Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Gentoo Linux

This vulnerability report for Gentoo Linux contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Gentoo Linux then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Gentoo

Product Link N/A

Affected By 2095 Secunia advisories
8127 Vulnerabilities

Monitor Product Receive alerts for this product





235 Secunia Advisories in 2006

Secunia has issued a total of 235 Secunia advisories in 2006 for Gentoo Linux. Currently, 1% (3 out of 235) are marked as unpatched with the most severe being rated Highly critical

More information about the specific Secunia advisories affecting Gentoo Linux can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Gentoo update for ruby
Vendor Patch. Secunia Advisory 1 of 235 in 2006. 9,785 views.
Release Date:
2006-12-21
Secunia Advisory ID:
SA23454
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for imlib2
Vendor Patch. Secunia Advisory 2 of 235 in 2006. 10,286 views.
Release Date:
2006-12-21
Secunia Advisory ID:
SA23441
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for imlib2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Gentoo update for pam_ldap
Vendor Patch. Secunia Advisory 3 of 235 in 2006. 8,525 views.
Release Date:
2006-12-21
Secunia Advisory ID:
SA23428
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for pam_ldap. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for clamav
Vendor Patch. Secunia Advisory 4 of 235 in 2006. 8,906 views.
Release Date:
2006-12-19
Secunia Advisory ID:
SA23404
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo vlnx Insecure DT_RPATH Vulnerability
Unpatched. Secunia Advisory 5 of 235 in 2006. 9,159 views.
Release Date:
2006-12-18
Secunia Advisory ID:
SA23429
Solution Status:
Unpatched
Criticality:
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Gentoo has acknowledged a vulnerability, which can be exploited by malicious, local users to gain escalated privileges or by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for links
Vendor Patch. Secunia Advisory 6 of 235 in 2006. 10,474 views.
Release Date:
2006-12-15
Secunia Advisory ID:
SA23389
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of system information
Exposure of sensitive information
Where:
From local network
Short Description:
Gentoo has issued an update for links. This fixes a vulnerability, which can be exploited by malicious people to expose sensitive information and manipulate data. [Read More]


Gentoo update for libgsf
Vendor Patch. Secunia Advisory 7 of 235 in 2006. 9,874 views.
Release Date:
2006-12-13
Secunia Advisory ID:
SA23355
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libgsf. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. [Read More]


Gentoo update for f-prot
Vendor Patch. Secunia Advisory 8 of 235 in 2006. 9,400 views.
Release Date:
2006-12-13
Secunia Advisory ID:
SA23328
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for f-prot. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for trac
Vendor Patch. Secunia Advisory 9 of 235 in 2006. 8,055 views.
Release Date:
2006-12-13
Secunia Advisory ID:
SA23357
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Where:
From remote
Short Description:
Gentoo has issued an update for trac. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site request forgery attacks. [Read More]


Gentoo update for emul-linux-x86-baselibs
Vendor Patch. Secunia Advisory 10 of 235 in 2006. 14,364 views.
Release Date:
2006-12-12
Secunia Advisory ID:
SA23309
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for emul-linux-x86-baselibs. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. [Read More]


Gentoo update for tar
Vendor Patch. Secunia Advisory 11 of 235 in 2006. 9,559 views.
Release Date:
2006-12-12
Secunia Advisory ID:
SA23314
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for tar. This fixes a security issue, which can be exploited by malicious people to overwrite arbitrary files. [Read More]


Gentoo update for libmodplug
Vendor Patch. Secunia Advisory 12 of 235 in 2006. 9,604 views.
Release Date:
2006-12-11
Secunia Advisory ID:
SA23294
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libmodplug. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Gentoo update for mozilla-thunderbird
Vendor Patch. Secunia Advisory 13 of 235 in 2006. 10,496 views.
Release Date:
2006-12-11
Secunia Advisory ID:
SA23297
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, and potentially compromise a vulnerable system. [Read More]


Gentoo update for seamonkey
Vendor Patch. Secunia Advisory 14 of 235 in 2006. 10,218 views.
Release Date:
2006-12-11
Secunia Advisory ID:
SA23263
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, and potentially compromise a vulnerable system. [Read More]


Gentoo update for mozilla-firefox
Vendor Patch. Secunia Advisory 15 of 235 in 2006. 11,085 views.
Release Date:
2006-12-11
Secunia Advisory ID:
SA23287
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, and potentially compromise a vulnerable system. [Read More]


Gentoo update for xine-lib
Vendor Patch. Secunia Advisory 16 of 235 in 2006. 9,091 views.
Release Date:
2006-12-11
Secunia Advisory ID:
SA23301
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xine-lib. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for gnupg
Vendor Patch. Secunia Advisory 17 of 235 in 2006. 10,642 views.
Release Date:
2006-12-11
Secunia Advisory ID:
SA23303
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gnupg. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Gentoo update for wv
Vendor Patch. Secunia Advisory 18 of 235 in 2006. 9,998 views.
Release Date:
2006-12-08
Secunia Advisory ID:
SA23273
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for wv. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Gentoo update for proftpd
Vendor Patch. Secunia Advisory 19 of 235 in 2006. 10,760 views.
Release Date:
2006-12-01
Secunia Advisory ID:
SA23179
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for proftpd. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and by malicious users and malicious people to potentially compromise a vulnerable system. [Read More]


Gentoo update for lha
Vendor Patch. Secunia Advisory 20 of 235 in 2006. 10,067 views.
Release Date:
2006-11-29
Secunia Advisory ID:
SA23156
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for lha. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for mono
Vendor Patch. Secunia Advisory 21 of 235 in 2006. 8,819 views.
Release Date:
2006-11-29
Secunia Advisory ID:
SA23154
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for mono. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for openldap
Vendor Patch. Secunia Advisory 22 of 235 in 2006. 8,890 views.
Release Date:
2006-11-29
Secunia Advisory ID:
SA23152
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for openldap. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for imagemagick
Vendor Patch. Secunia Advisory 23 of 235 in 2006. 9,005 views.
Release Date:
2006-11-27
Secunia Advisory ID:
SA23121
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for imagemagick. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for gv
Vendor Patch. Secunia Advisory 24 of 235 in 2006. 9,026 views.
Release Date:
2006-11-27
Secunia Advisory ID:
SA23118
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gv. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for kile
Vendor Patch. Secunia Advisory 25 of 235 in 2006. 10,567 views.
Release Date:
2006-11-27
Secunia Advisory ID:
SA23099
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for kile. This fixes a security issue, which can be exploited by malicious, local users to gain knowledge of certain information. [Read More]


Gentoo update for horde-ingo
Vendor Patch. Secunia Advisory 26 of 235 in 2006. 9,144 views.
Release Date:
2006-11-27
Secunia Advisory ID:
SA23100
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for horde-ingo. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Gentoo update for fvwm
Vendor Patch. Secunia Advisory 27 of 235 in 2006. 11,470 views.
Release Date:
2006-11-24
Secunia Advisory ID:
SA23089
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Gentoo has issued an update for fvwm. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Gentoo update for qmailadmin
Vendor Patch. Secunia Advisory 28 of 235 in 2006. 8,687 views.
Release Date:
2006-11-22
Secunia Advisory ID:
SA23019
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for qmailadmin. This fixes a vulnerability, which potentially can be exploited by malicious people to a DoS (Denial of Service). [Read More]


Gentoo update for texinfo
Vendor Patch. Secunia Advisory 29 of 235 in 2006. 10,067 views.
Release Date:
2006-11-22
Secunia Advisory ID:
SA22995
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for texinfo. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Gentoo update for tikiwiki
Vendor Patch. Secunia Advisory 30 of 235 in 2006. 9,014 views.
Release Date:
2006-11-21
Secunia Advisory ID:
SA23039
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for tikiwiki. This fixes some vulnerabilities, which can be exploited by malicious people to disclose certain sensitive information or conduct cross-site scripting attacks. [Read More]


Gentoo update for avahi
Vendor Patch. Secunia Advisory 31 of 235 in 2006. 8,892 views.
Release Date:
2006-11-21
Secunia Advisory ID:
SA23042
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Gentoo has issued an update for avahi. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Gentoo update for ruby
Vendor Patch. Secunia Advisory 32 of 235 in 2006. 10,024 views.
Release Date:
2006-11-21
Secunia Advisory ID:
SA23040
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for wordpress
Vendor Patch. Secunia Advisory 33 of 235 in 2006. 8,617 views.
Release Date:
2006-11-20
Secunia Advisory ID:
SA22942
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for wordpress. This fixes some vulnerabilities, which can be exploited by malicious users to gain knowledge of potentially sensitive information or cause a DoS (Denial of Service), and by malicious people to gain knowledge of sensitive information. [Read More]


Gentoo update for libpng
Vendor Patch. Secunia Advisory 34 of 235 in 2006. 8,768 views.
Release Date:
2006-11-20
Secunia Advisory ID:
SA22941
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for libpng. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for openssh
Vendor Patch. Secunia Advisory 35 of 235 in 2006. 10,974 views.
Release Date:
2006-11-14
Secunia Advisory ID:
SA22823
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for openssh. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for librmp4
Vendor Patch. Secunia Advisory 36 of 235 in 2006. 8,668 views.
Release Date:
2006-11-14
Secunia Advisory ID:
SA22854
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for librpm4. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Gentoo update for ftpd
Vendor Patch. Secunia Advisory 37 of 235 in 2006. 10,340 views.
Release Date:
2006-11-13
Secunia Advisory ID:
SA22853
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for ftpd. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information or perform certain actions with escalated privileges. [Read More]


Gentoo update for bugzilla
Vendor Patch. Secunia Advisory 38 of 235 in 2006. 9,923 views.
Release Date:
2006-11-10
Secunia Advisory ID:
SA22790
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for bugzilla. This fixes some vulnerabilities, which can be exploited by malicious users to disclose potentially sensitive information, conduct cross-site scripting, script insertion, and request forgery attacks. [Read More]


Gentoo update for nvidia-drivers
Vendor Patch. Secunia Advisory 39 of 235 in 2006. 11,284 views.
Release Date:
2006-11-08
Secunia Advisory ID:
SA22764
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for nvidia-drivers. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges and potentially by malicious people to compromise a user's system. [Read More]


Gentoo update for screen
Vendor Patch. Secunia Advisory 40 of 235 in 2006. 8,902 views.
Release Date:
2006-11-06
Secunia Advisory ID:
SA22707
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for screen. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Gentoo update for qt
Vendor Patch. Secunia Advisory 41 of 235 in 2006. 9,392 views.
Release Date:
2006-11-06
Secunia Advisory ID:
SA22738
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for qt. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Gentoo update for asterisk
Vendor Patch. Secunia Advisory 42 of 235 in 2006. 11,658 views.
Release Date:
2006-10-31
Secunia Advisory ID:
SA22651
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for asterisk. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for php
Vendor Patch. Secunia Advisory 43 of 235 in 2006. 10,567 views.
Release Date:
2006-10-31
Secunia Advisory ID:
SA22650
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update in php. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Gentoo update for cheesetracker
Vendor Patch. Secunia Advisory 44 of 235 in 2006. 8,864 views.
Release Date:
2006-10-31
Secunia Advisory ID:
SA22643
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for cheesetracker. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for openssl
Vendor Patch. Secunia Advisory 45 of 235 in 2006. 12,751 views.
Release Date:
2006-10-24
Secunia Advisory ID:
SA22544
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for openssl. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. [Read More]


Gentoo update for mod_tcl
Vendor Patch. Secunia Advisory 46 of 235 in 2006. 10,147 views.
Release Date:
2006-10-24
Secunia Advisory ID:
SA22549
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mod_tcl. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for clamav
Vendor Patch. Secunia Advisory 47 of 235 in 2006. 9,186 views.
Release Date:
2006-10-24
Secunia Advisory ID:
SA22551
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for libmusicbrainz
Vendor Patch. Secunia Advisory 48 of 235 in 2006. 8,179 views.
Release Date:
2006-10-23
Secunia Advisory ID:
SA22517
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libmusicbrainz. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for cscope
Vendor Patch. Secunia Advisory 49 of 235 in 2006. 8,777 views.
Release Date:
2006-10-20
Secunia Advisory ID:
SA22515
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for cscope. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for nss
Vendor Patch. Secunia Advisory 50 of 235 in 2006. 9,406 views.
Release Date:
2006-10-18
Secunia Advisory ID:
SA22446
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for nss. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for capi4hylafax
Vendor Patch. Secunia Advisory 51 of 235 in 2006. 7,746 views.
Release Date:
2006-10-18
Secunia Advisory ID:
SA22450
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for capi4hylafax. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for python
Vendor Patch. Secunia Advisory 52 of 235 in 2006. 8,027 views.
Release Date:
2006-10-18
Secunia Advisory ID:
SA22448
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for python. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for seamonkey
Vendor Patch. Secunia Advisory 53 of 235 in 2006. 11,393 views.
Release Date:
2006-10-16
Secunia Advisory ID:
SA22391
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and potentially compromise a user's system. [Read More]


Gentoo update for ncompress
Vendor Patch. Secunia Advisory 54 of 235 in 2006. 31,905 views.
Release Date:
2006-10-06
Secunia Advisory ID:
SA22296
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ncompress. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Gentoo update for mozilla-thunderbird
Vendor Patch. Secunia Advisory 55 of 235 in 2006. 10,700 views.
Release Date:
2006-10-05
Secunia Advisory ID:
SA22274
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to conduct man-in-the-middle attacks, bypass certain security restrictions, and potentially compromise a user's system. [Read More]


Gentoo update for netscape-flash
Vendor Patch. Secunia Advisory 56 of 235 in 2006. 9,850 views.
Release Date:
2006-10-05
Secunia Advisory ID:
SA22268
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for netscape-flash. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and potentially compromise a user's system. [Read More]


Gentoo update for dokuwiki
Vendor Patch. Secunia Advisory 57 of 235 in 2006. 11,442 views.
Release Date:
2006-09-29
Secunia Advisory ID:
SA22199
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for dokuwiki. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Gentoo update for mozilla-firefox
Vendor Patch. Secunia Advisory 58 of 235 in 2006. 11,527 views.
Release Date:
2006-09-29
Secunia Advisory ID:
SA22195
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Spoofing
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), conduct man-in-the-middle, spoofing, and cross-site scripting attacks, and potentially compromise a vulnerable system. [Read More]


Gentoo update for opera
Vendor Patch. Secunia Advisory 59 of 235 in 2006. 8,595 views.
Release Date:
2006-09-29
Secunia Advisory ID:
SA22161
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Where:
From remote
Short Description:
Gentoo has issued an update for opera. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for openssh
Vendor Patch. Secunia Advisory 60 of 235 in 2006. 9,446 views.
Release Date:
2006-09-28
Secunia Advisory ID:
SA22164
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for openssh. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for tikiwiki
Vendor Patch. Secunia Advisory 61 of 235 in 2006. 8,362 views.
Release Date:
2006-09-27
Secunia Advisory ID:
SA22100
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
Gentoo has issued an update for tikiwiki. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. [Read More]


Gentoo update for gnutls
Vendor Patch. Secunia Advisory 62 of 235 in 2006. 10,152 views.
Release Date:
2006-09-27
Secunia Advisory ID:
SA22097
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for gnutls. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for imagemagick
Vendor Patch. Secunia Advisory 63 of 235 in 2006. 9,308 views.
Release Date:
2006-09-27
Secunia Advisory ID:
SA22096
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for imagemagick. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Gentoo update for gzip
Vendor Patch. Secunia Advisory 64 of 235 in 2006. 9,937 views.
Release Date:
2006-09-25
Secunia Advisory ID:
SA22085
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gzip. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for mailman
Vendor Patch. Secunia Advisory 65 of 235 in 2006. 10,266 views.
Release Date:
2006-09-19
Secunia Advisory ID:
SA22020
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Spoofing
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for mailman. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting or spoofing attacks, and cause a DoS (Denial of Service). [Read More]


Gentoo update for bind
Vendor Patch. Secunia Advisory 66 of 235 in 2006. 10,801 views.
Release Date:
2006-09-15
Secunia Advisory ID:
SA21912
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for bind. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for dokuwiki
Vendor Patch. Secunia Advisory 67 of 235 in 2006. 10,614 views.
Release Date:
2006-09-15
Secunia Advisory ID:
SA21936
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for dokuwiki. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for ffmpeg
Vendor Patch. Secunia Advisory 68 of 235 in 2006. 9,761 views.
Release Date:
2006-09-14
Secunia Advisory ID:
SA21921
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ffmpeg. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Gentoo update for xine-lib
Vendor Patch. Secunia Advisory 69 of 235 in 2006. 9,301 views.
Release Date:
2006-09-14
Secunia Advisory ID:
SA21919
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for xine-lib. This fixes a weakness, which can be exploited by malicious people to crash certain applications on a user's system. [Read More]


Gentoo update for libXfont
Vendor Patch. Secunia Advisory 70 of 235 in 2006. 9,892 views.
Release Date:
2006-09-14
Secunia Advisory ID:
SA21908
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for libXfont. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for adplug
Vendor Patch. Secunia Advisory 71 of 235 in 2006. 9,193 views.
Release Date:
2006-09-13
Secunia Advisory ID:
SA21869
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for adplug. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise applications using the library. [Read More]


Gentoo update for openssl
Vendor Patch. Secunia Advisory 72 of 235 in 2006. 11,638 views.
Release Date:
2006-09-08
Secunia Advisory ID:
SA21823
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for libXfont
Vendor Patch. Secunia Advisory 73 of 235 in 2006. 10,052 views.
Release Date:
2006-09-07
Secunia Advisory ID:
SA21798
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libXfont. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Gentoo update for gtetrinet
Vendor Patch. Secunia Advisory 74 of 235 in 2006. 9,657 views.
Release Date:
2006-09-07
Secunia Advisory ID:
SA21800
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gtetrinet. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for streamripper
Vendor Patch. Secunia Advisory 75 of 235 in 2006. 9,349 views.
Release Date:
2006-09-07
Secunia Advisory ID:
SA21801
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for streamripper. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for openttd
Vendor Patch. Secunia Advisory 76 of 235 in 2006. 8,878 views.
Release Date:
2006-09-07
Secunia Advisory ID:
SA21799
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for openttd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for php
Vendor Patch. Secunia Advisory 77 of 235 in 2006. 10,879 views.
Release Date:
2006-08-30
Secunia Advisory ID:
SA21683
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Gentoo has issued an update for php. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Gentoo update for motor
Vendor Patch. Secunia Advisory 78 of 235 in 2006. 9,599 views.
Release Date:
2006-08-30
Secunia Advisory ID:
SA21684
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for motor. This fixes a vulnerability, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for wireshark
Vendor Patch. Secunia Advisory 79 of 235 in 2006. 11,720 views.
Release Date:
2006-08-30
Secunia Advisory ID:
SA21682
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo Update for Multiple Packages
Vendor Patch. Secunia Advisory 80 of 235 in 2006. 12,415 views.
Release Date:
2006-08-29
Secunia Advisory ID:
SA21660
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for multiple packages. This fixes some security issues, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo alsaplayer Multiple Buffer Overflow Vulnerabilities
Unpatched. Secunia Advisory 81 of 235 in 2006. 11,488 views.
Release Date:
2006-08-28
Secunia Advisory ID:
SA21639
Solution Status:
Unpatched
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has acknowledged some vulnerabilities in alsaplayer, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for heartbeat
Vendor Patch. Secunia Advisory 82 of 235 in 2006. 10,890 views.
Release Date:
2006-08-25
Secunia Advisory ID:
SA21629
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for heartbeat. This fixes some vulnerabilities, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for heimdal
Vendor Patch. Secunia Advisory 83 of 235 in 2006. 8,155 views.
Release Date:
2006-08-24
Secunia Advisory ID:
SA21613
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for heimdal. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for rails
Vendor Patch. Secunia Advisory 84 of 235 in 2006. 9,645 views.
Release Date:
2006-08-15
Secunia Advisory ID:
SA21466
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for rails. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for mit-krb5
Vendor Patch. Secunia Advisory 85 of 235 in 2006. 9,003 views.
Release Date:
2006-08-11
Secunia Advisory ID:
SA21461
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for mit-krb5. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo warzone2100 Buffer Overflow Vulnerabilities
Vendor Patch. Secunia Advisory 86 of 235 in 2006. 10,417 views.
Release Date:
2006-08-11
Secunia Advisory ID:
SA21474
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has acknowledged some vulnerabilities in warzone2100, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for wordpress
Vendor Patch. Secunia Advisory 87 of 235 in 2006. 8,033 views.
Release Date:
2006-08-11
Secunia Advisory ID:
SA21447
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Exposure of system information
Where:
From remote
Short Description:
Gentoo has issued an update for wordpress. This fixes a weakness, which can be exploited by malicious people to disclose system information, and some vulnerabilities with unknown impact. [Read More]


Gentoo update for libwmf
Vendor Patch. Secunia Advisory 88 of 235 in 2006. 9,271 views.
Release Date:
2006-08-11
Secunia Advisory ID:
SA21473
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libwmf. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the vulnerable library. [Read More]


Gentoo update for net-server
Vendor Patch. Secunia Advisory 89 of 235 in 2006. 7,777 views.
Release Date:
2006-08-11
Secunia Advisory ID:
SA21452
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for net-server. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for dumb
Vendor Patch. Secunia Advisory 90 of 235 in 2006. 8,028 views.
Release Date:
2006-08-09
Secunia Advisory ID:
SA21416
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for dumb. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for clamav
Vendor Patch. Secunia Advisory 91 of 235 in 2006. 9,427 views.
Release Date:
2006-08-08
Secunia Advisory ID:
SA21368
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for x11vnc
Vendor Patch. Secunia Advisory 92 of 235 in 2006. 8,671 views.
Release Date:
2006-08-08
Secunia Advisory ID:
SA21405
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for x11vnc. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for pike
Vendor Patch. Secunia Advisory 93 of 235 in 2006. 9,245 views.
Release Date:
2006-08-07
Secunia Advisory ID:
SA21362
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for pike. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Gentoo update for mysql
Vendor Patch. Secunia Advisory 94 of 235 in 2006. 8,861 views.
Release Date:
2006-08-07
Secunia Advisory ID:
SA21366
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for mysql. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Gentoo updates for webmin/usermin
Vendor Patch. Secunia Advisory 95 of 235 in 2006. 9,795 views.
Release Date:
2006-08-07
Secunia Advisory ID:
SA21365
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued updates for webmin and usermin. These fix a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


Gentoo update for gnupg
Vendor Patch. Secunia Advisory 96 of 235 in 2006. 8,561 views.
Release Date:
2006-08-07
Secunia Advisory ID:
SA21378
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for gnupg. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for tiff
Vendor Patch. Secunia Advisory 97 of 235 in 2006. 10,381 views.
Release Date:
2006-08-07
Secunia Advisory ID:
SA21370
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for tiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Gentoo update for mozilla-firefox
Vendor Patch. Secunia Advisory 98 of 235 in 2006. 13,078 views.
Release Date:
2006-08-04
Secunia Advisory ID:
SA21361
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. [Read More]


Gentoo update for mozilla-thunderbird
Vendor Patch. Secunia Advisory 99 of 235 in 2006. 10,657 views.
Release Date:
2006-08-04
Secunia Advisory ID:
SA21358
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. [Read More]


Gentoo update for seamonkey
Vendor Patch. Secunia Advisory 100 of 235 in 2006. 12,078 views.
Release Date:
2006-08-04
Secunia Advisory ID:
SA21343
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. [Read More]


Gentoo update for courier
Vendor Patch. Secunia Advisory 101 of 235 in 2006. 9,167 views.
Release Date:
2006-08-04
Secunia Advisory ID:
SA21350
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for courier. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for libvncserver
Vendor Patch. Secunia Advisory 102 of 235 in 2006. 9,492 views.
Release Date:
2006-08-04
Secunia Advisory ID:
SA21349
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for libvncserver. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for apache
Vendor Patch. Secunia Advisory 103 of 235 in 2006. 13,225 views.
Release Date:
2006-08-02
Secunia Advisory ID:
SA21315
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for apache. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo tunepimp Release Date Lookup Buffer Overflow
Unpatched. Secunia Advisory 104 of 235 in 2006. 8,231 views.
Release Date:
2006-08-01
Secunia Advisory ID:
SA21277
Solution Status:
Unpatched
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has acknowledged a vulnerability in tunepimp, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for OpenOffice.org
Vendor Patch. Secunia Advisory 105 of 235 in 2006. 8,527 views.
Release Date:
2006-07-31
Secunia Advisory ID:
SA21278
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for OpenOffice.org. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for audacious
Vendor Patch. Secunia Advisory 106 of 235 in 2006. 8,422 views.
Release Date:
2006-07-31
Secunia Advisory ID:
SA21295
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for audacious. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system. [Read More]


Gentoo update for samba
Vendor Patch. Secunia Advisory 107 of 235 in 2006. 8,421 views.
Release Date:
2006-07-26
Secunia Advisory ID:
SA21190
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Gentoo update for gimp
Vendor Patch. Secunia Advisory 108 of 235 in 2006. 8,922 views.
Release Date:
2006-07-24
Secunia Advisory ID:
SA21170
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gimp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Gentoo update for xine-lib
Vendor Patch. Secunia Advisory 109 of 235 in 2006. 9,585 views.
Release Date:
2006-07-21
Secunia Advisory ID:
SA21139
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xine-lib. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Gentoo update for tiff
Vendor Patch. Secunia Advisory 110 of 235 in 2006. 9,350 views.
Release Date:
2006-07-10
Secunia Advisory ID:
SA21002
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for tiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for shoutcast-server-bin
Vendor Patch. Secunia Advisory 111 of 235 in 2006. 8,353 views.
Release Date:
2006-07-10
Secunia Advisory ID:
SA21005
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for shoutcast-server-bin. This fixes some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks or to gain knowledge of sensitive information. [Read More]


Gentoo update for postgresql
Vendor Patch. Secunia Advisory 112 of 235 in 2006. 9,238 views.
Release Date:
2006-07-10
Secunia Advisory ID:
SA21001
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for postgresql. This fixes some vulnerabilities, which potentially can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Gentoo update for freetype
Vendor Patch. Secunia Advisory 113 of 235 in 2006. 8,556 views.
Release Date:
2006-07-10
Secunia Advisory ID:
SA21000
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise applications using the library. [Read More]


Gentoo mpg123 Heap Overflow Vulnerability
Vendor Patch. Secunia Advisory 114 of 235 in 2006. 11,359 views.
Release Date:
2006-07-04
Secunia Advisory ID:
SA20937
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Horst Schirmeier has reported a vulnerability in Gentoo's mpg123 package, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for kiax
Vendor Patch. Secunia Advisory 115 of 235 in 2006. 8,595 views.
Release Date:
2006-07-03
Secunia Advisory ID:
SA20900
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for kiax. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for mutt
Vendor Patch. Secunia Advisory 116 of 235 in 2006. 9,204 views.
Release Date:
2006-06-29
Secunia Advisory ID:
SA20854
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mutt. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Gentoo update for tikiwiki
Vendor Patch. Secunia Advisory 117 of 235 in 2006. 8,781 views.
Release Date:
2006-06-29
Secunia Advisory ID:
SA20850
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for tikiwiki. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. [Read More]


Gentoo update for horde
Vendor Patch. Secunia Advisory 118 of 235 in 2006. 8,404 views.
Release Date:
2006-06-29
Secunia Advisory ID:
SA20849
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for horde. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Gentoo update for hashcash
Vendor Patch. Secunia Advisory 119 of 235 in 2006. 8,762 views.
Release Date:
2006-06-27
Secunia Advisory ID:
SA20846
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for hashcash. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for emech
Vendor Patch. Secunia Advisory 120 of 235 in 2006. 9,028 views.
Release Date:
2006-06-27
Secunia Advisory ID:
SA20837
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for emech. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for wv2
Vendor Patch. Secunia Advisory 121 of 235 in 2006. 7,964 views.
Release Date:
2006-06-26
Secunia Advisory ID:
SA20844
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for wv2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library. [Read More]


Gentoo update for aRts
Vendor Patch. Secunia Advisory 122 of 235 in 2006. 9,902 views.
Release Date:
2006-06-23
Secunia Advisory ID:
SA20786
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for aRts. This fixes a security issue, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for kdebase / KDM
Vendor Patch. Secunia Advisory 123 of 235 in 2006. 9,456 views.
Release Date:
2006-06-23
Secunia Advisory ID:
SA20785
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for kdebase / KDM. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


Gentoo update for mozilla-thunderbird
Partial Fix. Secunia Advisory 124 of 235 in 2006. 9,666 views.
Release Date:
2006-06-20
Secunia Advisory ID:
SA20709
Solution Status:
Partial Fix
Criticality:
Impact:
Security Bypass
Cross Site Scripting
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP response smuggling attacks, and potentially compromise a user's system. [Read More]


Gentoo update for typespeed
Vendor Patch. Secunia Advisory 125 of 235 in 2006. 7,840 views.
Release Date:
2006-06-20
Secunia Advisory ID:
SA20708
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for typespeed. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for sendmail
Vendor Patch. Secunia Advisory 126 of 235 in 2006. 9,608 views.
Release Date:
2006-06-16
Secunia Advisory ID:
SA20684
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for sendmail. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for pam_mysql
Vendor Patch. Secunia Advisory 127 of 235 in 2006. 9,298 views.
Release Date:
2006-06-16
Secunia Advisory ID:
SA20690
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for pam_mysql. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Gentoo update for openldap
Vendor Patch. Secunia Advisory 128 of 235 in 2006. 8,859 views.
Release Date:
2006-06-16
Secunia Advisory ID:
SA20685
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for openldap. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for asterisk
Vendor Patch. Secunia Advisory 129 of 235 in 2006. 8,203 views.
Release Date:
2006-06-15
Secunia Advisory ID:
SA20658
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for asterisk. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for DokuWiki
Vendor Patch. Secunia Advisory 130 of 235 in 2006. 9,307 views.
Release Date:
2006-06-15
Secunia Advisory ID:
SA20669
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for DokuWiki. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for gdm
Vendor Patch. Secunia Advisory 131 of 235 in 2006. 8,161 views.
Release Date:
2006-06-13
Secunia Advisory ID:
SA20636
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Gentoo has issued an update for gdm. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Gentoo update for Spamassassin
Vendor Patch. Secunia Advisory 132 of 235 in 2006. 7,453 views.
Release Date:
2006-06-12
Secunia Advisory ID:
SA20566
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for spamassassin. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for mysql
Vendor Patch. Secunia Advisory 133 of 235 in 2006. 7,929 views.
Release Date:
2006-06-12
Secunia Advisory ID:
SA20562
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for MySQL. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Gentoo update for vixie-cron
Vendor Patch. Secunia Advisory 134 of 235 in 2006. 9,014 views.
Release Date:
2006-06-12
Secunia Advisory ID:
SA20616
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for vixie-cron. This fixes a security issue, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for wordpress
Vendor Patch. Secunia Advisory 135 of 235 in 2006. 6,811 views.
Release Date:
2006-06-12
Secunia Advisory ID:
SA20608
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for wordpress. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Gentoo update for firefox
Partial Fix. Secunia Advisory 136 of 235 in 2006. 10,576 views.
Release Date:
2006-06-12
Secunia Advisory ID:
SA20561
Solution Status:
Partial Fix
Criticality:
Impact:
Security Bypass
Cross Site Scripting
System access
Where:
From remote
Short Description:
Gentoo has issued an update for firefox. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP response smuggling attacks, and potentially compromise a user's system. [Read More]


Gentoo update for cscope
Vendor Patch. Secunia Advisory 137 of 235 in 2006. 8,050 views.
Release Date:
2006-06-12
Secunia Advisory ID:
SA20564
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for cscope. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Gentoo update for jpeg
Vendor Patch. Secunia Advisory 138 of 235 in 2006. 9,976 views.
Release Date:
2006-06-12
Secunia Advisory ID:
SA20563
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for jpeg. This fixes a security issue, which potentially can be malicious people to cause a DoS (Denial of Service) against applications and services using the jpeg library. [Read More]


Gentoo update for tor
Vendor Patch. Secunia Advisory 139 of 235 in 2006. 9,004 views.
Release Date:
2006-06-08
Secunia Advisory ID:
SA20514
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for tor. This fixes a weakness and some vulnerabilities, which can be exploited by malicious people to spoof log entries, disclose certain sensitive information, and cause a DoS (Denial of Service). [Read More]


Gentoo update for pound
Vendor Patch. Secunia Advisory 140 of 235 in 2006. 6,949 views.
Release Date:
2006-06-08
Secunia Advisory ID:
SA20510
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for pound. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct HTTP request smuggling attacks. [Read More]


Gentoo update for shadow
Vendor Patch. Secunia Advisory 141 of 235 in 2006. 7,440 views.
Release Date:
2006-06-08
Secunia Advisory ID:
SA20506
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for shadow. This fixes a security issue, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for dia
Vendor Patch. Secunia Advisory 142 of 235 in 2006. 7,463 views.
Release Date:
2006-06-08
Secunia Advisory ID:
SA20513
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for dia. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for awstats
Vendor Patch. Secunia Advisory 143 of 235 in 2006. 9,931 views.
Release Date:
2006-06-08
Secunia Advisory ID:
SA20496
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of system information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for awstats. This fixes some vulnerabilities, which can be exploited by malicious people to disclose system information, conduct cross-site scripting attacks, and to compromise a vulnerable system. [Read More]


Gentoo update for libtiff
Vendor Patch. Secunia Advisory 144 of 235 in 2006. 9,087 views.
Release Date:
2006-05-31
Secunia Advisory ID:
SA20345
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libtiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Gentoo update for cherrypy
Vendor Patch. Secunia Advisory 145 of 235 in 2006. 8,161 views.
Release Date:
2006-05-31
Secunia Advisory ID:
SA20344
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for cherrypy. This fixes a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


Gentoo update for quagga
Vendor Patch. Secunia Advisory 146 of 235 in 2006. 8,864 views.
Release Date:
2006-05-22
Secunia Advisory ID:
SA20138
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for quagga. This fixes two security issues and a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service), and by malicious people to bypass certain security restrictions and to disclose system information. [Read More]


Gentoo update for libextractor
Vendor Patch. Secunia Advisory 147 of 235 in 2006. 7,426 views.
Release Date:
2006-05-22
Secunia Advisory ID:
SA20160
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libextractor. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application that uses the library. [Read More]


Gentoo update for mysql
Vendor Patch. Secunia Advisory 148 of 235 in 2006. 9,837 views.
Release Date:
2006-05-12
Secunia Advisory ID:
SA20073
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
Gentoo has issued an update for mysql. This fixes two vulnerabilities, which can be exploited by malicious users to disclose potentially sensitive information. [Read More]


Gentoo update for quake
Vendor Patch. Secunia Advisory 149 of 235 in 2006. 9,838 views.
Release Date:
2006-05-10
Secunia Advisory ID:
SA20065
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for multiple packages based on the Quake 3 engine. These fix a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Gentoo update for ruby
Vendor Patch. Secunia Advisory 150 of 235 in 2006. 8,327 views.
Release Date:
2006-05-10
Secunia Advisory ID:
SA20064
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for pdnsd
Vendor Patch. Secunia Advisory 151 of 235 in 2006. 8,427 views.
Release Date:
2006-05-10
Secunia Advisory ID:
SA20055
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for pdnsd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for mozilla-thunderbird
Vendor Patch. Secunia Advisory 152 of 235 in 2006. 12,268 views.
Release Date:
2006-05-09
Secunia Advisory ID:
SA20051
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Spoofing
Exposure of system information
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and phishing attacks, bypass certain security restrictions, disclose sensitive information, and potentially compromise a user's system. [Read More]


Gentoo update for php
Vendor Patch. Secunia Advisory 153 of 235 in 2006. 9,891 views.
Release Date:
2006-05-09
Secunia Advisory ID:
SA20052
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for php. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to gain knowledge of potentially sensitive information, to conduct cross-site scripting attacks, and to compromise a vulnerable system. [Read More]


Gentoo update for mozilla-firefox
Vendor Patch. Secunia Advisory 154 of 235 in 2006. 9,412 views.
Release Date:
2006-05-08
Secunia Advisory ID:
SA20019
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-firefox. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Gentoo update for rsync
Vendor Patch. Secunia Advisory 155 of 235 in 2006. 7,994 views.
Release Date:
2006-05-08
Secunia Advisory ID:
SA20011
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for rsync. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for nagios
Vendor Patch. Secunia Advisory 156 of 235 in 2006. 8,016 views.
Release Date:
2006-05-08
Secunia Advisory ID:
SA20013
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for nagios. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for xorg-x11
Vendor Patch. Secunia Advisory 157 of 235 in 2006. 11,317 views.
Release Date:
2006-05-03
Secunia Advisory ID:
SA19915
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for xorg-x11. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for phpwebsite
Vendor Patch. Secunia Advisory 158 of 235 in 2006. 7,318 views.
Release Date:
2006-05-03
Secunia Advisory ID:
SA19914
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for phpwebsite. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information and potentially compromise a vulnerable system. [Read More]


Gentoo update for clamav
Vendor Patch. Secunia Advisory 159 of 235 in 2006. 8,527 views.
Release Date:
2006-05-03
Secunia Advisory ID:
SA19912
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. [Read More]


Gentoo update for mplayer
Vendor Patch. Secunia Advisory 160 of 235 in 2006. 8,958 views.
Release Date:
2006-05-02
Secunia Advisory ID:
SA19919
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mplayer. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Gentoo update for mozilla
Vendor Patch. Secunia Advisory 161 of 235 in 2006. 11,632 views.
Release Date:
2006-05-01
Secunia Advisory ID:
SA19902
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Spoofing
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and phishing attacks, bypass certain security restrictions, cause a DoS (Denial of Service), disclose sensitive information, and potentially compromise a user's system. [Read More]


Gentoo update for xine-ui
Vendor Patch. Secunia Advisory 162 of 235 in 2006. 8,915 views.
Release Date:
2006-04-27
Secunia Advisory ID:
SA19854
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xine-ui. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for xine-lib
Vendor Patch. Secunia Advisory 163 of 235 in 2006. 8,000 views.
Release Date:
2006-04-27
Secunia Advisory ID:
SA19856
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xine-lib. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for ethereal
Vendor Patch. Secunia Advisory 164 of 235 in 2006. 10,680 views.
Release Date:
2006-04-27
Secunia Advisory ID:
SA19839
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ethereal. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Gentoo update for crossfire-server
Vendor Patch. Secunia Advisory 165 of 235 in 2006. 8,126 views.
Release Date:
2006-04-24
Secunia Advisory ID:
SA19785
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for crossfire-server. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for fbida
Vendor Patch. Secunia Advisory 166 of 235 in 2006. 8,468 views.
Release Date:
2006-04-24
Secunia Advisory ID:
SA19766
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for fbida. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo update for dia
Vendor Patch. Secunia Advisory 167 of 235 in 2006. 7,653 views.
Release Date:
2006-04-24
Secunia Advisory ID:
SA19765
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for dia. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for mozilla-firefox / mozilla-firefox-bin
Vendor Patch. Secunia Advisory 168 of 235 in 2006. 12,926 views.
Release Date:
2006-04-24
Secunia Advisory ID:
SA19759
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Spoofing
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-firefox / mozilla-firefox-bin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and phishing attacks, bypass certain security restrictions, disclose sensitive information, cause a DoS (Denial of Service), and potentially compromise a user's system. [Read More]


Gentoo update for zgv/xzgv
Vendor Patch. Secunia Advisory 169 of 235 in 2006. 10,671 views.
Release Date:
2006-04-21
Secunia Advisory ID:
SA19757
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for zgv and xzgv. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for cyrus-sasl
Vendor Patch. Secunia Advisory 170 of 235 in 2006. 10,154 views.
Release Date:
2006-04-21
Secunia Advisory ID:
SA19753
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for cyrus-sasl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for libapreq2
Vendor Patch. Secunia Advisory 171 of 235 in 2006. 8,089 views.
Release Date:
2006-04-18
Secunia Advisory ID:
SA19658
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for libapreq2. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for cacti
Vendor Patch. Secunia Advisory 172 of 235 in 2006. 9,736 views.
Release Date:
2006-04-17
Secunia Advisory ID:
SA19691
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of system information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for cacti. This fixes two security issues and some vulnerabilities, which can be exploited by malicious people to disclose system information, conduct cross-site scripting attacks, execute arbitrary SQL code, and potentially compromise a vulnerable system. [Read More]


Gentoo update for clamav
Vendor Patch. Secunia Advisory 173 of 235 in 2006. 10,044 views.
Release Date:
2006-04-10
Secunia Advisory ID:
SA19567
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. [Read More]


Gentoo update for kaffeine
Vendor Patch. Secunia Advisory 174 of 235 in 2006. 8,208 views.
Release Date:
2006-04-06
Secunia Advisory ID:
SA19542
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for kaffeine. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo Doomsday Format String Vulnerabilities
Vendor Patch. Secunia Advisory 175 of 235 in 2006. 8,122 views.
Release Date:
2006-04-06
Secunia Advisory ID:
SA19519
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has acknowledged some vulnerabilities in doomsday, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for freeradius
Vendor Patch. Secunia Advisory 176 of 235 in 2006. 8,654 views.
Release Date:
2006-04-05
Secunia Advisory ID:
SA19527
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for freeradius. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and bypass certain security restrictions. [Read More]


Gentoo update for horde
Vendor Patch. Secunia Advisory 177 of 235 in 2006. 9,171 views.
Release Date:
2006-04-05
Secunia Advisory ID:
SA19528
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for horde. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information or compromise a vulnerable system. [Read More]


Gentoo update for mediawiki
Vendor Patch. Secunia Advisory 178 of 235 in 2006. 8,628 views.
Release Date:
2006-04-04
Secunia Advisory ID:
SA19517
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for mediawiki. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Gentoo bsd-games Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 179 of 235 in 2006. 10,446 views.
Release Date:
2006-03-30
Secunia Advisory ID:
SA19442
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Tavis Ormandy has reported some vulnerabilities in the bsd-games package, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for openoffice / openoffice-bin
Vendor Patch. Secunia Advisory 180 of 235 in 2006. 10,333 views.
Release Date:
2006-03-28
Secunia Advisory ID:
SA19433
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Where:
Local system
Short Description:
Gentoo has issued updates for openoffice / openoffice-bin. These fix a vulnerability, which has an unknown impact. [Read More]


Gentoo update for realplayer
Vendor Patch. Secunia Advisory 181 of 235 in 2006. 11,166 views.
Release Date:
2006-03-27
Secunia Advisory ID:
SA19390
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for realplayer. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo nethack / falconseye / slashem Privilege Escalation
Vendor Workaround. Secunia Advisory 182 of 235 in 2006. 12,365 views.
Release Date:
2006-03-24
Secunia Advisory ID:
SA19376
Solution Status:
Vendor Workaround
Criticality:
Impact:
Manipulation of data
Privilege escalation
Where:
Local system
Short Description:
Gentoo has reported some vulnerabilities in the nethack / falconseye / slashem packages, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for sendmail
Vendor Patch. Secunia Advisory 183 of 235 in 2006. 9,743 views.
Release Date:
2006-03-23
Secunia Advisory ID:
SA19363
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for sendmail. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for php
Vendor Patch. Secunia Advisory 184 of 235 in 2006. 9,648 views.
Release Date:
2006-03-23
Secunia Advisory ID:
SA19355
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
Gentoo has issued an update for php. This fixes a vulnerability, which can be exploited by malicious people to conduct HTTP response splitting attacks, potentially conduct cross-site scripting attacks, and potentially compromise a vulnerable system. [Read More]


Gentoo update for curl
Vendor Patch. Secunia Advisory 185 of 235 in 2006. 8,696 views.
Release Date:
2006-03-22
Secunia Advisory ID:
SA19344
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for curl. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for pngcrush
Vendor Patch. Secunia Advisory 186 of 235 in 2006. 9,819 views.
Release Date:
2006-03-22
Secunia Advisory ID:
SA19334
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for pngcrush. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for netscape-flash
Vendor Patch. Secunia Advisory 187 of 235 in 2006. 8,997 views.
Release Date:
2006-03-22
Secunia Advisory ID:
SA19328
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for netscape-flash. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for peercast
Vendor Patch. Secunia Advisory 188 of 235 in 2006. 9,173 views.
Release Date:
2006-03-21
Secunia Advisory ID:
SA19291
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for peercast. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for heimdal
Vendor Patch. Secunia Advisory 189 of 235 in 2006. 9,069 views.
Release Date:
2006-03-20
Secunia Advisory ID:
SA19302
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
From local network
Short Description:
Gentoo has issued an update for heimdal. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for PEAR-Auth
Vendor Patch. Secunia Advisory 190 of 235 in 2006. 8,146 views.
Release Date:
2006-03-20
Secunia Advisory ID:
SA19301
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for PEAR-Auth. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for crypt-cbc
Vendor Patch. Secunia Advisory 191 of 235 in 2006. 10,274 views.
Release Date:
2006-03-20
Secunia Advisory ID:
SA19303
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for crypt-cbc. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for metamail
Vendor Patch. Secunia Advisory 192 of 235 in 2006. 8,121 views.
Release Date:
2006-03-20
Secunia Advisory ID:
SA19304
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for metamail. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for zoo
Vendor Patch. Secunia Advisory 193 of 235 in 2006. 7,910 views.
Release Date:
2006-03-16
Secunia Advisory ID:
SA19254
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for zoo. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for freeciv
Vendor Patch. Secunia Advisory 194 of 235 in 2006. 9,094 views.
Release Date:
2006-03-16
Secunia Advisory ID:
SA19253
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for freeciv. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for tar
Vendor Patch. Secunia Advisory 195 of 235 in 2006. 9,348 views.
Release Date:
2006-03-13
Secunia Advisory ID:
SA19236
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for tar. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and to compromise a user's system. [Read More]


Gentoo update for gnupg
Vendor Patch. Secunia Advisory 196 of 235 in 2006. 8,820 views.
Release Date:
2006-03-13
Secunia Advisory ID:
SA19232
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for gnupg. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for flex
Vendor Patch. Secunia Advisory 197 of 235 in 2006. 8,385 views.
Release Date:
2006-03-13
Secunia Advisory ID:
SA19228
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for flex. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for squirrelmail
Vendor Patch. Secunia Advisory 198 of 235 in 2006. 9,747 views.
Release Date:
2006-03-13
Secunia Advisory ID:
SA19205
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for squirrelmail. This fixes some vulnerabilities, which can be exploited by malicious users to manipulate certain information and by malicious people to conduct cross-site scripting attacks. [Read More]


Gentoo cube Buffer Overflow and Denial of Service
Vendor Workaround. Secunia Advisory 199 of 235 in 2006. 9,275 views.
Release Date:
2006-03-13
Secunia Advisory ID:
SA19199
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has acknowledged some vulnerabilities in cube, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. [Read More]


Gentoo update for zoo
Vendor Patch. Secunia Advisory 200 of 235 in 2006. 8,586 views.
Release Date:
2006-03-07
Secunia Advisory ID:
SA19148
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for zoo. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Gentoo update for up-imapproxy
Vendor Patch. Secunia Advisory 201 of 235 in 2006. 8,888 views.
Release Date:
2006-03-06
Secunia Advisory ID:
SA19113
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for up-imapproxy. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for teTeX / pTeX / CSTeX
Vendor Patch. Secunia Advisory 202 of 235 in 2006. 9,621 views.
Release Date:
2006-03-06
Secunia Advisory ID:
SA19125
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for teTeX, pTeX, and CSTeX. These fix a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Gentoo update for mplayer
Vendor Patch. Secunia Advisory 203 of 235 in 2006. 9,927 views.
Release Date:
2006-03-06
Secunia Advisory ID:
SA19114
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mplayer. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Gentoo update for wordpress
Vendor Patch. Secunia Advisory 204 of 235 in 2006. 8,326 views.
Release Date:
2006-03-06
Secunia Advisory ID:
SA19123
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for wordpress. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Gentoo update for noweb
Vendor Patch. Secunia Advisory 205 of 235 in 2006. 8,396 views.
Release Date:
2006-02-27
Secunia Advisory ID:
SA19027
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for noweb. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Gentoo update for graphicsmagick
Vendor Patch. Secunia Advisory 206 of 235 in 2006. 9,773 views.
Release Date:
2006-02-27
Secunia Advisory ID:
SA19030
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for graphicsmagick. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for gpdf
Vendor Patch. Secunia Advisory 207 of 235 in 2006. 8,697 views.
Release Date:
2006-02-22
Secunia Advisory ID:
SA18983
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gpdf. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Gentoo update for openssh / dropbear
Vendor Patch. Secunia Advisory 208 of 235 in 2006. 10,065 views.
Release Date:
2006-02-21
Secunia Advisory ID:
SA18969
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for openssh / dropbear. This fixes a weakness, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for gnupg
Vendor Patch. Secunia Advisory 209 of 235 in 2006. 9,945 views.
Release Date:
2006-02-20
Secunia Advisory ID:
SA18956
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for gnupg. This fixes a security issue, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for bomberclone
Vendor Patch. Secunia Advisory 210 of 235 in 2006. 9,739 views.
Release Date:
2006-02-17
Secunia Advisory ID:
SA18915
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for bomberclone. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for libtasn1/gnutls
Vendor Patch. Secunia Advisory 211 of 235 in 2006. 9,655 views.
Release Date:
2006-02-17
Secunia Advisory ID:
SA18898
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued updates for libtasn1/gnutls. These fix a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for sun-jdk/sun-jre-bin
Vendor Patch. Secunia Advisory 212 of 235 in 2006. 9,240 views.
Release Date:
2006-02-15
Secunia Advisory ID:
SA18884
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for sun-jdk and sun-jre-bin. These fix some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for imagemagick
Vendor Patch. Secunia Advisory 213 of 235 in 2006. 8,768 views.
Release Date:
2006-02-14
Secunia Advisory ID:
SA18851
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for imagemagick. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for kdegraphics/kpdf
Vendor Patch. Secunia Advisory 214 of 235 in 2006. 9,128 views.
Release Date:
2006-02-13
Secunia Advisory ID:
SA18826
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for kdegraphics and kpdf. These fix a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Gentoo update for xpdf/poppler
Vendor Patch. Secunia Advisory 215 of 235 in 2006. 9,331 views.
Release Date:
2006-02-13
Secunia Advisory ID:
SA18825
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued updates for xpdf and poppler. These fix a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Gentoo update for adodb
Vendor Patch. Secunia Advisory 216 of 235 in 2006. 9,334 views.
Release Date:
2006-02-07
Secunia Advisory ID:
SA18745
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for adodb. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Gentoo update for apache
Vendor Patch. Secunia Advisory 217 of 235 in 2006. 11,100 views.
Release Date:
2006-02-07
Secunia Advisory ID:
SA18743
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for apache. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and to cause a DoS (Denial of Service). [Read More]


Gentoo update for gst-plugins-ffmpeg
Vendor Patch. Secunia Advisory 218 of 235 in 2006. 9,156 views.
Release Date:
2006-02-06
Secunia Advisory ID:
SA18746
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gst-plugins-ffmpeg. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Gentoo update for mydns
Vendor Patch. Secunia Advisory 219 of 235 in 2006. 8,749 views.
Release Date:
2006-01-31
Secunia Advisory ID:
SA18653
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for mydns. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo updates for xpdf/poppler/gpdf/libextractor/pdftohtml
Vendor Patch. Secunia Advisory 220 of 235 in 2006. 10,370 views.
Release Date:
2006-01-31
Secunia Advisory ID:
SA18644
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for xpdf/poppler/gpdf/libextractor/pdftohtml. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), and potentially to compromise a user's system. [Read More]


Gentoo update for libast
Vendor Patch. Secunia Advisory 221 of 235 in 2006. 8,949 views.
Release Date:
2006-01-30
Secunia Advisory ID:
SA18632
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for libast. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for paros
Vendor Patch. Secunia Advisory 222 of 235 in 2006. 7,774 views.
Release Date:
2006-01-30
Secunia Advisory ID:
SA18626
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
Where:
From local network
Short Description:
Gentoo has issued an update for paros. This fixes a security issue, which can be exploited by malicious people to disclose sensitive information and bypass certain security restrictions. [Read More]


Gentoo update for gallery
Vendor Patch. Secunia Advisory 223 of 235 in 2006. 10,031 views.
Release Date:
2006-01-27
Secunia Advisory ID:
SA18627
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for gallery. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct script insertion attacks. [Read More]


Gentoo update for trac
Vendor Patch. Secunia Advisory 224 of 235 in 2006. 9,707 views.
Release Date:
2006-01-26
Secunia Advisory ID:
SA18625
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for trac. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Gentoo update for kdelibs
Vendor Patch. Secunia Advisory 225 of 235 in 2006. 9,537 views.
Release Date:
2006-01-23
Secunia Advisory ID:
SA18570
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for kdelibs. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. [Read More]


Gentoo update for sun-jdk/sun-jre-bin/blackdown-jdk/blackdown-jre
Partial Fix. Secunia Advisory 226 of 235 in 2006. 9,538 views.
Release Date:
2006-01-16
Secunia Advisory ID:
SA18435
Solution Status:
Partial Fix
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for sun-jdk, sun-jre-bin, blackdown-jdk, and blackdown-jre. These fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for clamav
Vendor Patch. Secunia Advisory 227 of 235 in 2006. 9,063 views.
Release Date:
2006-01-13
Secunia Advisory ID:
SA18453
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for blender
Vendor Patch. Secunia Advisory 228 of 235 in 2006. 8,225 views.
Release Date:
2006-01-13
Secunia Advisory ID:
SA18452
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for blender. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a user's system. [Read More]


Gentoo update for wine
Vendor Patch. Secunia Advisory 229 of 235 in 2006. 9,615 views.
Release Date:
2006-01-13
Secunia Advisory ID:
SA18451
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for wine. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for mod_auth_pgsql
Vendor Patch. Secunia Advisory 230 of 235 in 2006. 8,583 views.
Release Date:
2006-01-11
Secunia Advisory ID:
SA18403
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mod_auth_pgsql. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for xine-lib / ffmpeg
Vendor Patch. Secunia Advisory 231 of 235 in 2006. 9,854 views.
Release Date:
2006-01-11
Secunia Advisory ID:
SA18400
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xine-lib / ffmpeg. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Gentoo update for vmware
Vendor Patch. Secunia Advisory 232 of 235 in 2006. 8,385 views.
Release Date:
2006-01-09
Secunia Advisory ID:
SA18344
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for vmware. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for hylafax
Vendor Patch. Secunia Advisory 233 of 235 in 2006. 8,173 views.
Release Date:
2006-01-06
Secunia Advisory ID:
SA18337
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Gentoo has issued an update for hylafax. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to compromise a vulnerable system. [Read More]


Gentoo update for kdegraphics / kpdf / koffice / kword
Vendor Patch. Secunia Advisory 234 of 235 in 2006. 9,632 views.
Release Date:
2006-01-05
Secunia Advisory ID:
SA18313
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for kdegraphics / kpdf / koffice / kword. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), potentially to compromise a user's system and with an unknown impact. [Read More]


Gentoo pinentry Insecure Permissions setgid Binaries Security Issue
Vendor Patch. Secunia Advisory 235 of 235 in 2006. 8,922 views.
Release Date:
2006-01-04
Secunia Advisory ID:
SA18284
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Tavis Ormandy has reported a security issue in pinentry, which potentially can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Gentoo Linux 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer