisory ID:
SA13242
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for fcron. This fixes four vulnerabilities, which can be exploited by malicious, local users to gain knowledge of sensitive information, bypass access restrictions, and delete arbitrary files. [Read More]


Gentoo GIMPS/SETI@home/ChessBrain Insecure File Ownership
Vendor Patch. Secunia Advisory 41 of 270 in 2004. 7,369 views.
Release Date:
2004-11-18
Secunia Advisory ID:
SA13223
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates for GIMPS, SETI@home, and ChessBrain. These fix some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for SquirrelMail
Vendor Patch. Secunia Advisory 42 of 270 in 2004. 8,720 views.
Release Date:
2004-11-17
Secunia Advisory ID:
SA13221
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for SquirrelMail. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Gentoo update for bnc
Vendor Patch. Secunia Advisory 43 of 270 in 2004. 6,995 views.
Release Date:
2004-11-16
Secunia Advisory ID:
SA13217
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for bnc. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for ruby
Vendor Patch. Secunia Advisory 44 of 270 in 2004. 8,614 views.
Release Date:
2004-11-16
Secunia Advisory ID:
SA13216
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for davfs2/lvm-user
Vendor Patch. Secunia Advisory 45 of 270 in 2004. 9,671 views.
Release Date:
2004-11-12
Secunia Advisory ID:
SA13185
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates for davfs2 and lvm-user. These fix some vulnerabilities, which potentially can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo update for samba
Vendor Patch. Secunia Advisory 46 of 270 in 2004. 9,374 views.
Release Date:
2004-11-12
Secunia Advisory ID:
SA13176
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Gentoo update for ez-ipupdate
Vendor Patch. Secunia Advisory 47 of 270 in 2004. 9,777 views.
Release Date:
2004-11-12
Secunia Advisory ID:
SA13175
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ez-ipupdate. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for pavuk
Vendor Patch. Secunia Advisory 48 of 270 in 2004. 7,465 views.
Release Date:
2004-11-11
Secunia Advisory ID:
SA13163
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for pavuk. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for apache
Vendor Patch. Secunia Advisory 49 of 270 in 2004. 6,740 views.
Release Date:
2004-11-10
Secunia Advisory ID:
SA13158
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for apache. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for mtink
Vendor Patch. Secunia Advisory 50 of 270 in 2004. 6,856 views.
Release Date:
2004-11-10
Secunia Advisory ID:
SA13157
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for mtink. This fixes a vulnerability, which potentially can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo update for zip
Vendor Patch. Secunia Advisory 51 of 270 in 2004. 6,743 views.
Release Date:
2004-11-10
Secunia Advisory ID:
SA13150
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for zip. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for gallery
Vendor Patch. Secunia Advisory 52 of 270 in 2004. 8,147 views.
Release Date:
2004-11-08
Secunia Advisory ID:
SA13105
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for gallery. This fixes some vulnerabilities, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Gentoo update for kaffeine/gxine
Vendor Patch. Secunia Advisory 53 of 270 in 2004. 8,493 views.
Release Date:
2004-11-08
Secunia Advisory ID:
SA13118
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for kaffeine and gxine. These fix a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a user's system. [Read More]


Gentoo update for openssl/groff
Vendor Patch. Secunia Advisory 54 of 270 in 2004. 8,219 views.
Release Date:
2004-11-08
Secunia Advisory ID:
SA13122
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates for openssl and groff. These fix some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo Portage/Gentoolkit Insecure Temporary File Creation
Vendor Patch. Secunia Advisory 55 of 270 in 2004. 11,313 views.
Release Date:
2004-11-08
Secunia Advisory ID:
SA13108
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates for Portage and Gentoolkit. These fix some vulnerabilities, which potentially can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo update for zgv
Vendor Patch. Secunia Advisory 56 of 270 in 2004. 9,111 views.
Release Date:
2004-11-08
Secunia Advisory ID:
SA13107
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for zgv. This fixes multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for imagemagick
Vendor Patch. Secunia Advisory 57 of 270 in 2004. 7,796 views.
Release Date:
2004-11-08
Secunia Advisory ID:
SA13106
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for imagemagick. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for shadow
Vendor Patch. Secunia Advisory 58 of 270 in 2004. 6,934 views.
Release Date:
2004-11-05
Secunia Advisory ID:
SA13099
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Gentoo has issued an update for shadow. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Gentoo update for GD
Vendor Patch. Secunia Advisory 59 of 270 in 2004. 7,563 views.
Release Date:
2004-11-04
Secunia Advisory ID:
SA13092
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gd. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for proxytunnel
Vendor Patch. Secunia Advisory 60 of 270 in 2004. 9,476 views.
Release Date:
2004-11-03
Secunia Advisory ID:
SA13087
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for proxytunnel. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for MIME-tools
Vendor Patch. Secunia Advisory 61 of 270 in 2004. 7,618 views.
Release Date:
2004-11-03
Secunia Advisory ID:
SA13077
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for MIME-tools. This fixes a vulnerability, which can be exploited by malware to bypass certain scanning functionality. [Read More]


Gentoo update for libxml2
Vendor Patch. Secunia Advisory 62 of 270 in 2004. 7,456 views.
Release Date:
2004-11-03
Secunia Advisory ID:
SA13076
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libxml2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for Cherokee
Vendor Patch. Secunia Advisory 63 of 270 in 2004. 7,049 views.
Release Date:
2004-11-02
Secunia Advisory ID:
SA13058
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Cherokee. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for Speedtouch USB driver
Vendor Patch. Secunia Advisory 64 of 270 in 2004. 10,642 views.
Release Date:
2004-11-02
Secunia Advisory ID:
SA13069
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for Speedtouch USB driver. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for Apache
Vendor Patch. Secunia Advisory 65 of 270 in 2004. 6,905 views.
Release Date:
2004-11-02
Secunia Advisory ID:
SA13068
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for apache. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for Archive::Zip
Vendor Patch. Secunia Advisory 66 of 270 in 2004. 7,387 views.
Release Date:
2004-11-01
Secunia Advisory ID:
SA13039
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for Archive::Zip. This fixes a vulnerability, which can be exploited by malware to bypass certain scanning functionality. [Read More]


Gentoo update for ppp
Vendor Patch. Secunia Advisory 67 of 270 in 2004. 7,686 views.
Release Date:
2004-11-01
Secunia Advisory ID:
SA13049
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for ppp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for GPdf/KPDF/KOffice
Vendor Patch. Secunia Advisory 68 of 270 in 2004. 8,199 views.
Release Date:
2004-10-28
Secunia Advisory ID:
SA13014
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for GPdf, KPDF, and KOffice. These fix some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for PuTTY
Vendor Patch. Secunia Advisory 69 of 270 in 2004. 9,954 views.
Release Date:
2004-10-28
Secunia Advisory ID:
SA13010
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for PuTTY. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for rssh
Vendor Patch. Secunia Advisory 70 of 270 in 2004. 8,165 views.
Release Date:
2004-10-27
Secunia Advisory ID:
SA13004
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for rssh. This fixes a vulnerability, which potentially can be exploited by malicious users to gain interactive access. [Read More]


Gentoo update for mpg123
Vendor Patch. Secunia Advisory 71 of 270 in 2004. 7,364 views.
Release Date:
2004-10-27
Secunia Advisory ID:
SA13003
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mpg123. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for socat
Vendor Patch. Secunia Advisory 72 of 270 in 2004. 7,270 views.
Release Date:
2004-10-26
Secunia Advisory ID:
SA12978
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Gentoo has issued an update for socat. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for netatalk
Vendor Patch. Secunia Advisory 73 of 270 in 2004. 7,170 views.
Release Date:
2004-10-26
Secunia Advisory ID:
SA12977
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for netatalk. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo update for mysql
Vendor Patch. Secunia Advisory 74 of 270 in 2004. 7,525 views.
Release Date:
2004-10-25
Secunia Advisory ID:
SA12958
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for mysql. This fixes multiple vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise the system. [Read More]


Gentoo update for gaim
Vendor Patch. Secunia Advisory 75 of 270 in 2004. 6,807 views.
Release Date:
2004-10-25
Secunia Advisory ID:
SA12957
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gaim. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for mit-krb5
Vendor Patch. Secunia Advisory 76 of 270 in 2004. 6,996 views.
Release Date:
2004-10-25
Secunia Advisory ID:
SA12968
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for mit-krb5. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo update for apache/mod_ssl
Vendor Patch. Secunia Advisory 77 of 270 in 2004. 7,575 views.
Release Date:
2004-10-22
Secunia Advisory ID:
SA12933
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued updates for apache and mod_ssl. These fix a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for xpdf/cups
Vendor Patch. Secunia Advisory 78 of 270 in 2004. 7,788 views.
Release Date:
2004-10-22
Secunia Advisory ID:
SA12931
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for xpdf and cups. These fix some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for glibc
Vendor Patch. Secunia Advisory 79 of 270 in 2004. 8,952 views.
Release Date:
2004-10-22
Secunia Advisory ID:
SA12938
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for glibc. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo update for ghostscript
Vendor Patch. Secunia Advisory 80 of 270 in 2004. 6,613 views.
Release Date:
2004-10-21
Secunia Advisory ID:
SA12915
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for ghostscript. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo update for openoffice
Vendor Patch. Secunia Advisory 81 of 270 in 2004. 8,712 views.
Release Date:
2004-10-21
Secunia Advisory ID:
SA12914
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for openoffice. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


Gentoo update for postgresql
Vendor Patch. Secunia Advisory 82 of 270 in 2004. 7,785 views.
Release Date:
2004-10-19
Secunia Advisory ID:
SA12867
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for PostgreSQL. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo update for squid
Vendor Patch. Secunia Advisory 83 of 270 in 2004. 7,501 views.
Release Date:
2004-10-19
Secunia Advisory ID:
SA12866
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for squid. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for phpMyAdmin
Vendor Patch. Secunia Advisory 84 of 270 in 2004. 8,190 views.
Release Date:
2004-10-19
Secunia Advisory ID:
SA12859
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for phpMyAdmin. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for bnc
Vendor Patch. Secunia Advisory 85 of 270 in 2004. 6,806 views.
Release Date:
2004-10-15
Secunia Advisory ID:
SA12845
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Gentoo has issued an update for bnc. This fixes a vulnerability, which can be exploited by malicious users to spoof their identity. [Read More]


Gentoo update for wordpress
Vendor Patch. Secunia Advisory 86 of 270 in 2004. 7,119 views.
Release Date:
2004-10-14
Secunia Advisory ID:
SA12827
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for wordpress. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct script insertion and cross-site scripting attacks. [Read More]


Gentoo update for tiff/xv
Vendor Patch. Secunia Advisory 87 of 270 in 2004. 6,789 views.
Release Date:
2004-10-14
Secunia Advisory ID:
SA12824
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for tiff and xv. These fix some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for gettext
Vendor Patch. Secunia Advisory 88 of 270 in 2004. 7,676 views.
Release Date:
2004-10-11
Secunia Advisory ID:
SA12775
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for gettext. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo update for ed
Vendor Patch. Secunia Advisory 89 of 270 in 2004. 7,921 views.
Release Date:
2004-10-11
Secunia Advisory ID:
SA12780
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for ed. This fixes an old vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo update for ncompress
Vendor Patch. Secunia Advisory 90 of 270 in 2004. 8,989 views.
Release Date:
2004-10-11
Secunia Advisory ID:
SA12779
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ncompress. This fixes an old vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for lesstif
Vendor Patch. Secunia Advisory 91 of 270 in 2004. 8,061 views.
Release Date:
2004-10-11
Secunia Advisory ID:
SA12777
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for lesstif. This fixes multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for cups
Vendor Patch. Secunia Advisory 92 of 270 in 2004. 7,599 views.
Release Date:
2004-10-09
Secunia Advisory ID:
SA12768
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


Gentoo update for cyrus-sasl
Vendor Patch. Secunia Advisory 93 of 270 in 2004. 7,924 views.
Release Date:
2004-10-08
Secunia Advisory ID:
SA12762
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Gentoo has issued an update for cyrus-sasl. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system and by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for netkit-telnetd
Vendor Patch. Secunia Advisory 94 of 270 in 2004. 8,839 views.
Release Date:
2004-10-06
Secunia Advisory ID:
SA12741
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for netkit-telnetd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for PHP
Vendor Patch. Secunia Advisory 95 of 270 in 2004. 8,632 views.
Release Date:
2004-10-06
Secunia Advisory ID:
SA12739
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for PHP. This fixes two vulnerabilities, which can be exploited by malicious people to disclose sensitive information or potentially upload files to arbitrary locations. [Read More]


Gentoo update for netpbm
Vendor Patch. Secunia Advisory 96 of 270 in 2004. 7,896 views.
Release Date:
2004-10-05
Secunia Advisory ID:
SA12723
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for netpbm. This fixes a vulnerability, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


Gentoo update for subversion
Vendor Patch. Secunia Advisory 97 of 270 in 2004. 7,330 views.
Release Date:
2004-09-30
Secunia Advisory ID:
SA12688
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for subversion. This fixes a security issue, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


Gentoo update for xorg-x11/xfree
Vendor Patch. Secunia Advisory 98 of 270 in 2004. 8,530 views.
Release Date:
2004-09-27
Secunia Advisory ID:
SA12653
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for xorg-x11 and xfree. These fix multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for getmail
Vendor Patch. Secunia Advisory 99 of 270 in 2004. 7,745 views.
Release Date:
2004-09-24
Secunia Advisory ID:
SA12645
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for getmail. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for apache
Vendor Patch. Secunia Advisory 100 of 270 in 2004. 7,826 views.
Release Date:
2004-09-24
Secunia Advisory ID:
SA12641
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for apache. This fixes a security issue, which may allow malicious people to bypass configured access controls. [Read More]


Gentoo update for jabberd
Vendor Patch. Secunia Advisory 101 of 270 in 2004. 7,193 views.
Release Date:
2004-09-23
Secunia Advisory ID:
SA12637
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for jabberd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for xine-lib
Vendor Patch. Secunia Advisory 102 of 270 in 2004. 7,576 views.
Release Date:
2004-09-23
Secunia Advisory ID:
SA12629
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xine-lib. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for freeradius
Vendor Patch. Secunia Advisory 103 of 270 in 2004. 6,755 views.
Release Date:
2004-09-23
Secunia Advisory ID:
SA12619
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for freeradius. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for gtk+ / gdk-pixbuf
Vendor Patch. Secunia Advisory 104 of 270 in 2004. 8,740 views.
Release Date:
2004-09-22
Secunia Advisory ID:
SA12615
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for gdk-pixbuf and gtk+. These fix multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for CUPS
Vendor Patch. Secunia Advisory 105 of 270 in 2004. 7,261 views.
Release Date:
2004-09-21
Secunia Advisory ID:
SA12603
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for CUPS. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for foomatic
Vendor Patch. Secunia Advisory 106 of 270 in 2004. 7,314 views.
Release Date:
2004-09-21
Secunia Advisory ID:
SA12591
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for foomatic. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for Mozilla/Firefox/Thunderbird/Epiphany
Vendor Patch. Secunia Advisory 107 of 270 in 2004. 8,392 views.
Release Date:
2004-09-21
Secunia Advisory ID:
SA12607
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued updates for Mozilla, Firefox, Thunderbird, and Epiphany. These fix multiple vulnerabilities, which potentially can be exploited by malicious people to conduct cross-site scripting attacks, access and modify sensitive information, and compromise a user's system. [Read More]


Gentoo update for snipsnap
Vendor Patch. Secunia Advisory 108 of 270 in 2004. 7,314 views.
Release Date:
2004-09-20
Secunia Advisory ID:
SA12582
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for snipsnap. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion and cross-site scripting attacks. [Read More]


Gentoo update for phpGroupWare
Vendor Patch. Secunia Advisory 109 of 270 in 2004. 7,027 views.
Release Date:
2004-09-17
Secunia Advisory ID:
SA12576
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for phpGroupWare. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Gentoo update for apache2 and mod_dav
Vendor Patch. Secunia Advisory 110 of 270 in 2004. 8,559 views.
Release Date:
2004-09-17
Secunia Advisory ID:
SA12577
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Gentoo has issued updates for apache2 and mod_dav. These fix multiple vulnerabilities, which can be exploited to cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


Gentoo update for heimdal
Vendor Patch. Secunia Advisory 111 of 270 in 2004. 6,639 views.
Release Date:
2004-09-16
Secunia Advisory ID:
SA12562
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Privilege escalation
Where:
From remote
Short Description:
Gentoo has issued an update for heimdal. This fixes some vulnerabilities, which potentially can be exploited by malicious users to gain escalated privileges or compromise a vulnerable system. [Read More]


Gentoo update for mpg123
Vendor Patch. Secunia Advisory 112 of 270 in 2004. 7,190 views.
Release Date:
2004-09-16
Secunia Advisory ID:
SA12565
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mpg123. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for cdrtools
Vendor Patch. Secunia Advisory 113 of 270 in 2004. 7,517 views.
Release Date:
2004-09-15
Secunia Advisory ID:
SA12532
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for cdrtools. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for SUS
Vendor Patch. Secunia Advisory 114 of 270 in 2004. 6,738 views.
Release Date:
2004-09-15
Secunia Advisory ID:
SA12534
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
From remote
Short Description:
Gentoo has issued an update for SUS. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for samba
Vendor Patch. Secunia Advisory 115 of 270 in 2004. 7,224 views.
Release Date:
2004-09-14
Secunia Advisory ID:
SA12517
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for samba. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for Webmin / Usermin
Vendor Patch. Secunia Advisory 116 of 270 in 2004. 8,511 views.
Release Date:
2004-09-13
Secunia Advisory ID:
SA12505
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
System access
Where:
From remote
Short Description:
Gentoo has issued updates for Webmin / Usermin. These fix two vulnerabilities, where the most critical can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for samba
Vendor Patch. Secunia Advisory 117 of 270 in 2004. 7,469 views.
Release Date:
2004-09-09
Secunia Advisory ID:
SA12499
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
NOTE: Based on new information from the vendor, this is NOT a security issue and the advisory has therefore been revoked. [Read More]


Gentoo update for LHA
Vendor Patch. Secunia Advisory 118 of 270 in 2004. 7,698 views.
Release Date:
2004-09-09
Secunia Advisory ID:
SA12496
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for LHA. This fixes some vulnerabilities, which can be exploited to compromise a user's system. [Read More]


Gentoo update for ImageMagick/imlib/imlib2
Vendor Patch. Secunia Advisory 119 of 270 in 2004. 7,456 views.
Release Date:
2004-09-08
Secunia Advisory ID:
SA12489
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for ImageMagick, imlib, and imlib2. These fix a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for star
Vendor Patch. Secunia Advisory 120 of 270 in 2004. 7,120 views.
Release Date:
2004-09-08
Secunia Advisory ID:
SA12485
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for star. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo multi-gnome-terminal Potential Exposure of Sensitive Information
Vendor Patch. Secunia Advisory 121 of 270 in 2004. 8,878 views.
Release Date:
2004-09-07
Secunia Advisory ID:
SA12477
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for multi-gnome-terminal. This fixes a potential security issue, which may expose sensitive information. [Read More]


Gentoo update for Ruby
Vendor Patch. Secunia Advisory 122 of 270 in 2004. 8,168 views.
Release Date:
2004-09-06
Secunia Advisory ID:
SA12462
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for ruby. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


Gentoo update for xv
Vendor Patch. Secunia Advisory 123 of 270 in 2004. 7,566 views.
Release Date:
2004-09-06
Secunia Advisory ID:
SA12459
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xv. This fixes multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for krb5
Vendor Patch. Secunia Advisory 124 of 270 in 2004. 7,490 views.
Release Date:
2004-09-06
Secunia Advisory ID:
SA12457
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for krb5. This fixes multiple vulnerabilities, where the most critical potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for vpopmail
Vendor Patch. Secunia Advisory 125 of 270 in 2004. 8,219 views.
Release Date:
2004-09-03
Secunia Advisory ID:
SA12442
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of system information
Exposure of sensitive information
Privilege escalation
Where:
From remote
Short Description:
Gentoo has issued an update for vpopmail. This fixes some vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Gentoo update for eGroupWare
Vendor Patch. Secunia Advisory 126 of 270 in 2004. 8,019 views.
Release Date:
2004-09-03
Secunia Advisory ID:
SA12449
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for eGroupWare. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks. [Read More]


Gentoo update for Squid
Vendor Patch. Secunia Advisory 127 of 270 in 2004. 7,451 views.
Release Date:
2004-09-03
Secunia Advisory ID:
SA12448
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for Squid. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for Gallery
Vendor Patch. Secunia Advisory 128 of 270 in 2004. 7,815 views.
Release Date:
2004-09-03
Secunia Advisory ID:
SA12451
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Gallery. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for Python
Vendor Patch. Secunia Advisory 129 of 270 in 2004. 9,242 views.
Release Date:
2004-09-03
Secunia Advisory ID:
SA12452
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Python. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for mysql
Vendor Patch. Secunia Advisory 130 of 270 in 2004. 7,086 views.
Release Date:
2004-09-01
Secunia Advisory ID:
SA12428
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for MySQL. This fixes a vulnerability, potentially allowing malicious users to escalate their privileges. [Read More]


Gentoo update for zlib
Vendor Patch. Secunia Advisory 131 of 270 in 2004. 7,866 views.
Release Date:
2004-08-30
Secunia Advisory ID:
SA12402
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for zlib. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct a DoS (Denial of Service). [Read More]


Gentoo update for MoinMoin
Vendor Patch. Secunia Advisory 132 of 270 in 2004. 9,300 views.
Release Date:
2004-08-27
Secunia Advisory ID:
SA12389
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for MoinMoin. This fixes a vulnerability, which potentially can be exploited by malicious users to bypass access controls. [Read More]


Gentoo update for kernel
Vendor Patch. Secunia Advisory 133 of 270 in 2004. 6,153 views.
Release Date:
2004-08-27
Secunia Advisory ID:
SA12385
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Gentoo has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose sensitive information or cause a DoS (Denial of Service). [Read More]


Gentoo update for kdelibs
Vendor Patch. Secunia Advisory 134 of 270 in 2004. 8,039 views.
Release Date:
2004-08-25
Secunia Advisory ID:
SA12369
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Where:
From remote
Short Description:
Gentoo has issued an update for kdelibs. This fixes a vulnerability in Konqueror, which potentially can be exploited by malicious people to hijack users' sessions via session fixation attacks. [Read More]


Gentoo update for cacti
Vendor Patch. Secunia Advisory 135 of 270 in 2004. 7,377 views.
Release Date:
2004-08-23
Secunia Advisory ID:
SA12355
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of system information
Where:
From remote
Short Description:
Gentoo has issued an update for cacti. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Gentoo update for mozilla/firefox/thunderbird
Vendor Patch. Secunia Advisory 136 of 270 in 2004. 8,494 views.
Release Date:
2004-08-23
Secunia Advisory ID:
SA12354
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for mozilla, firefox, thunderbird, epiphany, and galeon. These fix multiple vulnerabilities, which can be exploited to abuse other sites certificates, cause a DoS (Denial of Service), or compromise a vulnerable system. [Read More]


Gentoo update for qt
Vendor Patch. Secunia Advisory 137 of 270 in 2004. 7,494 views.
Release Date:
2004-08-23
Secunia Advisory ID:
SA12342
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for qt. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for courier-imap
Vendor Patch. Secunia Advisory 138 of 270 in 2004. 6,675 views.
Release Date:
2004-08-20
Secunia Advisory ID:
SA12326
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for courier-imap. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo glibc Unprivileged Debugging Weakness
Vendor Patch. Secunia Advisory 139 of 270 in 2004. 10,897 views.
Release Date:
2004-08-19
Secunia Advisory ID:
SA12306
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Where:
Local system
Short Description:
A weakness has been reported in glibc, which can be exploited by malicious, local users to gain knowledge of certain system information. [Read More]


Gentoo update for rsync
Vendor Patch. Secunia Advisory 140 of 270 in 2004. 8,187 views.
Release Date:
2004-08-18
Secunia Advisory ID:
SA12313
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for rsync. This fixes a vulnerability, which potentially can be exploited by malicious users to read or write arbitrary files on a vulnerable system. [Read More]


Gentoo update for xine
Vendor Patch. Secunia Advisory 141 of 270 in 2004. 7,958 views.
Release Date:
2004-08-18
Secunia Advisory ID:
SA12314
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xine-lib. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo Tomcat Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 142 of 270 in 2004. 10,485 views.
Release Date:
2004-08-16
Secunia Advisory ID:
SA12296
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the tomcat package for Gentoo, which can be exploited by malicious, local users to escalate their privileges. [Read More]


Gentoo update for acroread
Vendor Patch. Secunia Advisory 143 of 270 in 2004. 7,692 views.
Release Date:
2004-08-16
Secunia Advisory ID:
SA12295
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for acroread. This fixes two vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for nessus
Vendor Patch. Secunia Advisory 144 of 270 in 2004. 7,730 views.
Release Date:
2004-08-13
Secunia Advisory ID:
SA12288
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for nessus. This fixes a vulnerability, which potentially can be exploited by malicious, local users to escalate their privileges. [Read More]


Gentoo update for kdebase / kdelibs
Vendor Patch. Secunia Advisory 145 of 270 in 2004. 8,355 views.
Release Date:
2004-08-13
Secunia Advisory ID:
SA12284
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Privilege escalation
Where:
From remote
Short Description:
Gentoo has issued updates for kdelibs and kdebase. These fix two vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges, and one vulnerability, which can be exploited by malicious people to spoof the content of websites. [Read More]


Gentoo update for gaim
Vendor Patch. Secunia Advisory 146 of 270 in 2004. 8,483 views.
Release Date:
2004-08-13
Secunia Advisory ID:
SA12282
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gaim. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for gv
Vendor Patch. Secunia Advisory 147 of 270 in 2004. 7,143 views.
Release Date:
2004-08-13
Secunia Advisory ID:
SA12281
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gv. This fixes an older vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for roundup
Vendor Patch. Secunia Advisory 148 of 270 in 2004. 6,633 views.
Release Date:
2004-08-12
Secunia Advisory ID:
SA12274
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Exposure of system information
Where:
From remote
Short Description:
Gentoo has issued an update for roundup. This fixes a vulnerability, which can be exploited by malicious people to view the content of arbitrary files. [Read More]


Gentoo update for cfengine
Vendor Patch. Secunia Advisory 149 of 270 in 2004. 7,113 views.
Release Date:
2004-08-11
Secunia Advisory ID:
SA12264
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for cfengine. This fixes a vulnerability, which can be exploited by malicious people to compromise the system or cause a DoS (Denial of Service). [Read More]


Gentoo update for horde-imp
Vendor Patch. Secunia Advisory 150 of 270 in 2004. 9,367 views.
Release Date:
2004-08-10
Secunia Advisory ID:
SA12258
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for horde-imp. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Gentoo update for spamassassin
Vendor Patch. Secunia Advisory 151 of 270 in 2004. 7,940 views.
Release Date:
2004-08-10
Secunia Advisory ID:
SA12256
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for spamassassin. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for opera
Vendor Patch. Secunia Advisory 152 of 270 in 2004. 6,847 views.
Release Date:
2004-08-06
Secunia Advisory ID:
SA12235
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Spoofing
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for opera. This fixes a vulnerability, which can be exploited by malicious websites to steal sensitive information and conduct cross-site scripting attacks. [Read More]


Gentoo update for putty
Vendor Patch. Secunia Advisory 153 of 270 in 2004. 9,515 views.
Release Date:
2004-08-05
Secunia Advisory ID:
SA12213
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for putty. This fixes two vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for libpng
Vendor Patch. Secunia Advisory 154 of 270 in 2004. 7,692 views.
Release Date:
2004-08-05
Secunia Advisory ID:
SA12228
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libpng. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Gentoo update for courier
Vendor Patch. Secunia Advisory 155 of 270 in 2004. 7,266 views.
Release Date:
2004-08-05
Secunia Advisory ID:
SA12224
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for courier. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Gentoo update for sox
Vendor Patch. Secunia Advisory 156 of 270 in 2004. 5,110 views.
Release Date:
2004-08-02
Secunia Advisory ID:
SA12147
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for SoX. This fixes two vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for mplayer
Vendor Patch. Secunia Advisory 157 of 270 in 2004. 5,523 views.
Release Date:
2004-08-02
Secunia Advisory ID:
SA12102
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mplayer. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for phpMyAdmin
Vendor Patch. Secunia Advisory 158 of 270 in 2004. 7,577 views.
Release Date:
2004-07-30
Secunia Advisory ID:
SA12186
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for phpMyAdmin. This fixes two vulnerabilities, which can be exploited by malicious people to manipulate certain configuration settings and inject arbitrary code. [Read More]


Gentoo update for samba
Vendor Patch. Secunia Advisory 159 of 270 in 2004. 5,528 views.
Release Date:
2004-07-29
Secunia Advisory ID:
SA12145
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for samba. This fixes two vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for subversion
Vendor Patch. Secunia Advisory 160 of 270 in 2004. 7,670 views.
Release Date:
2004-07-27
Secunia Advisory ID:
SA12161
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for subversion. This fixes a vulnerability, which can be exploited by malicious users to read protected files. [Read More]


Gentoo update for pavuk
Vendor Patch. Secunia Advisory 161 of 270 in 2004. 7,765 views.
Release Date:
2004-07-27
Secunia Advisory ID:
SA12163
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for pavuk. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for kernel
Vendor Patch. Secunia Advisory 162 of 270 in 2004. 8,180 views.
Release Date:
2004-07-22
Secunia Advisory ID:
SA12132
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Gentoo has issued an update for the kernel. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to bypass certain restrictions, cause a DoS (Denial of Service), or gain knowledge of sensitive information. [Read More]


Gentoo update for mod_ssl
Vendor Patch. Secunia Advisory 163 of 270 in 2004. 7,535 views.
Release Date:
2004-07-22
Secunia Advisory ID:
SA12131
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mod_ssl. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for l2tpd
Vendor Patch. Secunia Advisory 164 of 270 in 2004. 7,150 views.
Release Date:
2004-07-22
Secunia Advisory ID:
SA12128
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for l2tpd. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for Opera
Vendor Patch. Secunia Advisory 165 of 270 in 2004. 7,456 views.
Release Date:
2004-07-21
Secunia Advisory ID:
SA12109
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Gentoo has issued an update for Opera. This fixes a vulnerability, which can be exploited by malicious people to conduct phishing attacks against a user. [Read More]


Gentoo update for Unreal
Vendor Patch. Secunia Advisory 166 of 270 in 2004. 7,660 views.
Release Date:
2004-07-20
Secunia Advisory ID:
SA12091
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Unreal. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for php
Vendor Patch. Secunia Advisory 167 of 270 in 2004. 8,590 views.
Release Date:
2004-07-16
Secunia Advisory ID:
SA12073
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Gentoo has issued an update for php. This fixes two vulnerabilities, which can be exploited by malicious people to bypass certain security functionality or compromise a vulnerable system. [Read More]


Gentoo update for kernel
Vendor Patch. Secunia Advisory 168 of 270 in 2004. 7,830 views.
Release Date:
2004-07-15
Secunia Advisory ID:
SA12072
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for wv
Vendor Patch. Secunia Advisory 169 of 270 in 2004. 7,840 views.
Release Date:
2004-07-14
Secunia Advisory ID:
SA12066
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for wv. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for rsync
Vendor Patch. Secunia Advisory 170 of 270 in 2004. 9,726 views.
Release Date:
2004-07-13
Secunia Advisory ID:
SA12054
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for rsync. This fixes a vulnerability, potentially allowing malicious people to write files outside the intended directory. [Read More]


Gentoo update for ethereal
Vendor Patch. Secunia Advisory 171 of 270 in 2004. 7,932 views.
Release Date:
2004-07-12
Secunia Advisory ID:
SA12035
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for Ethereal. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Gentoo update for MoinMoin
Vendor Patch. Secunia Advisory 172 of 270 in 2004. 8,095 views.
Release Date:
2004-07-12
Secunia Advisory ID:
SA12036
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
From remote
Short Description:
Gentoo has issued an update for MoinMoin. This fixes a vulnerability, which can be exploited by malicious users to gain escalated privileges. [Read More]


Gentoo update for shorewall
Vendor Patch. Secunia Advisory 173 of 270 in 2004. 8,481 views.
Release Date:
2004-07-09
Secunia Advisory ID:
SA12030
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for shorewall. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo update for xfree
Vendor Patch. Secunia Advisory 174 of 270 in 2004. 10,515 views.
Release Date:
2004-07-06
Secunia Advisory ID:
SA12019
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From local network
Short Description:
Gentoo has issued an update for xfree. This fixes a security issue, which potentially may allow malicious users to gain unintended access to a system. [Read More]


Gentoo update for apache2
Vendor Patch. Secunia Advisory 175 of 270 in 2004. 7,481 views.
Release Date:
2004-07-05
Secunia Advisory ID:
SA12004
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for apache2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for kernel
Vendor Patch. Secunia Advisory 176 of 270 in 2004. 9,171 views.
Release Date:
2004-07-05
Secunia Advisory ID:
SA12003
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Gentoo has issued an update for the kernel. This fixes multiple vulnerabilities, which can be exploited by malicious users to gain escalated privileges, cause a DoS (Denial of Service), or gain knowledge of sensitive information. [Read More]


Gentoo update for pure-ftpd
Vendor Patch. Secunia Advisory 177 of 270 in 2004. 7,750 views.
Release Date:
2004-07-05
Secunia Advisory ID:
SA12001
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for pure-ftpd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo esearch Insecure Temporary File Creation Vulnerability
Vendor Patch. Secunia Advisory 178 of 270 in 2004. 8,672 views.
Release Date:
2004-07-02
Secunia Advisory ID:
SA11991
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Tavis Ormandy has discovered a vulnerability in esearch for Gentoo Linux, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for krb5
Vendor Patch. Secunia Advisory 179 of 270 in 2004. 8,059 views.
Release Date:
2004-06-30
Secunia Advisory ID:
SA11973
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Gentoo update for pavuk
Vendor Patch. Secunia Advisory 180 of 270 in 2004. 7,925 views.
Release Date:
2004-06-30
Secunia Advisory ID:
SA11976
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for pavuk. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for freeswan/openswan/strongswan
Vendor Patch. Secunia Advisory 181 of 270 in 2004. 9,013 views.
Release Date:
2004-06-28
Secunia Advisory ID:
SA11949
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Gentoo has issued updates for freeswan/openswan/strongswan. These fix a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or bypass certain security restrictions. [Read More]


Gentoo update for gift-fasttrack
Vendor Patch. Secunia Advisory 182 of 270 in 2004. 7,867 views.
Release Date:
2004-06-25
Secunia Advisory ID:
SA11942
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for gift-fasttrack. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for gzip
Vendor Patch. Secunia Advisory 183 of 270 in 2004. 8,481 views.
Release Date:
2004-06-25
Secunia Advisory ID:
SA11939
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for gzip. This fixes two vulnerabilities, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


Gentoo update for IPsec-Tools
Vendor Patch. Secunia Advisory 184 of 270 in 2004. 7,520 views.
Release Date:
2004-06-23
Secunia Advisory ID:
SA11922
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for ipsec-tools. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for apache
Vendor Patch. Secunia Advisory 185 of 270 in 2004. 8,197 views.
Release Date:
2004-06-22
Secunia Advisory ID:
SA11917
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for apache. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for usermin
Vendor Patch. Secunia Advisory 186 of 270 in 2004. 8,536 views.
Release Date:
2004-06-21
Secunia Advisory ID:
SA11896
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for usermin. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or bypass certain security restrictions. [Read More]


Gentoo update for aspell
Vendor Patch. Secunia Advisory 187 of 270 in 2004. 7,962 views.
Release Date:
2004-06-18
Secunia Advisory ID:
SA11890
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for aspell. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for squid
Vendor Patch. Secunia Advisory 188 of 270 in 2004. 7,911 views.
Release Date:
2004-06-17
Secunia Advisory ID:
SA11889
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for squid. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for horde-imp
Vendor Patch. Secunia Advisory 189 of 270 in 2004. 8,215 views.
Release Date:
2004-06-16
Secunia Advisory ID:
SA11884
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for horde-imp. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Gentoo update for webmin
Vendor Patch. Secunia Advisory 190 of 270 in 2004. 8,365 views.
Release Date:
2004-06-16
Secunia Advisory ID:
SA11883
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for webmin. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or bypass certain security restrictions. [Read More]


Gentoo update for squirrelmail
Vendor Patch. Secunia Advisory 191 of 270 in 2004. 8,967 views.
Release Date:
2004-06-16
Secunia Advisory ID:
SA11875
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for squirrelmail. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Gentoo update for horde-chora
Vendor Patch. Secunia Advisory 192 of 270 in 2004. 7,610 views.
Release Date:
2004-06-16
Secunia Advisory ID:
SA11874
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for horde-chora. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for gallery
Vendor Patch. Secunia Advisory 193 of 270 in 2004. 6,994 views.
Release Date:
2004-06-16
Secunia Advisory ID:
SA11873
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for gallery. This fixes a vulnerability, which can be exploited by malicious people to bypass the user authentication. [Read More]


Gentoo update for CVS
Vendor Patch. Secunia Advisory 194 of 270 in 2004. 8,130 views.
Release Date:
2004-06-14
Secunia Advisory ID:
SA11842
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for CVS. This fixes multiple vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Gentoo update for subversion
Vendor Patch. Secunia Advisory 195 of 270 in 2004. 7,649 views.
Release Date:
2004-06-14
Secunia Advisory ID:
SA11855
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for subversion. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for mod_ssl
Vendor Patch. Secunia Advisory 196 of 270 in 2004. 6,980 views.
Release Date:
2004-06-10
Secunia Advisory ID:
SA11825
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mod_ssl and apache. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Gentoo update for mailman
Vendor Patch. Secunia Advisory 197 of 270 in 2004. 31,780 views.
Release Date:
2004-06-09
Secunia Advisory ID:
SA11809
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for mailman. This fixes a vulnerability, which can be exploited by malicious people to retrieve members' passwords. [Read More]


Gentoo update for sitecopy
Vendor Workaround. Secunia Advisory 198 of 270 in 2004. 8,819 views.
Release Date:
2004-06-07
Secunia Advisory ID:
SA11786
Solution Status:
Vendor Workaround
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an advisory for sitecopy. This describes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for ethereal
Vendor Patch. Secunia Advisory 199 of 270 in 2004. 10,383 views.
Release Date:
2004-06-05
Secunia Advisory ID:
SA11776
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ethereal. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system or cause a DoS (Denial-of-Service). [Read More]


Gentoo update for tripwire
Vendor Patch. Secunia Advisory 200 of 270 in 2004. 8,590 views.
Release Date:
2004-06-05
Secunia Advisory ID:
SA11775
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for tripwire. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for tla
Vendor Patch. Secunia Advisory 201 of 270 in 2004. 7,963 views.
Release Date:
2004-06-03
Secunia Advisory ID:
SA11745
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for tla. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for mplayer/xine-lib
Vendor Patch. Secunia Advisory 202 of 270 in 2004. 8,972 views.
Release Date:
2004-05-31
Secunia Advisory ID:
SA11735
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for mplayer and xine-lib. These fix some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for heimdal
Vendor Patch. Secunia Advisory 203 of 270 in 2004. 8,427 views.
Release Date:
2004-05-28
Secunia Advisory ID:
SA11729
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for heimdal. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for mc
Vendor Patch. Secunia Advisory 204 of 270 in 2004. 7,193 views.
Release Date:
2004-05-27
Secunia Advisory ID:
SA11720
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for mc. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for apache
Vendor Patch. Secunia Advisory 205 of 270 in 2004. 8,802 views.
Release Date:
2004-05-27
Secunia Advisory ID:
SA11719
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Manipulation of data
Spoofing
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for apache. This fixes various vulnerabilities, which can be exploited to inject potentially malicious characters into error logfiles, bypass certain restrictions, gain unauthorised access, or cause a DoS (Denial of Service). [Read More]


Gentoo update for mysql
Vendor Patch. Secunia Advisory 206 of 270 in 2004. 7,805 views.
Release Date:
2004-05-26
Secunia Advisory ID:
SA11704
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for mysql. This fixes two vulnerabilities, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for opera
Vendor Patch. Secunia Advisory 207 of 270 in 2004. 7,200 views.
Release Date:
2004-05-26
Secunia Advisory ID:
SA11703
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for opera. This fixes a vulnerability, which can be exploited by malicious people to create or truncate files on a user's system. [Read More]


Gentoo update for firebird
Vendor Patch. Secunia Advisory 208 of 270 in 2004. 8,065 views.
Release Date:
2004-05-24
Secunia Advisory ID:
SA11691
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for firebird. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges on a vulnerable system. [Read More]


Gentoo update for squirrelmail
Vendor Patch. Secunia Advisory 209 of 270 in 2004. 11,258 views.
Release Date:
2004-05-24
Secunia Advisory ID:
SA11686
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for squirrelmail. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. [Read More]


Gentoo update for metamail
Vendor Patch. Secunia Advisory 210 of 270 in 2004. 8,859 views.
Release Date:
2004-05-22
Secunia Advisory ID:
SA11687
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for metamail. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for CVS
Vendor Patch. Secunia Advisory 211 of 270 in 2004. 11,217 views.
Release Date:
2004-05-21
Secunia Advisory ID:
SA11674
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for CVS. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Gentoo update for neon
Vendor Patch. Secunia Advisory 212 of 270 in 2004. 10,809 views.
Release Date:
2004-05-21
Secunia Advisory ID:
SA11673
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for neon. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for cadaver
Vendor Patch. Secunia Advisory 213 of 270 in 2004. 7,962 views.
Release Date:
2004-05-21
Secunia Advisory ID:
SA11672
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for cadaver. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for subversion
Vendor Patch. Secunia Advisory 214 of 270 in 2004. 10,614 views.
Release Date:
2004-05-21
Secunia Advisory ID:
SA11675
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for subversion. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for icecast
Vendor Patch. Secunia Advisory 215 of 270 in 2004. 8,164 views.
Release Date:
2004-05-20
Secunia Advisory ID:
SA11671
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for icecast. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for kdelibs
Vendor Patch. Secunia Advisory 216 of 270 in 2004. 7,559 views.
Release Date:
2004-05-19
Secunia Advisory ID:
SA11656
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued updated packages for kdelibs. These fix a vulnerability, which can be exploited by malicious people to create or truncate files on a user's system. [Read More]


Gentoo update for proftpd
Vendor Patch. Secunia Advisory 217 of 270 in 2004. 8,550 views.
Release Date:
2004-05-19
Secunia Advisory ID:
SA11655
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for proftpd. This fixes a security issue, which potentially allows malicious people to bypass ACLs. [Read More]


Gentoo update for pound
Vendor Patch. Secunia Advisory 218 of 270 in 2004. 8,069 views.
Release Date:
2004-05-19
Secunia Advisory ID:
SA11646
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for pound. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for libpng
Vendor Patch. Secunia Advisory 219 of 270 in 2004. 7,402 views.
Release Date:
2004-05-17
Secunia Advisory ID:
SA11619
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued updates for libpng. These fix a vulnerability, potentially allowing malicious people to cause a Denial of Service against certain applications. [Read More]


Gentoo update for exim
Vendor Patch. Secunia Advisory 220 of 270 in 2004. 7,226 views.
Release Date:
2004-05-17
Secunia Advisory ID:
SA11620
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for exim. These fix two vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for utempter
Vendor Patch. Secunia Advisory 221 of 270 in 2004. 8,168 views.
Release Date:
2004-05-14
Secunia Advisory ID:
SA11609
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for utempter. This fixes a security issue, which potentially can be exploited by malicious, local users to perform certain actions with higher privileges on a vulnerable system. [Read More]


Gentoo update for OpenOffice
Vendor Patch. Secunia Advisory 222 of 270 in 2004. 8,570 views.
Release Date:
2004-05-12
Secunia Advisory ID:
SA11592
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for OpenOffice. These fix a vulnerability allowing malicious people to compromise a user's system. [Read More]


Gentoo update for ClamAV
Vendor Patch. Secunia Advisory 223 of 270 in 2004. 8,148 views.
Release Date:
2004-05-12
Secunia Advisory ID:
SA11591
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for clamav. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for neon
Vendor Patch. Secunia Advisory 224 of 270 in 2004. 7,848 views.
Release Date:
2004-05-10
Secunia Advisory ID:
SA11575
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for neon. These fix multiple vulnerabilities, allowing malicious people to compromise a user's system. [Read More]


Gentoo update for LHA
Vendor Patch. Secunia Advisory 225 of 270 in 2004. 7,886 views.
Release Date:
2004-05-10
Secunia Advisory ID:
SA11574
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for lha. This fixes multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for samba
Vendor Patch. Secunia Advisory 226 of 270 in 2004. 7,444 views.
Release Date:
2004-04-30
Secunia Advisory ID:
SA11503
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updated packages for Samba. These fix a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for LCDproc
Vendor Patch. Secunia Advisory 227 of 270 in 2004. 8,390 views.
Release Date:
2004-04-27
Secunia Advisory ID:
SA11487
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for LCDproc. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for xine
Vendor Patch. Secunia Advisory 228 of 270 in 2004. 8,574 views.
Release Date:
2004-04-27
Secunia Advisory ID:
SA11488
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued updates for xine-ui and xine-lib. These fix a vulnerability, which potentially can be exploited by malicious people to gain system access. [Read More]


Gentoo update for sSMTP
Vendor Patch. Secunia Advisory 229 of 270 in 2004. 10,746 views.
Release Date:
2004-04-27
Secunia Advisory ID:
SA11485
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for ssmtp. These fix two vulnerabilities, allowing malicious people to compromise a vulnerable system. [Read More]


Gentoo update for net-firewall/ipsec-tools
Vendor Patch. Secunia Advisory 230 of 270 in 2004. 10,432 views.
Release Date:
2004-04-24
Secunia Advisory ID:
SA11476
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued updates for net-firewall/ipsec-tools. These fix a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for cadaver
Vendor Patch. Secunia Advisory 231 of 270 in 2004. 7,641 views.
Release Date:
2004-04-19
Secunia Advisory ID:
SA11412
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for cadaver. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for XChat
Vendor Patch. Secunia Advisory 232 of 270 in 2004. 7,724 views.
Release Date:
2004-04-19
Secunia Advisory ID:
SA11413
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for XChat. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for monit
Vendor Patch. Secunia Advisory 233 of 270 in 2004. 7,093 views.
Release Date:
2004-04-19
Secunia Advisory ID:
SA11414
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for monit. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for CVS
Vendor Patch. Secunia Advisory 234 of 270 in 2004. 7,985 views.
Release Date:
2004-04-15
Secunia Advisory ID:
SA11380
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued updated packages for CVS. These fix two vulnerabilities allowing malicious servers to compromise clients, and malicious users to retrieve arbitrary files from a vulnerable server. [Read More]


Gentoo update for iproute
Vendor Patch. Secunia Advisory 235 of 270 in 2004. 8,333 views.
Release Date:
2004-04-10
Secunia Advisory ID:
SA11337
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Gentoo has issued an update for iproute. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Gentoo update for pwlib
Vendor Patch. Secunia Advisory 236 of 270 in 2004. 8,309 views.
Release Date:
2004-04-10
Secunia Advisory ID:
SA11336
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for pwlib. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for scorched3d
Vendor Patch. Secunia Advisory 237 of 270 in 2004. 7,194 views.
Release Date:
2004-04-10
Secunia Advisory ID:
SA11338
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for scorched3d. This fixes a vulnerability, which potentially can be exploited by malicious users to compromise a vulnerable server. [Read More]


Gentoo update for heimdal
Vendor Patch. Secunia Advisory 238 of 270 in 2004. 7,407 views.
Release Date:
2004-04-09
Secunia Advisory ID:
SA11335
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From local network
Short Description:
Gentoo has issued updated packages for heimdal. These fix a vulnerability, which can allow certain people to impersonate others. [Read More]


Gentoo update for ipsec-tools
Vendor Patch. Secunia Advisory 239 of 270 in 2004. 7,127 views.
Release Date:
2004-04-09
Secunia Advisory ID:
SA11329
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for ipsec-tools. This fixes a vulnerability, which can be exploited by malicious people to conduct MitM (Man-in-the-Middle) attacks or establish unauthorised connections. [Read More]


Gentoo update for automake
Vendor Patch. Secunia Advisory 240 of 270 in 2004. 8,390 views.
Release Date:
2004-04-08
Secunia Advisory ID:
SA11321
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for automake. This fixes a vulnerability, which can be exploited by malicious local users to escalate their privileges. [Read More]


Gentoo update for clamav
Vendor Patch. Secunia Advisory 241 of 270 in 2004. 7,412 views.
Release Date:
2004-04-08
Secunia Advisory ID:
SA11318
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for util-linux
Vendor Patch. Secunia Advisory 242 of 270 in 2004. 8,185 views.
Release Date:
2004-04-08
Secunia Advisory ID:
SA11317
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for util-linux. This fixes a vulnerability, which potentially could disclose information to users. [Read More]


Gentoo update for sysstat
Vendor Patch. Secunia Advisory 243 of 270 in 2004. 7,776 views.
Release Date:
2004-04-07
Secunia Advisory ID:
SA11310
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updated packages for sysstat. These fix a vulnerability, allowing malicious local users to escalate their privileges. [Read More]


Gentoo update for KDE
Vendor Patch. Secunia Advisory 244 of 270 in 2004. 8,174 views.
Release Date:
2004-04-07
Secunia Advisory ID:
SA11308
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for kdepim. These fix a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for Portage
Vendor Patch. Secunia Advisory 245 of 270 in 2004. 15,535 views.
Release Date:
2004-04-07
Secunia Advisory ID:
SA11305
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for Portage. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for tcpdump
Vendor Patch. Secunia Advisory 246 of 270 in 2004. 7,366 views.
Release Date:
2004-04-07
Secunia Advisory ID:
SA11311
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for tcpdump. This fixes one vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a system running tcpdump. [Read More]


Gentoo update for monit
Vendor Patch. Secunia Advisory 247 of 270 in 2004. 11,667 views.
Release Date:
2004-04-01
Secunia Advisory ID:
SA11271
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for monit. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. [Read More]


Gentoo update for mplayer
Vendor Patch. Secunia Advisory 248 of 270 in 2004. 8,792 views.
Release Date:
2004-03-31
Secunia Advisory ID:
SA11263
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mplayer. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for OpenLDAP
Vendor Patch. Secunia Advisory 249 of 270 in 2004. 10,058 views.
Release Date:
2004-03-31
Secunia Advisory ID:
SA11261
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for OpenLDAP. This fixes an older vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system. [Read More]


Gentoo update for mc
Vendor Patch. Secunia Advisory 250 of 270 in 2004. 8,847 views.
Release Date:
2004-03-31
Secunia Advisory ID:
SA11262
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mc. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for fetchmail
Vendor Patch. Secunia Advisory 251 of 270 in 2004. 7,838 views.
Release Date:
2004-03-31
Secunia Advisory ID:
SA11257
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for fetchmail. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial-of-Service). [Read More]


Gentoo update for oftpd
Vendor Patch. Secunia Advisory 252 of 270 in 2004. 8,144 views.
Release Date:
2004-03-30
Secunia Advisory ID:
SA11240
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for oftpd. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a Denial of Service. [Read More]


Gentoo update for UUDeview
Vendor Patch. Secunia Advisory 253 of 270 in 2004. 8,187 views.
Release Date:
2004-03-29
Secunia Advisory ID:
SA11226
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for UUDeview. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for Courier
Vendor Patch. Secunia Advisory 254 of 270 in 2004. 8,396 views.
Release Date:
2004-03-29
Secunia Advisory ID:
SA11227
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Courier. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for ethereal
Vendor Patch. Secunia Advisory 255 of 270 in 2004. 8,819 views.
Release Date:
2004-03-29
Secunia Advisory ID:
SA11225
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for ethereal. This fixes multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for Apache 2
Vendor Patch. Secunia Advisory 256 of 270 in 2004. 8,964 views.
Release Date:
2004-03-26
Secunia Advisory ID:
SA11217
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for Apache 2. These fix three vulnerabilities, potentially allowing malicious people to cause a Denial of Service or compromise a vulnerable system. [Read More]


Gentoo update for OpenSSL
Vendor Patch. Secunia Advisory 257 of 270 in 2004. 7,533 views.
Release Date:
2004-03-18
Secunia Advisory ID:
SA11153
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued updated packages for OpenSSL. These fix three vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial-of-Service). [Read More]


Gentoo update for kernel
Vendor Patch. Secunia Advisory 258 of 270 in 2004. 8,549 views.
Release Date:
2004-03-08
Secunia Advisory ID:
SA11052
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an updated package for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for libxml2
Vendor Patch. Secunia Advisory 259 of 270 in 2004. 7,786 views.
Release Date:
2004-03-08
Secunia Advisory ID:
SA11051
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for libxml2. These fix some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for clamav
Vendor Patch. Secunia Advisory 260 of 270 in 2004. 8,152 views.
Release Date:
2004-02-18
Secunia Advisory ID:
SA10906
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for phpMyAdmin
Vendor Patch. Secunia Advisory 261 of 270 in 2004. 7,861 views.
Release Date:
2004-02-17
Secunia Advisory ID:
SA10886
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued updates for phpMyAdmin. These fix a vulnerability allowing malicious people to see sensitive information. [Read More]


Gentoo update for kernel
Vendor Patch. Secunia Advisory 262 of 270 in 2004. 9,043 views.
Release Date:
2004-02-17
Secunia Advisory ID:
SA10885
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updated kernel packages. These fix a vulnerability, allowing malicious users to escalate their privileges through a vulnerability in the 32-bit ptrace emulation. [Read More]


Gentoo update for Monkeyd
Vendor Patch. Secunia Advisory 263 of 270 in 2004. 6,593 views.
Release Date:
2004-02-12
Secunia Advisory ID:
SA10854
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for Monkeyd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for XFree86
Vendor Patch. Secunia Advisory 264 of 270 in 2004. 8,659 views.
Release Date:
2004-02-12
Secunia Advisory ID:
SA10849
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
From remote
Short Description:
Gentoo has issued an update for XFree86. This fixes a vulnerability, which potentially can be exploited by malicious users to escalate their privileges on a vulnerable system. [Read More]


Gentoo update for gallery
Vendor Patch. Secunia Advisory 265 of 270 in 2004. 7,234 views.
Release Date:
2004-02-12
Secunia Advisory ID:
SA10848
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Gallery. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for PHP
Vendor Patch. Secunia Advisory 266 of 270 in 2004. 8,344 views.
Release Date:
2004-02-09
Secunia Advisory ID:
SA10819
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for PHP. This fixes a vulnerability, which causes PHP configuration options to be leaked. [Read More]


Gentoo update for gaim
Vendor Patch. Secunia Advisory 267 of 270 in 2004. 7,730 views.
Release Date:
2004-01-28
Secunia Advisory ID:
SA10738
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updated packages for gaim. These fix multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for mod_python
Vendor Patch. Secunia Advisory 268 of 270 in 2004. 7,950 views.
Release Date:
2004-01-28
Secunia Advisory ID:
SA10735
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for mod_python. This fix a vulnerability, which can be exploited by malicious people to cause a Denial of Service. [Read More]


Gentoo update for honeyd
Vendor Patch. Secunia Advisory 269 of 270 in 2004. 8,057 views.
Release Date:
2004-01-22
Secunia Advisory ID:
SA10695
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Where:
From remote
Short Description:
Gentoo has issued an updated package for honeyd. This fixes a problem, which can be exploited by malicious people to identify simulated hosts. [Read More]


Gentoo update for kernel
Vendor Patch. Secunia Advisory 270 of 270 in 2004. 11,716 views.
Release Date:
2004-01-09
Secunia Advisory ID:
SA10584
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updated packages for the kernel. These fix a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Gentoo Linux 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability