navigation bar left navigation bar right

navigation left tab Advisories navigation right tab
navigation left tab Research navigation right tab
navigation left tab Forums navigation right tab
navigation left tab Create Profile navigation right tab
navigation left tab Our Commitment navigation right tab
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Gentoo Linux

This vulnerability report for Gentoo Linux contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Gentoo Linux then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Gentoo

Product Link N/A

Affected By 2137 Secunia advisories
8582 Vulnerabilities

Monitor Product Receive alerts for this product





327 Secunia Advisories in 2005

Secunia has issued a total of 327 Secunia advisories in 2005 for Gentoo Linux. Currently, 0% (0 out of 327) are marked as unpatched.

More information about the specific Secunia advisories affecting Gentoo Linux can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



patched Gentoo update for xnview
Vendor Patch. Secunia Advisory 1 of 327 in 2005. 9,617 views.
Release Date:
2005-12-30
Secunia Advisory ID:
SA18240
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for xnview. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for scponly
Vendor Patch. Secunia Advisory 2 of 327 in 2005. 8,697 views.
Release Date:
2005-12-29
Secunia Advisory ID:
SA18236
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Privilege escalation
Where:
From remote
Short Description:
Gentoo has issued an update for scponly. This fixes two vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges, or by malicious users to bypass certain security restrictions. [Read More]


patched Gentoo update for rssh
Vendor Patch. Secunia Advisory 3 of 327 in 2005. 9,842 views.
Release Date:
2005-12-28
Secunia Advisory ID:
SA18237
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for rssh. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for ndb
Vendor Patch. Secunia Advisory 4 of 327 in 2005. 8,717 views.
Release Date:
2005-12-26
Secunia Advisory ID:
SA18209
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for nbd. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for mantis
Vendor Patch. Secunia Advisory 5 of 327 in 2005. 10,208 views.
Release Date:
2005-12-23
Secunia Advisory ID:
SA18221
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Unknown
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for mantis. This fixes some vulnerabilities, where some have unknown impacts and others potentially can be exploited by malicious people to conduct cross-site scripting, HTTP response splitting, and SQL injection attacks. [Read More]


patched Gentoo update for dropbear
Vendor Patch. Secunia Advisory 6 of 327 in 2005. 8,992 views.
Release Date:
2005-12-23
Secunia Advisory ID:
SA18142
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for dropbear. This fixes a vulnerability, which potentially can be exploited by malicious users to compromise a vulnerable system. [Read More]


patched Gentoo update for centericq
Vendor Patch. Secunia Advisory 7 of 327 in 2005. 8,528 views.
Release Date:
2005-12-20
Secunia Advisory ID:
SA18081
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for centericq. This fixes a weakness and a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


patched Gentoo update for opera
Vendor Patch. Secunia Advisory 8 of 327 in 2005. 8,376 views.
Release Date:
2005-12-19
Secunia Advisory ID:
SA18111
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for opera. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for curl
Vendor Patch. Secunia Advisory 9 of 327 in 2005. 9,184 views.
Release Date:
2005-12-19
Secunia Advisory ID:
SA18105
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Unknown
Where:
Local system
Short Description:
Gentoo has issued an update for curl. This fixes a vulnerability, which has an unknown impact. [Read More]


patched Gentoo updates for xpdf / gpdf / cups / poppler
Vendor Patch. Secunia Advisory 10 of 327 in 2005. 10,416 views.
Release Date:
2005-12-16
Secunia Advisory ID:
SA18055
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for xpdf / gpdf / cups / poppler. These fix some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable or a user's system. [Read More]


patched Gentoo update for openldap / gauche
Vendor Patch. Secunia Advisory 11 of 327 in 2005. 7,768 views.
Release Date:
2005-12-15
Secunia Advisory ID:
SA18040
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates for openldap / gauche. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for ethereal
Vendor Patch. Secunia Advisory 12 of 327 in 2005. 8,546 views.
Release Date:
2005-12-15
Secunia Advisory ID:
SA18062
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ethereal. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


patched Gentoo update for xmail
Vendor Patch. Secunia Advisory 13 of 327 in 2005. 8,383 views.
Release Date:
2005-12-15
Secunia Advisory ID:
SA18052
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for xmail. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for openswan / ipsec-tools
Vendor Patch. Secunia Advisory 14 of 327 in 2005. 10,868 views.
Release Date:
2005-12-13
Secunia Advisory ID:
SA17980
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for openswan / ipsec-tools. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for phpmyadmin
Vendor Patch. Secunia Advisory 15 of 327 in 2005. 8,823 views.
Release Date:
2005-12-12
Secunia Advisory ID:
SA17957
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Exposure of sensitive information
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for phpmyadmin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, and compromise a vulnerable system. [Read More]


patched Gentoo update for perl
Vendor Patch. Secunia Advisory 16 of 327 in 2005. 9,620 views.
Release Date:
2005-12-08
Secunia Advisory ID:
SA17941
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for perl. This fixes a vulnerability, which can be exploited by malicious people to cause a Denial of Service and potentially to compromise a vulnerable Perl application. [Read More]


patched Gentoo update for webmin/usermin
Vendor Patch. Secunia Advisory 17 of 327 in 2005. 9,202 views.
Release Date:
2005-12-08
Secunia Advisory ID:
SA17942
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for webmin and usermin. These fix a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. [Read More]


patched Gentoo update for inkscape
Vendor Patch. Secunia Advisory 18 of 327 in 2005. 8,894 views.
Release Date:
2005-11-28
Secunia Advisory ID:
SA17778
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for inkscape. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for chmlib / kchmviewer
Vendor Patch. Secunia Advisory 19 of 327 in 2005. 9,085 views.
Release Date:
2005-11-28
Secunia Advisory ID:
SA17776
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for chmlib / kchmviewer. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for netscape-flash
Vendor Patch. Secunia Advisory 20 of 327 in 2005. 11,560 views.
Release Date:
2005-11-25
Secunia Advisory ID:
SA17738
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for netscape-flash. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for phpsysinfo
Vendor Patch. Secunia Advisory 21 of 327 in 2005. 10,517 views.
Release Date:
2005-11-23
Secunia Advisory ID:
SA17698
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for phpsysinfo. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain information. [Read More]


patched Gentoo update for fuse
Vendor Patch. Secunia Advisory 22 of 327 in 2005. 9,354 views.
Release Date:
2005-11-23
Secunia Advisory ID:
SA17695
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for fuse. This fixes a vulnerability, which potentially can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo eix Insecure Temporary File Creation
Vendor Patch. Secunia Advisory 23 of 327 in 2005. 10,236 views.
Release Date:
2005-11-23
Secunia Advisory ID:
SA17699
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Eric Romang has reported a vulnerability in eix, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for horde
Vendor Patch. Secunia Advisory 24 of 327 in 2005. 9,434 views.
Release Date:
2005-11-23
Secunia Advisory ID:
SA17702
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for horde. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


patched Gentoo update for gnump3d
Vendor Patch. Secunia Advisory 25 of 327 in 2005. 8,661 views.
Release Date:
2005-11-21
Secunia Advisory ID:
SA17646
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
Privilege escalation
Where:
From remote
Short Description:
Gentoo has issued an update for gnump3d. This fixes two vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges, and by malicious people to disclose potentially sensitive information. [Read More]


patched Gentoo update for smb4k
Vendor Patch. Secunia Advisory 26 of 327 in 2005. 8,784 views.
Release Date:
2005-11-21
Secunia Advisory ID:
SA17636
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for smb4k. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for gtk+/gdk-pixbuf
Vendor Patch. Secunia Advisory 27 of 327 in 2005. 10,535 views.
Release Date:
2005-11-17
Secunia Advisory ID:
SA17594
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for gtk+ and gdk-pixbuf. These fix some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


patched Gentoo update for sylpheed
Vendor Patch. Secunia Advisory 28 of 327 in 2005. 8,378 views.
Release Date:
2005-11-15
Secunia Advisory ID:
SA17540
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for sylpheed. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo scorched3d Multiple Vulnerabilities
Vendor Workaround. Secunia Advisory 29 of 327 in 2005. 7,557 views.
Release Date:
2005-11-15
Secunia Advisory ID:
SA17549
Solution Status:
Vendor Workaround
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has acknowledged some vulnerabilities in scorched3d, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for linux-ftpd-ssl
Vendor Patch. Secunia Advisory 30 of 327 in 2005. 9,041 views.
Release Date:
2005-11-14
Secunia Advisory ID:
SA17529
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ftpd. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


patched Gentoo update for php
Vendor Patch. Secunia Advisory 31 of 327 in 2005. 10,817 views.
Release Date:
2005-11-14
Secunia Advisory ID:
SA17510
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for php. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions. [Read More]


patched Gentoo update for lynx
Vendor Patch. Secunia Advisory 32 of 327 in 2005. 8,308 views.
Release Date:
2005-11-14
Secunia Advisory ID:
SA17512
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for lynx. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for rar
Vendor Patch. Secunia Advisory 33 of 327 in 2005. 6,862 views.
Release Date:
2005-11-14
Secunia Advisory ID:
SA17524
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for rar. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for openvpn
Vendor Patch. Secunia Advisory 34 of 327 in 2005. 9,076 views.
Release Date:
2005-11-07
Secunia Advisory ID:
SA17447
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for openvpn. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


patched Gentoo update for giflib
Vendor Patch. Secunia Advisory 35 of 327 in 2005. 8,806 views.
Release Date:
2005-11-07
Secunia Advisory ID:
SA17482
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for giflib. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


patched Gentoo update for fetchmail
Vendor Patch. Secunia Advisory 36 of 327 in 2005. 10,037 views.
Release Date:
2005-11-07
Secunia Advisory ID:
SA17446
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for fetchmail. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of certain sensitive information. [Read More]


patched Gentoo update for clamav
Vendor Patch. Secunia Advisory 37 of 327 in 2005. 8,999 views.
Release Date:
2005-11-07
Secunia Advisory ID:
SA17448
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and to compromise a vulnerable system. [Read More]


patched Gentoo update for gnump3d
Vendor Patch. Secunia Advisory 38 of 327 in 2005. 9,851 views.
Release Date:
2005-11-07
Secunia Advisory ID:
SA17449
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for gnump3d. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and directory traversal attacks. [Read More]


patched Gentoo update for libgda
Vendor Patch. Secunia Advisory 39 of 327 in 2005. 7,789 views.
Release Date:
2005-11-03
Secunia Advisory ID:
SA17426
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libgda. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for qdbm / imagemagick / gdal
Vendor Patch. Secunia Advisory 40 of 327 in 2005. 9,399 views.
Release Date:
2005-11-03
Secunia Advisory ID:
SA17427
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates for qdbm / imagemagick / gdal. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for ethereal
Vendor Patch. Secunia Advisory 41 of 327 in 2005. 10,095 views.
Release Date:
2005-10-31
Secunia Advisory ID:
SA17377
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ethereal. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Gentoo update for xli / xloadimage
Vendor Patch. Secunia Advisory 42 of 327 in 2005. 8,607 views.
Release Date:
2005-10-31
Secunia Advisory ID:
SA17369
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for xli and xloadimage. These fix a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for pam
Vendor Patch. Secunia Advisory 43 of 327 in 2005. 9,229 views.
Release Date:
2005-10-28
Secunia Advisory ID:
SA17365
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Security Bypass
Where:
Local system
Short Description:
Gentoo has issued an update for pam. This fixes a security issue, which potentially can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


patched Gentoo update for mantis
Vendor Patch. Secunia Advisory 44 of 327 in 2005. 10,007 views.
Release Date:
2005-10-28
Secunia Advisory ID:
SA17362
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Cross Site Scripting
Manipulation of data
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mantis. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting, script insertion, and SQL injection attacks, and compromise a vulnerable system. [Read More]


patched Gentoo update for tikiwiki
Vendor Patch. Secunia Advisory 45 of 327 in 2005. 7,820 views.
Release Date:
2005-10-28
Secunia Advisory ID:
SA17363
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for tikiwiki. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


patched Gentoo update for zope
Vendor Patch. Secunia Advisory 46 of 327 in 2005. 8,759 views.
Release Date:
2005-10-25
Secunia Advisory ID:
SA17309
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Unknown
Where:
From remote
Short Description:
Gentoo has issued an update for zope. This fixes a vulnerability with an unknown impact. [Read More]


patched Gentoo update for phpmyadmin
Vendor Patch. Secunia Advisory 47 of 327 in 2005. 8,632 views.
Release Date:
2005-10-25
Secunia Advisory ID:
SA17298
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for phpmyadmin. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information. [Read More]


patched Gentoo update for curl
Vendor Patch. Secunia Advisory 48 of 327 in 2005. 9,361 views.
Release Date:
2005-10-24
Secunia Advisory ID:
SA17297
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for curl. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for netpbm
Vendor Patch. Secunia Advisory 49 of 327 in 2005. 9,042 views.
Release Date:
2005-10-20
Secunia Advisory ID:
SA17265
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for netpbm. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system. [Read More]


patched Gentoo update for abiword
Vendor Patch. Secunia Advisory 50 of 327 in 2005. 9,052 views.
Release Date:
2005-10-20
Secunia Advisory ID:
SA17264
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for abiword. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for lynx
Vendor Patch. Secunia Advisory 51 of 327 in 2005. 9,347 views.
Release Date:
2005-10-18
Secunia Advisory ID:
SA17238
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for lynx. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for phpmyadmin
Vendor Patch. Secunia Advisory 52 of 327 in 2005. 8,288 views.
Release Date:
2005-10-18
Secunia Advisory ID:
SA17234
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for phpmyadmin. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information. [Read More]


patched Gentoo update for perl / qt-unixodbc / cmake
Vendor Patch. Secunia Advisory 53 of 327 in 2005. 9,596 views.
Release Date:
2005-10-17
Secunia Advisory ID:
SA17232
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates for perl / qt-unixodbc / cmake. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for spe
Vendor Patch. Secunia Advisory 54 of 327 in 2005. 9,068 views.
Release Date:
2005-10-17
Secunia Advisory ID:
SA17241
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for SPE. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for koffice/kword
Vendor Patch. Secunia Advisory 55 of 327 in 2005. 9,580 views.
Release Date:
2005-10-14
Secunia Advisory ID:
SA17190
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for koffice and kword. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for openssl
Vendor Patch. Secunia Advisory 56 of 327 in 2005. 10,098 views.
Release Date:
2005-10-12
Secunia Advisory ID:
SA17180
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for openssl. This fixes a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for uw-imap
Vendor Patch. Secunia Advisory 57 of 327 in 2005. 9,918 views.
Release Date:
2005-10-11
Secunia Advisory ID:
SA17152
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for uw-imap. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Gentoo update for xine
Vendor Patch. Secunia Advisory 58 of 327 in 2005. 9,076 views.
Release Date:
2005-10-10
Secunia Advisory ID:
SA17111
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xine-lib. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for realplayer / helixplayer
Vendor Patch. Secunia Advisory 59 of 327 in 2005. 8,813 views.
Release Date:
2005-10-10
Secunia Advisory ID:
SA17116
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for realplayer / helixplayer. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for weex
Vendor Patch. Secunia Advisory 60 of 327 in 2005. 9,160 views.
Release Date:
2005-10-10
Secunia Advisory ID:
SA17112
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for weex. This fixes a vulnerability, which potentially can be exploited by malicious users to cause a DoS (Denial of Service) or to compromise a vulnerable system. [Read More]


patched Gentoo update for dia
Vendor Patch. Secunia Advisory 61 of 327 in 2005. 8,124 views.
Release Date:
2005-10-07
Secunia Advisory ID:
SA17095
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for dia. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for ruby
Vendor Patch. Secunia Advisory 62 of 327 in 2005. 8,564 views.
Release Date:
2005-10-07
Secunia Advisory ID:
SA17094
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for uim
Vendor Patch. Secunia Advisory 63 of 327 in 2005. 8,891 views.
Release Date:
2005-10-05
Secunia Advisory ID:
SA17058
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for uim. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for texinfo
Vendor Patch. Secunia Advisory 64 of 327 in 2005. 10,284 views.
Release Date:
2005-10-05
Secunia Advisory ID:
SA17070
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for texinfo. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for mpeg-tools
Vendor Patch. Secunia Advisory 65 of 327 in 2005. 9,089 views.
Release Date:
2005-10-04
Secunia Advisory ID:
SA17051
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for mpeg-tools. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for gtkdiskfree
Vendor Patch. Secunia Advisory 66 of 327 in 2005. 8,806 views.
Release Date:
2005-10-04
Secunia Advisory ID:
SA17056
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for gtkdiskfree. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for hylafax
Vendor Patch. Secunia Advisory 67 of 327 in 2005. 8,683 views.
Release Date:
2005-09-30
Secunia Advisory ID:
SA17022
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for hylafax. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for abiword
Vendor Patch. Secunia Advisory 68 of 327 in 2005. 9,352 views.
Release Date:
2005-09-30
Secunia Advisory ID:
SA17012
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for abiword. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for php
Vendor Patch. Secunia Advisory 69 of 327 in 2005. 10,071 views.
Release Date:
2005-09-28
Secunia Advisory ID:
SA16976
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for php. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for qt
Vendor Patch. Secunia Advisory 70 of 327 in 2005. 7,578 views.
Release Date:
2005-09-27
Secunia Advisory ID:
SA16957
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for qt. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a user's system. [Read More]


patched Gentoo update for webmin/usermin
Vendor Patch. Secunia Advisory 71 of 327 in 2005. 7,634 views.
Release Date:
2005-09-26
Secunia Advisory ID:
SA16940
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for webmin/usermin. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for mantis
Vendor Patch. Secunia Advisory 72 of 327 in 2005. 7,817 views.
Release Date:
2005-09-26
Secunia Advisory ID:
SA16938
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for mantis. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. [Read More]


patched Gentoo update for zebedee
Vendor Patch. Secunia Advisory 73 of 327 in 2005. 7,670 views.
Release Date:
2005-09-21
Secunia Advisory ID:
SA16892
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for zebedee. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for util-linux
Vendor Patch. Secunia Advisory 74 of 327 in 2005. 7,229 views.
Release Date:
2005-09-21
Secunia Advisory ID:
SA16891
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for util-linux. This fixes a security issue, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for clamav
Vendor Patch. Secunia Advisory 75 of 327 in 2005. 8,269 views.
Release Date:
2005-09-19
Secunia Advisory ID:
SA16862
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), or potentially to compromise a vulnerable system. [Read More]


patched Gentoo update for apache/mod_ssl
Vendor Patch. Secunia Advisory 76 of 327 in 2005. 9,809 views.
Release Date:
2005-09-19
Secunia Advisory ID:
SA16864
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Privilege escalation
Where:
From remote
Short Description:
Gentoo has issued an update for apache/mod_ssl. This fixes a security issue and a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions, or by malicious, local users to gain escalated privileges via a specially crafted ".htaccess" file. [Read More]


patched Gentoo update for py2play
Vendor Patch. Secunia Advisory 77 of 327 in 2005. 6,953 views.
Release Date:
2005-09-19
Secunia Advisory ID:
SA16863
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for py2play. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for mailutils
Vendor Patch. Secunia Advisory 78 of 327 in 2005. 7,327 views.
Release Date:
2005-09-19
Secunia Advisory ID:
SA16856
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mailutils. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


patched Gentoo update for mozilla/mozilla-firefox
Vendor Patch. Secunia Advisory 79 of 327 in 2005. 8,693 views.
Release Date:
2005-09-19
Secunia Advisory ID:
SA16844
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
Security Bypass
Spoofing
Manipulation of data
System access
Where:
From remote
Short Description:
Gentoo has issued updates for mozilla and mozilla-firefox. These fix some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, manipulate certain data, bypass certain security restrictions, and compromise a user's system. [Read More]


patched Gentoo update for xorg-x11
Vendor Patch. Secunia Advisory 80 of 327 in 2005. 7,943 views.
Release Date:
2005-09-13
Secunia Advisory ID:
SA16791
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for xorg-x11. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for python
Vendor Patch. Secunia Advisory 81 of 327 in 2005. 7,334 views.
Release Date:
2005-09-13
Secunia Advisory ID:
SA16800
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for python. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for squid
Vendor Patch. Secunia Advisory 82 of 327 in 2005. 6,399 views.
Release Date:
2005-09-08
Secunia Advisory ID:
SA16732
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for squid. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for openttd
Vendor Patch. Secunia Advisory 83 of 327 in 2005. 7,680 views.
Release Date:
2005-09-06
Secunia Advisory ID:
SA16697
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for openttd. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Gentoo update for net-snmp
Vendor Patch. Secunia Advisory 84 of 327 in 2005. 7,894 views.
Release Date:
2005-09-06
Secunia Advisory ID:
SA16695
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for net-snmp. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for phpldapadmin
Vendor Patch. Secunia Advisory 85 of 327 in 2005. 7,769 views.
Release Date:
2005-09-06
Secunia Advisory ID:
SA16702
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for phpldapadmin. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for gnumeric
Vendor Patch. Secunia Advisory 86 of 327 in 2005. 7,524 views.
Release Date:
2005-09-05
Secunia Advisory ID:
SA16694
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gnumeric. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for mplayer
Vendor Patch. Secunia Advisory 87 of 327 in 2005. 6,824 views.
Release Date:
2005-09-01
Secunia Advisory ID:
SA16656
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mplayer. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for phpwebsite
Vendor Patch. Secunia Advisory 88 of 327 in 2005. 11,164 views.
Release Date:
2005-09-01
Secunia Advisory ID:
SA16661
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Manipulation of data
System access
Where:
From remote
Short Description:
Gentoo has issued an update for phpwebsite. This fixes two vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks or compromise a vulnerable system. [Read More]


patched Gentoo update for pam_ldap
Vendor Patch. Secunia Advisory 89 of 327 in 2005. 6,433 views.
Release Date:
2005-09-01
Secunia Advisory ID:
SA16662
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for pam_ldap. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for phpgroupware
Vendor Patch. Secunia Advisory 90 of 327 in 2005. 8,347 views.
Release Date:
2005-08-31
Secunia Advisory ID:
SA16621
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Cross Site Scripting
System access
Where:
From remote
Short Description:
Gentoo has issued an update for phpgroupware. This fixes some vulnerabilities, which can be exploited by malicious administrative users to conduct script insertion attacks, or by malicious people to bypass certain security restrictions or compromise a vulnerable system. [Read More]


patched Gentoo update for lm_sensors
Vendor Patch. Secunia Advisory 91 of 327 in 2005. 6,923 views.
Release Date:
2005-08-31
Secunia Advisory ID:
SA16626
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for lm_sensors. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for libpcre
Vendor Patch. Secunia Advisory 92 of 327 in 2005. 8,170 views.
Release Date:
2005-08-26
Secunia Advisory ID:
SA16587
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libpcre. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for phpwiki
Vendor Patch. Secunia Advisory 93 of 327 in 2005. 8,607 views.
Release Date:
2005-08-26
Secunia Advisory ID:
SA16593
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for phpwiki. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for apache
Vendor Patch. Secunia Advisory 94 of 327 in 2005. 6,324 views.
Release Date:
2005-08-25
Secunia Advisory ID:
SA16568
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for apache. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for tikiwiki / egroupware
Vendor Patch. Secunia Advisory 95 of 327 in 2005. 7,198 views.
Release Date:
2005-08-25
Secunia Advisory ID:
SA16573
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for tikiwiki / egroupware. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for tor
Vendor Patch. Secunia Advisory 96 of 327 in 2005. 6,988 views.
Release Date:
2005-08-25
Secunia Advisory ID:
SA16540
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for tor. This fixes a vulnerability, which potentially can be exploited by malicious people to disclose or modify certain sensitive information. [Read More]


patched Gentoo update for PEAR-XML_RPC / phpxmlrpc
Vendor Patch. Secunia Advisory 97 of 327 in 2005. 10,854 views.
Release Date:
2005-08-24
Secunia Advisory ID:
SA16550
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for PEAR-XML_RPC / phpxmlrpc. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for evolution
Vendor Patch. Secunia Advisory 98 of 327 in 2005. 8,205 views.
Release Date:
2005-08-23
Secunia Advisory ID:
SA16520
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for evolution. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for acroread
Vendor Patch. Secunia Advisory 99 of 327 in 2005. 8,577 views.
Release Date:
2005-08-19
Secunia Advisory ID:
SA16505
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for acroread. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for Kismet
Vendor Patch. Secunia Advisory 100 of 327 in 2005. 9,243 views.
Release Date:
2005-08-19
Secunia Advisory ID:
SA16477
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Unknown
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Kismet. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for bluez-utils
Vendor Patch. Secunia Advisory 101 of 327 in 2005. 8,173 views.
Release Date:
2005-08-18
Secunia Advisory ID:
SA16476
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Gentoo has issued an update for bluez-utils. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions or compromise a vulnerable system. [Read More]


patched Gentoo update for xpdf/kpdf/gpdf
Vendor Patch. Secunia Advisory 102 of 327 in 2005. 7,249 views.
Release Date:
2005-08-16
Secunia Advisory ID:
SA16440
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued updates for xpdf, kpdf, and gpdf. These fix a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for awstats
Vendor Patch. Secunia Advisory 103 of 327 in 2005. 12,619 views.
Release Date:
2005-08-16
Secunia Advisory ID:
SA16439
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for awstats. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for gaim
Vendor Patch. Secunia Advisory 104 of 327 in 2005. 7,899 views.
Release Date:
2005-08-15
Secunia Advisory ID:
SA16436
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gaim. This fixes a vulnerability and a weakness, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system. [Read More]


patched Gentoo update for heartbeat
Vendor Patch. Secunia Advisory 105 of 327 in 2005. 7,560 views.
Release Date:
2005-08-08
Secunia Advisory ID:
SA16360
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for heartbeat. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for netpbm
Vendor Patch. Secunia Advisory 106 of 327 in 2005. 8,390 views.
Release Date:
2005-08-05
Secunia Advisory ID:
SA16336
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for netpbm. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for nbsmtp
Vendor Patch. Secunia Advisory 107 of 327 in 2005. 8,587 views.
Release Date:
2005-08-03
Secunia Advisory ID:
SA16324
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for nbsmtp. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for ProFTPD
Vendor Patch. Secunia Advisory 108 of 327 in 2005. 9,040 views.
Release Date:
2005-08-02
Secunia Advisory ID:
SA16288
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ProFTPD. This fixes two vulnerabilities, which can be exploited by malicious users to disclose certain sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. [Read More]


patched Gentoo update for Compress-Zlib
Vendor Patch. Secunia Advisory 109 of 327 in 2005. 9,041 views.
Release Date:
2005-08-01
Secunia Advisory ID:
SA16307
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for Compress-Zlib. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Gentoo update for emul-linux-x86-baselibs
Vendor Patch. Secunia Advisory 110 of 327 in 2005. 12,101 views.
Release Date:
2005-08-01
Secunia Advisory ID:
SA16284
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for emul-linux-x86-baselibs. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Gentoo update for pstotext
Vendor Patch. Secunia Advisory 111 of 327 in 2005. 8,408 views.
Release Date:
2005-08-01
Secunia Advisory ID:
SA16305
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for pstotext. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for ethereal
Vendor Patch. Secunia Advisory 112 of 327 in 2005. 8,317 views.
Release Date:
2005-07-28
Secunia Advisory ID:
SA16249
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ethereal. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Gentoo update for gnugadu/kadu/ekg/libgadu/centericq
Vendor Patch. Secunia Advisory 113 of 327 in 2005. 10,791 views.
Release Date:
2005-07-27
Secunia Advisory ID:
SA16242
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for gnugadu, kadu, ekg, libgadu and centericq. These fix a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Gentoo update for clamav
Vendor Patch. Secunia Advisory 114 of 327 in 2005. 9,252 views.
Release Date:
2005-07-27
Secunia Advisory ID:
SA16229
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Gentoo update for mozilla
Vendor Patch. Secunia Advisory 115 of 327 in 2005. 8,860 views.
Release Date:
2005-07-27
Secunia Advisory ID:
SA16230
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Cross Site Scripting
Spoofing
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and spoofing attacks, and compromise a user's system. [Read More]


patched Gentoo update for kopete
Vendor Patch. Secunia Advisory 116 of 327 in 2005. 10,645 views.
Release Date:
2005-07-26
Secunia Advisory ID:
SA16211
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for kopete. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Gentoo update for sandbox
Vendor Patch. Secunia Advisory 117 of 327 in 2005. 8,838 views.
Release Date:
2005-07-26
Secunia Advisory ID:
SA16214
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for sandbox. This fixes a vulnerability, which potentially can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for fetchmail
Vendor Patch. Secunia Advisory 118 of 327 in 2005. 7,931 views.
Release Date:
2005-07-26
Secunia Advisory ID:
SA16213
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for fetchmail. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for shorewall
Vendor Patch. Secunia Advisory 119 of 327 in 2005. 6,981 views.
Release Date:
2005-07-22
Secunia Advisory ID:
SA16162
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From local network
Short Description:
Gentoo has issued an update for shorewall. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for zlib
Vendor Patch. Secunia Advisory 120 of 327 in 2005. 6,769 views.
Release Date:
2005-07-22
Secunia Advisory ID:
SA16163
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for zlib. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) against a vulnerable application. [Read More]


patched Gentoo update for mediawiki
Vendor Patch. Secunia Advisory 121 of 327 in 2005. 8,433 views.
Release Date:
2005-07-20
Secunia Advisory ID:
SA16130
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for mediawiki. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


patched Gentoo update for mozilla-thunderbird
Vendor Patch. Secunia Advisory 122 of 327 in 2005. 8,418 views.
Release Date:
2005-07-18
Secunia Advisory ID:
SA16101
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Cross Site Scripting
Exposure of system information
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, gain knowledge of potentially sensitive information, conduct cross-site scripting attacks and compromise a user's system. [Read More]


patched Gentoo update for dhcpcd
Vendor Patch. Secunia Advisory 123 of 327 in 2005. 6,639 views.
Release Date:
2005-07-18
Secunia Advisory ID:
SA16107
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for dhcpcd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for php
Vendor Patch. Secunia Advisory 124 of 327 in 2005. 8,667 views.
Release Date:
2005-07-18
Secunia Advisory ID:
SA16103
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for php. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for mozilla-firefox
Vendor Patch. Secunia Advisory 125 of 327 in 2005. 8,931 views.
Release Date:
2005-07-15
Secunia Advisory ID:
SA16095
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Cross Site Scripting
Spoofing
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct spoofing and cross-site scripting attacks, and compromise a user's system. [Read More]


patched Gentoo update for pam_ldap / nss_ldap
Vendor Patch. Secunia Advisory 126 of 327 in 2005. 8,462 views.
Release Date:
2005-07-14
Secunia Advisory ID:
SA16076
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
Gentoo has issued an update for pam_ldap and nss_ldap. This fixes a security issue, which can be exploit by malicious people to gain knowledge of sensitive information. [Read More]


patched Gentoo update for bugzilla
Vendor Patch. Secunia Advisory 127 of 327 in 2005. 6,833 views.
Release Date:
2005-07-14
Secunia Advisory ID:
SA16066
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for bugzilla. This fixes two vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and gain knowledge of sensitive information. [Read More]


patched Gentoo update for mit-krb5
Vendor Patch. Secunia Advisory 128 of 327 in 2005. 8,113 views.
Release Date:
2005-07-13
Secunia Advisory ID:
SA16052
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mit-krb5. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Gentoo update for ruby
Vendor Patch. Secunia Advisory 129 of 327 in 2005. 6,830 views.
Release Date:
2005-07-12
Secunia Advisory ID:
SA16020
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for ruby. This fixes a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for acroread
Vendor Patch. Secunia Advisory 130 of 327 in 2005. 6,719 views.
Release Date:
2005-07-11
Secunia Advisory ID:
SA16025
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for acroread. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for phpwebsite
Vendor Patch. Secunia Advisory 131 of 327 in 2005. 7,518 views.
Release Date:
2005-07-11
Secunia Advisory ID:
SA16027
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Manipulation of data
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for phpwebsite. This fixes some vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks, disclose sensitive information and compromise a vulnerable system. [Read More]


patched Gentoo update for phpgroupware/egroupware
Vendor Patch. Secunia Advisory 132 of 327 in 2005. 8,040 views.
Release Date:
2005-07-11
Secunia Advisory ID:
SA15993
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for phpgroupware and egroupware. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for tikiwiki
Vendor Patch. Secunia Advisory 133 of 327 in 2005. 7,672 views.
Release Date:
2005-07-07
Secunia Advisory ID:
SA15946
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for tikiwiki. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for zlib
Vendor Patch. Secunia Advisory 134 of 327 in 2005. 6,909 views.
Release Date:
2005-07-07
Secunia Advisory ID:
SA15969
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for zlib. This fixes a vulnerability, which can be exploited by malicious people to conduct a DoS (Denial of Service) against a vulnerable application, or potentially to execute arbitrary code. [Read More]


patched Gentoo update for realplayer
Vendor Patch. Secunia Advisory 135 of 327 in 2005. 6,928 views.
Release Date:
2005-07-06
Secunia Advisory ID:
SA15929
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for realplayer. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo phpBB "highlight" PHP Code Execution Vulnerability
Vendor Workaround. Secunia Advisory 136 of 327 in 2005. 8,937 views.
Release Date:
2005-07-05
Secunia Advisory ID:
SA15905
Solution Status:
Vendor Workaround
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has acknowledged a vulnerability in phpBB, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for wordpress
Vendor Patch. Secunia Advisory 137 of 327 in 2005. 7,073 views.
Release Date:
2005-07-05
Secunia Advisory ID:
SA15898
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Manipulation of data
Exposure of system information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for wordpress. This fixes some vulnerabilities, which can be exploited by malicious people to manipulate mail messages, conduct cross-site scripting and SQL injection attacks, and by malicious users to compromise a vulnerable system. [Read More]


patched Gentoo update for PEAR XML_RPC
Vendor Patch. Secunia Advisory 138 of 327 in 2005. 7,874 views.
Release Date:
2005-07-04
Secunia Advisory ID:
SA15897
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for PEAR XML_RPC. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for heimdal
Vendor Patch. Secunia Advisory 139 of 327 in 2005. 6,968 views.
Release Date:
2005-06-29
Secunia Advisory ID:
SA15858
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for heimdal. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for clamav
Vendor Patch. Secunia Advisory 140 of 327 in 2005. 7,390 views.
Release Date:
2005-06-27
Secunia Advisory ID:
SA15823
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for sudo
Vendor Patch. Secunia Advisory 141 of 327 in 2005. 7,167 views.
Release Date:
2005-06-23
Secunia Advisory ID:
SA15782
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
Local system
Short Description:
Gentoo has issued an update for sudo. This fixes a vulnerability, which can be exploited by malicious, local users to execute arbitrary commands with escalated privileges. [Read More]


patched Gentoo update for Trac
Vendor Patch. Secunia Advisory 142 of 327 in 2005. 5,658 views.
Release Date:
2005-06-23
Secunia Advisory ID:
SA15792
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Trac. This fixes some vulnerabilities, which can be exploited by malicious users to disclose sensitive information and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for cacti
Vendor Patch. Secunia Advisory 143 of 327 in 2005. 5,997 views.
Release Date:
2005-06-23
Secunia Advisory ID:
SA15795
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Manipulation of data
System access
Where:
From remote
Short Description:
Gentoo has issued an update for cacti. This fixes some vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks, bypass certain security restrictions or compromise a vulnerable system. [Read More]


patched Gentoo update for squirrelmail
Vendor Patch. Secunia Advisory 144 of 327 in 2005. 7,919 views.
Release Date:
2005-06-22
Secunia Advisory ID:
SA15766
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for squirrelmail. This fixes several vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


patched Gentoo update for tor
Vendor Patch. Secunia Advisory 145 of 327 in 2005. 7,357 views.
Release Date:
2005-06-22
Secunia Advisory ID:
SA15775
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for tor. This fixes a vulnerability, which potentially can be exploited by malicious people to disclose sensitive information. [Read More]


patched Gentoo update for spamassassin/razor
Vendor Patch. Secunia Advisory 146 of 327 in 2005. 9,305 views.
Release Date:
2005-06-21
Secunia Advisory ID:
SA15768
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued updates for spamassassin and razor. These fix a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for peercast
Vendor Patch. Secunia Advisory 147 of 327 in 2005. 9,661 views.
Release Date:
2005-06-20
Secunia Advisory ID:
SA15753
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for peercast. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for sun-jdk/sun-jre-bin/blackdown-jdk/blackdown-jre
Vendor Patch. Secunia Advisory 148 of 327 in 2005. 9,371 views.
Release Date:
2005-06-20
Secunia Advisory ID:
SA15755
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for sun-jdk, sun-jre-bin, blackdown-jdk, and blackdown-jre. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for cpio
Vendor Patch. Secunia Advisory 149 of 327 in 2005. 8,866 views.
Release Date:
2005-06-20
Secunia Advisory ID:
SA15751
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for cpio. This fixes a vulnerability, which can be exploited by malicious people to cause files to be unpacked to arbitrary locations on a user's system. [Read More]


patched Gentoo update for MediaWiki
Vendor Patch. Secunia Advisory 150 of 327 in 2005. 8,116 views.
Release Date:
2005-06-14
Secunia Advisory ID:
SA15691
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for MediaWiki. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


patched Gentoo update for shtool/ocaml-mysql
Vendor Patch. Secunia Advisory 151 of 327 in 2005. 32,945 views.
Release Date:
2005-06-13
Secunia Advisory ID:
SA15668
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates for shtool and ocaml-mysql. These fix a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for lutelwall
Vendor Patch. Secunia Advisory 152 of 327 in 2005. 8,100 views.
Release Date:
2005-06-13
Secunia Advisory ID:
SA15665
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for lutelwall. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for gaim
Vendor Patch. Secunia Advisory 153 of 327 in 2005. 7,866 views.
Release Date:
2005-06-13
Secunia Advisory ID:
SA15681
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for gaim. This fixes two weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for ettercap
Vendor Patch. Secunia Advisory 154 of 327 in 2005. 9,402 views.
Release Date:
2005-06-12
Secunia Advisory ID:
SA15664
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ettercap. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for gedit
Vendor Patch. Secunia Advisory 155 of 327 in 2005. 8,068 views.
Release Date:
2005-06-12
Secunia Advisory ID:
SA15667
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gedit. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for libextractor
Vendor Patch. Secunia Advisory 156 of 327 in 2005. 8,034 views.
Release Date:
2005-06-10
Secunia Advisory ID:
SA15661
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libextractor. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for silvercity
Vendor Patch. Secunia Advisory 157 of 327 in 2005. 7,438 views.
Release Date:
2005-06-09
Secunia Advisory ID:
SA15632
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for silvercity. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for mailutils
Vendor Patch. Secunia Advisory 158 of 327 in 2005. 8,395 views.
Release Date:
2005-06-07
Secunia Advisory ID:
SA15607
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for mailutils. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks. [Read More]


patched Gentoo update for wordpress
Vendor Patch. Secunia Advisory 159 of 327 in 2005. 7,883 views.
Release Date:
2005-06-07
Secunia Advisory ID:
SA15611
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Manipulation of data
Exposure of system information
Where:
From remote
Short Description:
Gentoo has issued an update for wordpress. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. [Read More]


patched Gentoo update for dzip
Vendor Patch. Secunia Advisory 160 of 327 in 2005. 8,742 views.
Release Date:
2005-06-07
Secunia Advisory ID:
SA15614
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for dzip. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for binutils/elfutils
Vendor Patch. Secunia Advisory 161 of 327 in 2005. 9,161 views.
Release Date:
2005-06-02
Secunia Advisory ID:
SA15565
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for binutils and elfutils. These fix a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for mailutils
Vendor Patch. Secunia Advisory 162 of 327 in 2005. 8,109 views.
Release Date:
2005-05-27
Secunia Advisory ID:
SA15529
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mailutils. This fixes some vulnerabilities, which can be exploited to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Gentoo update for gxine
Vendor Patch. Secunia Advisory 163 of 327 in 2005. 6,752 views.
Release Date:
2005-05-26
Secunia Advisory ID:
SA15507
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gxine. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for qpopper
Vendor Patch. Secunia Advisory 164 of 327 in 2005. 8,900 views.
Release Date:
2005-05-24
Secunia Advisory ID:
SA15478
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for qpopper. This fixes two vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for net-snmp
Vendor Patch. Secunia Advisory 165 of 327 in 2005. 8,256 views.
Release Date:
2005-05-24
Secunia Advisory ID:
SA15476
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Manipulation of data
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for net-snmp. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for gdb
Vendor Patch. Secunia Advisory 166 of 327 in 2005. 7,641 views.
Release Date:
2005-05-23
Secunia Advisory ID:
SA15467
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for gdb. This fixes some vulnerabilities, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for imagemagick/graphicsmagick
Vendor Patch. Secunia Advisory 167 of 327 in 2005. 9,217 views.
Release Date:
2005-05-23
Secunia Advisory ID:
SA15453
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued updates for imagemagick and graphicsmagick. These fix a weakness, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo webapp-config Insecure Temporary File Creation
Vendor Patch. Secunia Advisory 168 of 327 in 2005. 9,721 views.
Release Date:
2005-05-23
Secunia Advisory ID:
SA15445
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Eric Romang has reported a vulnerability in webapp-config, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


patched Gentoo update for cheetah
Vendor Patch. Secunia Advisory 169 of 327 in 2005. 6,114 views.
Release Date:
2005-05-20
Secunia Advisory ID:
SA15435
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for cheetah. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for freeradius
Vendor Patch. Secunia Advisory 170 of 327 in 2005. 7,647 views.
Release Date:
2005-05-18
Secunia Advisory ID:
SA15404
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Unknown
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for freeradius. This fixes some vulnerabilities, where one has an unknown impact and the others potentially can be exploited to conduct SQL injection attacks. [Read More]


patched Gentoo update for postgresql
Vendor Patch. Secunia Advisory 171 of 327 in 2005. 6,508 views.
Release Date:
2005-05-16
Secunia Advisory ID:
SA15375
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Privilege escalation
Unknown
Where:
From local network
Short Description:
Gentoo has released an update for postgresql. This fixes two vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service) or potentially gain escalated privileges. [Read More]


patched Gentoo update for Mozilla / Mozilla Firefox
Vendor Patch. Secunia Advisory 172 of 327 in 2005. 7,454 views.
Release Date:
2005-05-16
Secunia Advisory ID:
SA15376
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Mozilla / Mozilla Firefox. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. [Read More]


patched Gentoo update for phpBB
Vendor Patch. Secunia Advisory 173 of 327 in 2005. 7,172 views.
Release Date:
2005-05-16
Secunia Advisory ID:
SA15378
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Unknown
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for phpBB. This fixes a vulnerability, which can be exploited to conduct cross-site scripting or script insertion attacks. [Read More]


patched Gentoo update for gaim
Vendor Patch. Secunia Advisory 174 of 327 in 2005. 6,206 views.
Release Date:
2005-05-12
Secunia Advisory ID:
SA15321
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gaim. This fixes a vulnerability and a weakness, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system. [Read More]


patched Gentoo update for hteditor
Vendor Patch. Secunia Advisory 175 of 327 in 2005. 7,326 views.
Release Date:
2005-05-11
Secunia Advisory ID:
SA15333
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for hteditor. This fixes two vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for libtiff
Vendor Patch. Secunia Advisory 176 of 327 in 2005. 7,964 views.
Release Date:
2005-05-11
Secunia Advisory ID:
SA15331
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libtiff. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for gzip
Vendor Patch. Secunia Advisory 177 of 327 in 2005. 7,824 views.
Release Date:
2005-05-10
Secunia Advisory ID:
SA15308
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for gzip. This fixes a vulnerability, which potentially can be exploited by malicious people to extract files to arbitrary directories on a user's system. [Read More]


patched Gentoo update for tcpdump
Vendor Patch. Secunia Advisory 178 of 327 in 2005. 7,477 views.
Release Date:
2005-05-10
Secunia Advisory ID:
SA15309
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for tcpdump. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for gnutls
Vendor Patch. Secunia Advisory 179 of 327 in 2005. 7,949 views.
Release Date:
2005-05-09
Secunia Advisory ID:
SA15258
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for gnutls. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for ethereal
Vendor Patch. Secunia Advisory 180 of 327 in 2005. 7,834 views.
Release Date:
2005-05-09
Secunia Advisory ID:
SA15280
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ethereal. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Gentoo update for oops
Vendor Patch. Secunia Advisory 181 of 327 in 2005. 7,145 views.
Release Date:
2005-05-06
Secunia Advisory ID:
SA15273
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for oops. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for pound
Vendor Patch. Secunia Advisory 182 of 327 in 2005. 8,326 views.
Release Date:
2005-05-02
Secunia Advisory ID:
SA15202
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for pound. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo phpmyadmin Installation Script Insecure Permissions
Vendor Patch. Secunia Advisory 183 of 327 in 2005. 14,372 views.
Release Date:
2005-05-02
Secunia Advisory ID:
SA15198
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A security issue has been reported in phpmyadmin, which can be exploited by malicious, local users to disclose sensitive information. [Read More]


patched Gentoo update for horde
Vendor Patch. Secunia Advisory 184 of 327 in 2005. 8,056 views.
Release Date:
2005-05-02
Secunia Advisory ID:
SA15194
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued updates for horde, horde-vacation, horde-turba, horde-passwd, horde-nag, horde-mnemo, horde-kronolith, horde-imp, horde-accounts, horde-forwards and horde-chora. These fix a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


patched Gentoo update for heimdal
Vendor Patch. Secunia Advisory 185 of 327 in 2005. 6,342 views.
Release Date:
2005-04-29
Secunia Advisory ID:
SA15168
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for heimdal. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for rkhunter
Vendor Patch. Secunia Advisory 186 of 327 in 2005. 8,296 views.
Release Date:
2005-04-27
Secunia Advisory ID:
SA15132
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for rkhunter. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for Convert-UUlib
Vendor Patch. Secunia Advisory 187 of 327 in 2005. 7,460 views.
Release Date:
2005-04-27
Secunia Advisory ID:
SA15131
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Convert-UUlib. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for xine-lib
Vendor Patch. Secunia Advisory 188 of 327 in 2005. 7,250 views.
Release Date:
2005-04-27
Secunia Advisory ID:
SA15129
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xine-lib. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for egroupware
Vendor Patch. Secunia Advisory 189 of 327 in 2005. 6,802 views.
Release Date:
2005-04-26
Secunia Advisory ID:
SA15114
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for egroupware. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. [Read More]


patched Gentoo update for kdewebdev
Vendor Patch. Secunia Advisory 190 of 327 in 2005. 6,899 views.
Release Date:
2005-04-25
Secunia Advisory ID:
SA15097
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for kdewebdev. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for kdelibs
Vendor Patch. Secunia Advisory 191 of 327 in 2005. 7,185 views.
Release Date:
2005-04-25
Secunia Advisory ID:
SA15096
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for kdelibs. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for realplayer/helixplayer
Vendor Patch. Secunia Advisory 192 of 327 in 2005. 8,178 views.
Release Date:
2005-04-25
Secunia Advisory ID:
SA15095
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for realplayer and helixplayer. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for openmosixview
Vendor Patch. Secunia Advisory 193 of 327 in 2005. 7,738 views.
Release Date:
2005-04-22
Secunia Advisory ID:
SA15051
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Manipulation of data
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for openmosixview. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for mplayer
Vendor Patch. Secunia Advisory 194 of 327 in 2005. 6,960 views.
Release Date:
2005-04-20
Secunia Advisory ID:
SA15018
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mplayer. This fixes two vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for xv
Vendor Patch. Secunia Advisory 195 of 327 in 2005. 7,360 views.
Release Date:
2005-04-19
Secunia Advisory ID:
SA14998
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xv. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for mozilla/firefox
Vendor Patch. Secunia Advisory 196 of 327 in 2005. 8,156 views.
Release Date:
2005-04-19
Secunia Advisory ID:
SA15002
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Cross Site Scripting
Exposure of system information
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued updates for mozilla and firefox. These fix some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, gain knowledge of potentially sensitive information, and compromise a user's system. [Read More]


patched Gentoo update for cvs
Vendor Patch. Secunia Advisory 197 of 327 in 2005. 7,631 views.
Release Date:
2005-04-19
Secunia Advisory ID:
SA14994
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Unknown
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for cvs. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. [Read More]


patched Gentoo update for php
Vendor Patch. Secunia Advisory 198 of 327 in 2005. 7,933 views.
Release Date:
2005-04-18
Secunia Advisory ID:
SA14975
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for php. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for monkeyd
Vendor Patch. Secunia Advisory 199 of 327 in 2005. 8,069 views.
Release Date:
2005-04-18
Secunia Advisory ID:
SA14984
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for monkeyd. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Gentoo update for openoffice
Vendor Patch. Secunia Advisory 200 of 327 in 2005. 7,683 views.
Release Date:
2005-04-18
Secunia Advisory ID:
SA14983
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for openoffice. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for junkbuster
Vendor Patch. Secunia Advisory 201 of 327 in 2005. 6,980 views.
Release Date:
2005-04-14
Secunia Advisory ID:
SA14955
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for junkbuster. This fixes some vulnerabilities, which can be exploited by malicious people to manipulate certain information, cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for rsnapshot
Vendor Patch. Secunia Advisory 202 of 327 in 2005. 7,729 views.
Release Date:
2005-04-14
Secunia Advisory ID:
SA14956
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for rsnapshot. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for gld
Vendor Patch. Secunia Advisory 203 of 327 in 2005. 7,932 views.
Release Date:
2005-04-13
Secunia Advisory ID:
SA14951
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for gld. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for axel
Vendor Patch. Secunia Advisory 204 of 327 in 2005. 7,522 views.
Release Date:
2005-04-13
Secunia Advisory ID:
SA14933
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for axel. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for phpmyadmin
Vendor Patch. Secunia Advisory 205 of 327 in 2005. 6,808 views.
Release Date:
2005-04-12
Secunia Advisory ID:
SA14911
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for phpmyadmin. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attack. [Read More]


patched Gentoo update for gnome-vfs/libcdaudio
Vendor Patch. Secunia Advisory 206 of 327 in 2005. 7,825 views.
Release Date:
2005-04-08
Secunia Advisory ID:
SA14877
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for gnome-vfs and libcdaudio. These fix a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for sharutils
Vendor Patch. Secunia Advisory 207 of 327 in 2005. 5,790 views.
Release Date:
2005-04-07
Secunia Advisory ID:
SA14852
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for sharutils. This fixes a vulnerability, which potentially can be exploited by malicious, local users to conduct certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for mit-krb5
Vendor Patch. Secunia Advisory 208 of 327 in 2005. 5,539 views.
Release Date:
2005-04-07
Secunia Advisory ID:
SA14843
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mit-krb5. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for gaim
Vendor Patch. Secunia Advisory 209 of 327 in 2005. 5,824 views.
Release Date:
2005-04-07
Secunia Advisory ID:
SA14848
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for gaim. This fixes three weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for dnsmasq
Vendor Patch. Secunia Advisory 210 of 327 in 2005. 8,298 views.
Release Date:
2005-04-05
Secunia Advisory ID:
SA14830
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Spoofing
Manipulation of data
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for dnsmasq. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or poison the DNS cache. [Read More]


patched Gentoo update for sylpheed / sylpheed-claws
Vendor Patch. Secunia Advisory 211 of 327 in 2005. 8,115 views.
Release Date:
2005-04-04
Secunia Advisory ID:
SA14806
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for sylpheed and sylpheed-claws. These fix a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for telnet-bsd
Vendor Patch. Secunia Advisory 212 of 327 in 2005. 8,155 views.
Release Date:
2005-04-04
Secunia Advisory ID:
SA14805
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for telnet-bsd. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for limewire
Vendor Patch. Secunia Advisory 213 of 327 in 2005. 13,923 views.
Release Date:
2005-03-31
Secunia Advisory ID:
SA14789
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for limewire. This fixes two vulnerabilities, which can be exploited by malicious people to disclose sensitive information. [Read More]


patched Gentoo update for netkit-telnetd
Vendor Patch. Secunia Advisory 214 of 327 in 2005. 6,074 views.
Release Date:
2005-03-31
Secunia Advisory ID:
SA14779
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for netkit-telnetd. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for smarty
Vendor Patch. Secunia Advisory 215 of 327 in 2005. 8,002 views.
Release Date:
2005-03-31
Secunia Advisory ID:
SA14785
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for smarty. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for mpg321
Vendor Patch. Secunia Advisory 216 of 327 in 2005. 6,628 views.
Release Date:
2005-03-29
Secunia Advisory ID:
SA14765
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mpg321. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for Mozilla
Vendor Patch. Secunia Advisory 217 of 327 in 2005. 8,255 views.
Release Date:
2005-03-28
Secunia Advisory ID:
SA14737
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Exposure of sensitive information
Exposure of system information
Spoofing
Cross Site Scripting
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited to bypass certain security restrictions, conduct spoofing and script insertion attacks, disclose various information, or compromise a user's system. [Read More]


patched Gentoo update for Firefox
Vendor Patch. Secunia Advisory 218 of 327 in 2005. 8,790 views.
Release Date:
2005-03-28
Secunia Advisory ID:
SA14736
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for Firefox. This fixes three vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. [Read More]


patched Gentoo update for Thunderbird
Vendor Patch. Secunia Advisory 219 of 327 in 2005. 8,157 views.
Release Date:
2005-03-28
Secunia Advisory ID:
SA14735
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Thunderbird. This fixes four vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for ipsec-tools
Vendor Patch. Secunia Advisory 220 of 327 in 2005. 8,575 views.
Release Date:
2005-03-28
Secunia Advisory ID:
SA14727
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for ipsec-tools. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for sun-jdk/sun-jre-bin
Vendor Patch. Secunia Advisory 221 of 327 in 2005. 6,910 views.
Release Date:
2005-03-25
Secunia Advisory ID:
SA14695
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for sun-jdk and sun-jre-bin. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo dyndnsupdate Multiple Buffer Overflows
Vendor Workaround. Secunia Advisory 222 of 327 in 2005. 8,054 views.
Release Date:
2005-03-22
Secunia Advisory ID:
SA14673
Solution Status:
Vendor Workaround
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has acknowledged some vulnerabilities in dyndnsupdate, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for rxvt-unicode
Vendor Patch. Secunia Advisory 223 of 327 in 2005. 8,100 views.
Release Date:
2005-03-21
Secunia Advisory ID:
SA14634
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for rxvt-unicode. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for ltris
Vendor Patch. Secunia Advisory 224 of 327 in 2005. 7,195 views.
Release Date:
2005-03-21
Secunia Advisory ID:
SA14639
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for ltris. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for openslp
Vendor Patch. Secunia Advisory 225 of 327 in 2005. 8,509 views.
Release Date:
2005-03-21
Secunia Advisory ID:
SA14636
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for openslp. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for sylpheed/sylpheed-claws
Vendor Patch. Secunia Advisory 226 of 327 in 2005. 7,487 views.
Release Date:
2005-03-21
Secunia Advisory ID:
SA14637
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for sylpheed and sylpheed-claws. These fix a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for kdelibs
Vendor Patch. Secunia Advisory 227 of 327 in 2005. 7,524 views.
Release Date:
2005-03-21
Secunia Advisory ID:
SA14626
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
Local system
Short Description:
Gentoo has issued an update for kdelibs. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for grip
Vendor Patch. Secunia Advisory 228 of 327 in 2005. 6,738 views.
Release Date:
2005-03-18
Secunia Advisory ID:
SA14615
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for grip. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for curl
Vendor Patch. Secunia Advisory 229 of 327 in 2005. 7,042 views.
Release Date:
2005-03-17
Secunia Advisory ID:
SA14619
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for curl. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for mysql
Vendor Patch. Secunia Advisory 230 of 327 in 2005. 7,812 views.
Release Date:
2005-03-17
Secunia Advisory ID:
SA14618
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
System access
Where:
From local network
Short Description:
Gentoo has issued an update for mysql. This fixes some vulnerabilities, which potentially can be exploited by malicious users to compromise a vulnerable system and by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for ringtonetools
Vendor Patch. Secunia Advisory 231 of 327 in 2005. 7,576 views.
Release Date:
2005-03-16
Secunia Advisory ID:
SA14603
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ringtonetools. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for xorg-x11
Vendor Patch. Secunia Advisory 232 of 327 in 2005. 7,332 views.
Release Date:
2005-03-14
Secunia Advisory ID:
SA14572
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xorg-x11. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for libexif
Vendor Patch. Secunia Advisory 233 of 327 in 2005. 7,314 views.
Release Date:
2005-03-14
Secunia Advisory ID:
SA14574
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libexif. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Gentoo update for ethereal
Vendor Patch. Secunia Advisory 234 of 327 in 2005. 7,064 views.
Release Date:
2005-03-14
Secunia Advisory ID:
SA14573
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ethereal. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Gentoo update for mlterm
Vendor Patch. Secunia Advisory 235 of 327 in 2005. 7,681 views.
Release Date:
2005-03-08
Secunia Advisory ID:
SA14532
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mlterm. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for kdelibs
Vendor Patch. Secunia Advisory 236 of 327 in 2005. 6,818 views.
Release Date:
2005-03-08
Secunia Advisory ID:
SA14525
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for kdelibs. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges on a vulnerable system. [Read More]


patched Gentoo update for hashcash
Vendor Patch. Secunia Advisory 237 of 327 in 2005. 7,796 views.
Release Date:
2005-03-07
Secunia Advisory ID:
SA14488
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for hashcash. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for mozilla-firefox
Vendor Patch. Secunia Advisory 238 of 327 in 2005. 7,081 views.
Release Date:
2005-03-07
Secunia Advisory ID:
SA14471
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Cross Site Scripting
Spoofing
Manipulation of data
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-firefox. This fixes multiple vulnerabilities, which can be exploited to spoof various information, plant malware on a user's system, conduct cross-site scripting attacks, disclose and manipulate sensitive information, bypass certain security restrictions, perform certain actions on a vulnerable system with escalated privileges, and compromise a user's system. [Read More]


patched Gentoo update for imagemagick
Vendor Patch. Secunia Advisory 239 of 327 in 2005. 6,920 views.
Release Date:
2005-03-07
Secunia Advisory ID:
SA14486
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for imagemagick. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for openmotif / lesstif
Vendor Patch. Secunia Advisory 240 of 327 in 2005. 7,982 views.
Release Date:
2005-03-07
Secunia Advisory ID:
SA14482
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for openmotif and lesstif. These fix a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for xv
Vendor Patch. Secunia Advisory 241 of 327 in 2005. 7,207 views.
Release Date:
2005-03-07
Secunia Advisory ID:
SA14517
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xv. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for bidwatcher
Vendor Patch. Secunia Advisory 242 of 327 in 2005. 8,244 views.
Release Date:
2005-03-04
Secunia Advisory ID:
SA14468
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for bidwatcher. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for phpmyadmin
Vendor Patch. Secunia Advisory 243 of 327 in 2005. 8,956 views.
Release Date:
2005-03-04
Secunia Advisory ID:
SA14469
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for phpmyadmin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information. [Read More]


patched Gentoo update for xli / xloadimage
Vendor Patch. Secunia Advisory 244 of 327 in 2005. 7,676 views.
Release Date:
2005-03-03
Secunia Advisory ID:
SA14463
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for xli and xloadimage. These fix some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for gaim
Vendor Patch. Secunia Advisory 245 of 327 in 2005. 7,060 views.
Release Date:
2005-03-02
Secunia Advisory ID:
SA14446
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for gaim. This fixes three weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for phpBB
Vendor Patch. Secunia Advisory 246 of 327 in 2005. 7,484 views.
Release Date:
2005-03-02
Secunia Advisory ID:
SA14445
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for phpBB. This fixes two vulnerabilities, which can be exploited by malicious users to disclose and delete sensitive information. [Read More]


patched Gentoo update for phpwebsite
Vendor Patch. Secunia Advisory 247 of 327 in 2005. 7,091 views.
Release Date:
2005-03-02
Secunia Advisory ID:
SA14447
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for phpWebSite. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo Qt Insecure Library Path Searching Vulnerability
Vendor Patch. Secunia Advisory 248 of 327 in 2005. 8,235 views.
Release Date:
2005-03-02
Secunia Advisory ID:
SA14442
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for qt. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for uim
Vendor Patch. Secunia Advisory 249 of 327 in 2005. 6,972 views.
Release Date:
2005-03-01
Secunia Advisory ID:
SA14424
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for uim. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for unace
Vendor Patch. Secunia Advisory 250 of 327 in 2005. 7,501 views.
Release Date:
2005-03-01
Secunia Advisory ID:
SA14425
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for unace. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for mediawiki
Vendor Patch. Secunia Advisory 251 of 327 in 2005. 8,638 views.
Release Date:
2005-03-01
Secunia Advisory ID:
SA14426
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for mediawiki. This fixes some vulnerabilities, which can be exploited by malicious users to delete arbitrary files, and by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions. [Read More]


patched Gentoo update for cmd5checkpw
Vendor Patch. Secunia Advisory 252 of 327 in 2005. 7,469 views.
Release Date:
2005-02-28
Secunia Advisory ID:
SA14408
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for cmd5checkpw. This fixes a vulnerability allowing malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for cyrus-imapd
Vendor Patch. Secunia Advisory 253 of 327 in 2005. 8,161 views.
Release Date:
2005-02-24
Secunia Advisory ID:
SA14388
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for cyrus-imapd. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for putty
Vendor Patch. Secunia Advisory 254 of 327 in 2005. 7,388 views.
Release Date:
2005-02-22
Secunia Advisory ID:
SA14363
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for putty. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for gproftpd
Vendor Patch. Secunia Advisory 255 of 327 in 2005. 7,331 views.
Release Date:
2005-02-21
Secunia Advisory ID:
SA14361
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gproftpd. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


patched Gentoo update for gftp
Vendor Patch. Secunia Advisory 256 of 327 in 2005. 6,985 views.
Release Date:
2005-02-21
Secunia Advisory ID:
SA14341
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for gftp. This fixes a vulnerability, which can be exploited by malicious people to conduct directory traversal attacks. [Read More]


patched Gentoo update for squid
Vendor Patch. Secunia Advisory 257 of 327 in 2005. 7,226 views.
Release Date:
2005-02-21
Secunia Advisory ID:
SA14339
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for squid. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for mc
Vendor Patch. Secunia Advisory 258 of 327 in 2005. 7,183 views.
Release Date:
2005-02-18
Secunia Advisory ID:
SA14331
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mc. This fixes multiple vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or execute arbitrary code. [Read More]


patched Gentoo update for kdeedu
Vendor Patch. Secunia Advisory 259 of 327 in 2005. 6,970 views.
Release Date:
2005-02-17
Secunia Advisory ID:
SA14314
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Privilege escalation
System access
Where:
From local network
Short Description:
Gentoo has issued an update for kdeedu. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and potentially by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for wpa_supplicant
Vendor Patch. Secunia Advisory 260 of 327 in 2005. 9,091 views.
Release Date:
2005-02-17
Secunia Advisory ID:
SA14316
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for wpa_supplicant. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for lighttpd
Vendor Patch. Secunia Advisory 261 of 327 in 2005. 7,650 views.
Release Date:
2005-02-16
Secunia Advisory ID:
SA14308
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for lighttpd. This fixes a vulnerability, which can be exploited by malicious people to disclose some potentially sensitive information. [Read More]


patched Gentoo update for emacs/xemacs
Vendor Patch. Secunia Advisory 262 of 327 in 2005. 7,883 views.
Release Date:
2005-02-16
Secunia Advisory ID:
SA14307
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for emacs and xemacs. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for VMware
Vendor Patch. Secunia Advisory 263 of 327 in 2005. 7,357 views.
Release Date:
2005-02-15
Secunia Advisory ID:
SA14292
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for VMware. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for postgresql
Vendor Patch. Secunia Advisory 264 of 327 in 2005. 6,956 views.
Release Date:
2005-02-15
Secunia Advisory ID:
SA14290
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
From remote
Short Description:
Gentoo has issued an update for postgresql. This fixes a vulnerability, which can be exploited by malicious users to gain escalated privileges. [Read More]


patched Gentoo update for opera
Vendor Patch. Secunia Advisory 265 of 327 in 2005. 7,649 views.
Release Date:
2005-02-15
Secunia Advisory ID:
SA14282
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Spoofing
Exposure of system information
Privilege escalation
System access
Where:
From remote
Short Description:
Gentoo has issued an update for opera. This fixes some vulnerabilities, which can be exploited by malicious people to disclose some system information, spoof the content of websites, trick a user into executing malicious files and compromise a user's system. [Read More]


patched Gentoo update for htdig
Vendor Patch. Secunia Advisory 266 of 327 in 2005. 10,000 views.
Release Date:
2005-02-14
Secunia Advisory ID:
SA14276
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for htdig. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


patched Gentoo update for pdns
Vendor Patch. Secunia Advisory 267 of 327 in 2005. 7,671 views.
Release Date:
2005-02-14
Secunia Advisory ID:
SA14275
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for pdns. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo webmin Encrypted Root Password Disclosure
Vendor Patch. Secunia Advisory 268 of 327 in 2005. 10,720 views.
Release Date:
2005-02-14
Secunia Advisory ID:
SA14265
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
Gentoo has issued an update for webmin. This fixes a security issue, which may disclose sensitive information to malicious people. [Read More]


patched Gentoo update for mod_python
Vendor Patch. Secunia Advisory 269 of 327 in 2005. 7,916 views.
Release Date:
2005-02-14
Secunia Advisory ID:
SA14269
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for mod_python. This fixes a vulnerability, which potentially can be exploited by malicious people to disclose sensitive information. [Read More]


patched Gentoo update for perl
Vendor Patch. Secunia Advisory 270 of 327 in 2005. 7,741 views.
Release Date:
2005-02-14
Secunia Advisory ID:
SA14264
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for perl. This fixes two vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for mailman
Vendor Patch. Secunia Advisory 271 of 327 in 2005. 6,798 views.
Release Date:
2005-02-11
Secunia Advisory ID:
SA14238
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for mailman. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information. [Read More]


patched Gentoo update for pdftohtml
Vendor Patch. Secunia Advisory 272 of 327 in 2005. 6,964 views.
Release Date:
2005-02-10
Secunia Advisory ID:
SA14207
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for pdftohtml. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for python
Vendor Patch. Secunia Advisory 273 of 327 in 2005. 8,782 views.
Release Date:
2005-02-09
Secunia Advisory ID:
SA14202
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Manipulation of data
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for python. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for postgresql
Vendor Patch. Secunia Advisory 274 of 327 in 2005. 7,619 views.
Release Date:
2005-02-08
Secunia Advisory ID:
SA14171
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for postgresql. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for openmotif
Vendor Patch. Secunia Advisory 275 of 327 in 2005. 8,420 views.
Release Date:
2005-02-07
Secunia Advisory ID:
SA14156
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for openmotif. This fixes multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for lesstif
Vendor Patch. Secunia Advisory 276 of 327 in 2005. 6,860 views.
Release Date:
2005-02-07
Secunia Advisory ID:
SA14140
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for lesstif. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Gentoo update for squid
Vendor Patch. Secunia Advisory 277 of 327 in 2005. 7,514 views.
Release Date:
2005-02-03
Secunia Advisory ID:
SA14112
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Unknown
Security Bypass
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for squid, which fixes various vulnerabilities. One has an unknown impact, and others can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service). [Read More]


patched Gentoo update for enscript
Vendor Patch. Secunia Advisory 278 of 327 in 2005. 7,664 views.
Release Date:
2005-02-03
Secunia Advisory ID:
SA14105
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for enscript. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for newspost
Vendor Patch. Secunia Advisory 279 of 327 in 2005. 7,786 views.
Release Date:
2005-02-03
Secunia Advisory ID:
SA14098
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for newspost. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for uw-imap
Vendor Patch. Secunia Advisory 280 of 327 in 2005. 9,423 views.
Release Date:
2005-02-02
Secunia Advisory ID:
SA14097
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for uw-imap. This fixes a vulnerability, which can be exploited by malicious people to bypass the user authentication. [Read More]


patched Gentoo update for firehol
Vendor Patch. Secunia Advisory 281 of 327 in 2005. 8,722 views.
Release Date:
2005-02-02
Secunia Advisory ID:
SA14102
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for firehol. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for clamav
Vendor Patch. Secunia Advisory 282 of 327 in 2005. 7,935 views.
Release Date:
2005-02-01
Secunia Advisory ID:
SA14089
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes a vulnerability and a weakness, which allows malware to bypass detection and cause a DoS (Denial of Service). [Read More]


patched Gentoo update for vdr
Vendor Patch. Secunia Advisory 283 of 327 in 2005. 8,457 views.
Release Date:
2005-01-31
Secunia Advisory ID:
SA14066
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Manipulation of data
Where:
Local system
Short Description:
Gentoo has issued an update for vdr. This fixes a vulnerability, which can be exploited by malicious, local users to manipulate sensitive information. [Read More]


patched Gentoo update for tikiwiki
Vendor Patch. Secunia Advisory 284 of 327 in 2005. 8,380 views.
Release Date:
2005-01-31
Secunia Advisory ID:
SA14065
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for tikiwiki. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for ngircd
Vendor Patch. Secunia Advisory 285 of 327 in 2005. 9,382 views.
Release Date:
2005-01-31
Secunia Advisory ID:
SA14059
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ngircd. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for ncpfs
Vendor Patch. Secunia Advisory 286 of 327 in 2005. 7,518 views.
Release Date:
2005-01-31
Secunia Advisory ID:
SA14070
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
System access
Where:
From local network
Short Description:
Gentoo has issued an update for ncpfs, which fixes two vulnerabilities. The first can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges, and the second may potentially allow malicious people to compromise a user's system. [Read More]


patched Gentoo update for gallery
Vendor Patch. Secunia Advisory 287 of 327 in 2005. 7,086 views.
Release Date:
2005-01-31
Secunia Advisory ID:
SA14069
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for gallery. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


patched Gentoo update for f2c
Vendor Patch. Secunia Advisory 288 of 327 in 2005. 9,174 views.
Release Date:
2005-01-31
Secunia Advisory ID:
SA14067
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for f2c. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for squirrelmail
Vendor Patch. Secunia Advisory 289 of 327 in 2005. 7,223 views.
Release Date:
2005-01-28
Secunia Advisory ID:
SA14033
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for squirrelmail. This fixes three vulnerabilities, which can be exploited by malicious people to gain knowledge of sensitive information or conduct cross-site scripting attacks. [Read More]


patched Gentoo update for perl/dbi
Vendor Patch. Secunia Advisory 290 of 327 in 2005. 7,367 views.
Release Date:
2005-01-27
Secunia Advisory ID:
SA14044
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued updates for perl and DBI. These fix some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for graphicsmagick
Vendor Patch. Secunia Advisory 291 of 327 in 2005. 7,264 views.
Release Date:
2005-01-27
Secunia Advisory ID:
SA14043
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for graphicsmagick. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for awstats
Vendor Patch. Secunia Advisory 292 of 327 in 2005. 9,469 views.
Release Date:
2005-01-26
Secunia Advisory ID:
SA14007
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Exposure of system information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for awstats. This fixes some vulnerabilities, which can be exploited by malicious people to disclose system information and compromise a vulnerable system. [Read More]


patched Gentoo update for konversation
Vendor Patch. Secunia Advisory 293 of 327 in 2005. 9,193 views.
Release Date:
2005-01-25
Secunia Advisory ID:
SA13989
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for konversation. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for evolution
Vendor Patch. Secunia Advisory 294 of 327 in 2005. 7,282 views.
Release Date:
2005-01-25
Secunia Advisory ID:
SA13990
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Privilege escalation
Where:
From remote
Short Description:
Gentoo has issued an update for evolution. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system or by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for tetex/cstetex/ptex
Vendor Patch. Secunia Advisory 295 of 327 in 2005. 8,373 views.
Release Date:
2005-01-24
Secunia Advisory ID:
SA13974
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Gentoo has issued updates for tetex, cstetex and ptex. These fix some vulnerabilities, which can be exploited by malicious people to compromise a user's system and by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for cups
Vendor Patch. Secunia Advisory 296 of 327 in 2005. 7,711 views.
Release Date:
2005-01-24
Secunia Advisory ID:
SA13956
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for cups. This fixes a vulnerability, which potentially can be exploited by malicious users to compromise a vulnerable system. [Read More]


patched Gentoo update for xpdf/gpdf
Vendor Patch. Secunia Advisory 297 of 327 in 2005. 7,006 views.
Release Date:
2005-01-24
Secunia Advisory ID:
SA13949
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for xpdf and gpdf. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for mysql
Vendor Patch. Secunia Advisory 298 of 327 in 2005. 7,055 views.
Release Date:
2005-01-24
Secunia Advisory ID:
SA13959
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Manipulation of data
Exposure of sensitive information
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for mysql. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for koffice/kdegraphics
Vendor Patch. Secunia Advisory 299 of 327 in 2005. 7,669 views.
Release Date:
2005-01-24
Secunia Advisory ID:
SA13958
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for koffice and kdegraphics. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for mailman
Vendor Patch. Secunia Advisory 300 of 327 in 2005. 6,701 views.
Release Date:
2005-01-24
Secunia Advisory ID:
SA13950
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for mailman. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


patched Gentoo update for imagemagick
Vendor Patch. Secunia Advisory 301 of 327 in 2005. 6,672 views.
Release Date:
2005-01-21
Secunia Advisory ID:
SA13878
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for imagemagick. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for ethereal
Vendor Patch. Secunia Advisory 302 of 327 in 2005. 9,785 views.
Release Date:
2005-01-21
Secunia Advisory ID:
SA13954
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for ethereal. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Gentoo update for squid
Vendor Patch. Secunia Advisory 303 of 327 in 2005. 8,324 views.
Release Date:
2005-01-17
Secunia Advisory ID:
SA13864
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for squid. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Gentoo update for poppassd_pam
Vendor Workaround. Secunia Advisory 304 of 327 in 2005. 9,976 views.
Release Date:
2005-01-14
Secunia Advisory ID:
SA13865
Solution Status:
Vendor Workaround
Criticality:
Moderately critical
Impact:
Security Bypass
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for poppassd_pam. This fixes a vulnerability, which can be exploited by malicious people to change system passwords. [Read More]


patched Gentoo update for tnftp
Vendor Patch. Secunia Advisory 305 of 327 in 2005. 8,540 views.
Release Date:
2005-01-14
Secunia Advisory ID:
SA13856
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
System access
Where:
From remote
Short Description:
Gentoo has issued an update for tnftp. This fixes a vulnerability, allowing malicious people to overwrite local files. [Read More]


patched Gentoo update for exim
Vendor Patch. Secunia Advisory 306 of 327 in 2005. 8,074 views.
Release Date:
2005-01-13
Secunia Advisory ID:
SA13823
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Privilege escalation
Where:
From remote
Short Description:
Gentoo has issued an update for exim. This fixes two vulnerabilities, which potentially can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for imlib2
Vendor Patch. Secunia Advisory 307 of 327 in 2005. 8,201 views.
Release Date:
2005-01-12
Secunia Advisory ID:
SA13810
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for imlib2. This fixes multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for o3read
Vendor Patch. Secunia Advisory 308 of 327 in 2005. 8,339 views.
Release Date:
2005-01-12
Secunia Advisory ID:
SA13811
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for o3read. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for hylafax
Vendor Patch. Secunia Advisory 309 of 327 in 2005. 9,209 views.
Release Date:
2005-01-12
Secunia Advisory ID:
SA13816
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From local network
Short Description:
Gentoo has issued an update for hylafax. This fixes a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for mpg123
Vendor Patch. Secunia Advisory 310 of 327 in 2005. 9,631 views.
Release Date:
2005-01-11
Secunia Advisory ID:
SA13788
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mpg123. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for kdelibs
Vendor Patch. Secunia Advisory 311 of 327 in 2005. 8,496 views.
Release Date:
2005-01-11
Secunia Advisory ID:
SA13800
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for kdelibs. This fixes a vulnerability, which can be exploited by malicious people to conduct FTP command injection attacks. [Read More]


patched Gentoo update for koffice/kpdf
Vendor Patch. Secunia Advisory 312 of 327 in 2005. 8,978 views.
Release Date:
2005-01-11
Secunia Advisory ID:
SA13799
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for koffice and kpdf. These fix some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for konqueror
Vendor Patch. Secunia Advisory 313 of 327 in 2005. 8,483 views.
Release Date:
2005-01-11
Secunia Advisory ID:
SA13798
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for konqueror. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for unrtf
Vendor Patch. Secunia Advisory 314 of 327 in 2005. 9,571 views.
Release Date:
2005-01-11
Secunia Advisory ID:
SA13780
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for unrtf. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for pdftohtml
Vendor Patch. Secunia Advisory 315 of 327 in 2005. 8,843 views.
Release Date:
2005-01-10
Secunia Advisory ID:
SA13778
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for pdftohtml. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for tikiwiki
Vendor Patch. Secunia Advisory 316 of 327 in 2005. 10,736 views.
Release Date:
2005-01-10
Secunia Advisory ID:
SA13772
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for tikiwiki. This fixes a vulnerability, which can be exploited by certain malicious users to compromise a vulnerable system. [Read More]


patched Gentoo update for dillo
Vendor Patch. Secunia Advisory 317 of 327 in 2005. 10,772 views.
Release Date:
2005-01-10
Secunia Advisory ID:
SA13764
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for dillo. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for phpgroupware
Vendor Patch. Secunia Advisory 318 of 327 in 2005. 9,330 views.
Release Date:
2005-01-07
Secunia Advisory ID:
SA13745
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Manipulation of data
Exposure of system information
Where:
From remote
Short Description:
Gentoo has issued an update for phpgroupware. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. [Read More]


patched Gentoo update for xzgv
Vendor Patch. Secunia Advisory 319 of 327 in 2005. 8,047 views.
Release Date:
2005-01-07
Secunia Advisory ID:
SA13509
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xzgv. This fixes multiple vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for vilistextum
Vendor Patch. Secunia Advisory 320 of 327 in 2005. 9,908 views.
Release Date:
2005-01-07
Secunia Advisory ID:
SA13740
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for vilistextum. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for tiff
Vendor Patch. Secunia Advisory 321 of 327 in 2005. 8,890 views.
Release Date:
2005-01-06
Secunia Advisory ID:
SA13736
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for tiff. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for mit-krb5
Vendor Patch. Secunia Advisory 322 of 327 in 2005. 10,404 views.
Release Date:
2005-01-06
Secunia Advisory ID:
SA13727
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for mit-krb5. This fixes a vulnerability, which potentially can be exploited by malicious users to compromise a vulnerable system. [Read More]


patched Gentoo update for shoutcast-server
Vendor Patch. Secunia Advisory 323 of 327 in 2005. 11,501 views.
Release Date:
2005-01-06
Secunia Advisory ID:
SA13726
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for shoutcast-server. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for xine-lib
Vendor Patch. Secunia Advisory 324 of 327 in 2005. 9,827 views.
Release Date:
2005-01-06
Secunia Advisory ID:
SA13739
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Unknown
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xine-lib. This fixes some vulnerabilities, where some have an unspecified impact and others can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for mozilla/firefox/thunderbird
Vendor Patch. Secunia Advisory 325 of 327 in 2005. 12,738 views.
Release Date:
2005-01-05
Secunia Advisory ID:
SA13724
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Spoofing
Exposure of system information
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for mozilla, firefox and thunderbird. These fix some vulnerabilities, which can be exploited to cause a DoS (Denial of Service), detect the presence of local files, spoof the file download dialog, disclose sensitive information, or potentially compromise a vulnerable system. [Read More]


patched Gentoo update for a2ps
Vendor Patch. Secunia Advisory 326 of 327 in 2005. 10,168 views.
Release Date:
2005-01-05
Secunia Advisory ID:
SA13720
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for a2ps. This fixes two vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for linpopup
Vendor Patch. Secunia Advisory 327 of 327 in 2005. 9,863 views.
Release Date:
2005-01-05
Secunia Advisory ID:
SA13719
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for linpopup. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Gentoo Linux 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


Secunia is a member of FIRST Secunia is a member of EDUcause Secunia is a member of The Open Group Secunia is a member of FS-ISAC
 
Secunia © 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer
follow Secunia on Facebook follow Secunia on Twitter follow Secunia on LinkedIn follow Secunia on YouTube follow Secunia Xing follow Secunias RSS feed follow Secunia on Google+