navigation bar left navigation bar right

navigation left tab Advisories navigation right tab
navigation left tab Research navigation right tab
navigation left tab Forums navigation right tab
navigation left tab Create Profile navigation right tab
navigation left tab Our Commitment navigation right tab
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Gentoo Linux

This vulnerability report for Gentoo Linux contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Gentoo Linux then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Gentoo

Product Link N/A

Affected By 2137 Secunia advisories
8582 Vulnerabilities

Monitor Product Receive alerts for this product





235 Secunia Advisories in 2006

Secunia has issued a total of 235 Secunia advisories in 2006 for Gentoo Linux. Currently, 1% (3 out of 235) are marked as unpatched with the most severe being rated Highly critical

More information about the specific Secunia advisories affecting Gentoo Linux can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



patched Gentoo update for ruby
Vendor Patch. Secunia Advisory 1 of 235 in 2006. 9,847 views.
Release Date:
2006-12-21
Secunia Advisory ID:
SA23454
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for imlib2
Vendor Patch. Secunia Advisory 2 of 235 in 2006. 10,355 views.
Release Date:
2006-12-21
Secunia Advisory ID:
SA23441
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for imlib2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


patched Gentoo update for pam_ldap
Vendor Patch. Secunia Advisory 3 of 235 in 2006. 8,572 views.
Release Date:
2006-12-21
Secunia Advisory ID:
SA23428
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for pam_ldap. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for clamav
Vendor Patch. Secunia Advisory 4 of 235 in 2006. 8,971 views.
Release Date:
2006-12-19
Secunia Advisory ID:
SA23404
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


unpatched Gentoo vlnx Insecure DT_RPATH Vulnerability
Unpatched. Secunia Advisory 5 of 235 in 2006. 9,221 views.
Release Date:
2006-12-18
Secunia Advisory ID:
SA23429
Solution Status:
Unpatched
Criticality:
Moderately critical
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Gentoo has acknowledged a vulnerability, which can be exploited by malicious, local users to gain escalated privileges or by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for links
Vendor Patch. Secunia Advisory 6 of 235 in 2006. 10,528 views.
Release Date:
2006-12-15
Secunia Advisory ID:
SA23389
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Exposure of system information
Exposure of sensitive information
Where:
From local network
Short Description:
Gentoo has issued an update for links. This fixes a vulnerability, which can be exploited by malicious people to expose sensitive information and manipulate data. [Read More]


patched Gentoo update for f-prot
Vendor Patch. Secunia Advisory 7 of 235 in 2006. 9,468 views.
Release Date:
2006-12-13
Secunia Advisory ID:
SA23328
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for f-prot. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for trac
Vendor Patch. Secunia Advisory 8 of 235 in 2006. 8,098 views.
Release Date:
2006-12-13
Secunia Advisory ID:
SA23357
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Hijacking
Where:
From remote
Short Description:
Gentoo has issued an update for trac. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site request forgery attacks. [Read More]


patched Gentoo update for libgsf
Vendor Patch. Secunia Advisory 9 of 235 in 2006. 9,933 views.
Release Date:
2006-12-13
Secunia Advisory ID:
SA23355
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libgsf. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. [Read More]


patched Gentoo update for emul-linux-x86-baselibs
Vendor Patch. Secunia Advisory 10 of 235 in 2006. 14,472 views.
Release Date:
2006-12-12
Secunia Advisory ID:
SA23309
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for emul-linux-x86-baselibs. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. [Read More]


patched Gentoo update for tar
Vendor Patch. Secunia Advisory 11 of 235 in 2006. 9,621 views.
Release Date:
2006-12-12
Secunia Advisory ID:
SA23314
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for tar. This fixes a security issue, which can be exploited by malicious people to overwrite arbitrary files. [Read More]


patched Gentoo update for mozilla-thunderbird
Vendor Patch. Secunia Advisory 12 of 235 in 2006. 10,550 views.
Release Date:
2006-12-11
Secunia Advisory ID:
SA23297
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for seamonkey
Vendor Patch. Secunia Advisory 13 of 235 in 2006. 10,283 views.
Release Date:
2006-12-11
Secunia Advisory ID:
SA23263
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for mozilla-firefox
Vendor Patch. Secunia Advisory 14 of 235 in 2006. 11,156 views.
Release Date:
2006-12-11
Secunia Advisory ID:
SA23287
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for xine-lib
Vendor Patch. Secunia Advisory 15 of 235 in 2006. 9,161 views.
Release Date:
2006-12-11
Secunia Advisory ID:
SA23301
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xine-lib. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for gnupg
Vendor Patch. Secunia Advisory 16 of 235 in 2006. 10,708 views.
Release Date:
2006-12-11
Secunia Advisory ID:
SA23303
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gnupg. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


patched Gentoo update for libmodplug
Vendor Patch. Secunia Advisory 17 of 235 in 2006. 9,660 views.
Release Date:
2006-12-11
Secunia Advisory ID:
SA23294
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libmodplug. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


patched Gentoo update for wv
Vendor Patch. Secunia Advisory 18 of 235 in 2006. 10,064 views.
Release Date:
2006-12-08
Secunia Advisory ID:
SA23273
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for wv. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


patched Gentoo update for proftpd
Vendor Patch. Secunia Advisory 19 of 235 in 2006. 10,829 views.
Release Date:
2006-12-01
Secunia Advisory ID:
SA23179
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for proftpd. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and by malicious users and malicious people to potentially compromise a vulnerable system. [Read More]


patched Gentoo update for lha
Vendor Patch. Secunia Advisory 20 of 235 in 2006. 10,140 views.
Release Date:
2006-11-29
Secunia Advisory ID:
SA23156
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for lha. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for mono
Vendor Patch. Secunia Advisory 21 of 235 in 2006. 8,868 views.
Release Date:
2006-11-29
Secunia Advisory ID:
SA23154
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for mono. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


patched Gentoo update for openldap
Vendor Patch. Secunia Advisory 22 of 235 in 2006. 8,941 views.
Release Date:
2006-11-29
Secunia Advisory ID:
SA23152
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for openldap. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for kile
Vendor Patch. Secunia Advisory 23 of 235 in 2006. 10,634 views.
Release Date:
2006-11-27
Secunia Advisory ID:
SA23099
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for kile. This fixes a security issue, which can be exploited by malicious, local users to gain knowledge of certain information. [Read More]


patched Gentoo update for horde-ingo
Vendor Patch. Secunia Advisory 24 of 235 in 2006. 9,203 views.
Release Date:
2006-11-27
Secunia Advisory ID:
SA23100
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for horde-ingo. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


patched Gentoo update for imagemagick
Vendor Patch. Secunia Advisory 25 of 235 in 2006. 9,061 views.
Release Date:
2006-11-27
Secunia Advisory ID:
SA23121
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for imagemagick. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for gv
Vendor Patch. Secunia Advisory 26 of 235 in 2006. 9,081 views.
Release Date:
2006-11-27
Secunia Advisory ID:
SA23118
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gv. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for fvwm
Vendor Patch. Secunia Advisory 27 of 235 in 2006. 11,513 views.
Release Date:
2006-11-24
Secunia Advisory ID:
SA23089
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Security Bypass
Where:
Local system
Short Description:
Gentoo has issued an update for fvwm. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


patched Gentoo update for qmailadmin
Vendor Patch. Secunia Advisory 28 of 235 in 2006. 8,741 views.
Release Date:
2006-11-22
Secunia Advisory ID:
SA23019
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for qmailadmin. This fixes a vulnerability, which potentially can be exploited by malicious people to a DoS (Denial of Service). [Read More]


patched Gentoo update for texinfo
Vendor Patch. Secunia Advisory 29 of 235 in 2006. 10,134 views.
Release Date:
2006-11-22
Secunia Advisory ID:
SA22995
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for texinfo. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Gentoo update for tikiwiki
Vendor Patch. Secunia Advisory 30 of 235 in 2006. 9,085 views.
Release Date:
2006-11-21
Secunia Advisory ID:
SA23039
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for tikiwiki. This fixes some vulnerabilities, which can be exploited by malicious people to disclose certain sensitive information or conduct cross-site scripting attacks. [Read More]


patched Gentoo update for avahi
Vendor Patch. Secunia Advisory 31 of 235 in 2006. 8,939 views.
Release Date:
2006-11-21
Secunia Advisory ID:
SA23042
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
Local system
Short Description:
Gentoo has issued an update for avahi. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


patched Gentoo update for ruby
Vendor Patch. Secunia Advisory 32 of 235 in 2006. 10,076 views.
Release Date:
2006-11-21
Secunia Advisory ID:
SA23040
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for wordpress
Vendor Patch. Secunia Advisory 33 of 235 in 2006. 8,669 views.
Release Date:
2006-11-20
Secunia Advisory ID:
SA22942
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for wordpress. This fixes some vulnerabilities, which can be exploited by malicious users to gain knowledge of potentially sensitive information or cause a DoS (Denial of Service), and by malicious people to gain knowledge of sensitive information. [Read More]


patched Gentoo update for libpng
Vendor Patch. Secunia Advisory 34 of 235 in 2006. 8,837 views.
Release Date:
2006-11-20
Secunia Advisory ID:
SA22941
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for libpng. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for librmp4
Vendor Patch. Secunia Advisory 35 of 235 in 2006. 8,733 views.
Release Date:
2006-11-14
Secunia Advisory ID:
SA22854
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for librpm4. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Gentoo update for openssh
Vendor Patch. Secunia Advisory 36 of 235 in 2006. 11,040 views.
Release Date:
2006-11-14
Secunia Advisory ID:
SA22823
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for openssh. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for ftpd
Vendor Patch. Secunia Advisory 37 of 235 in 2006. 10,386 views.
Release Date:
2006-11-13
Secunia Advisory ID:
SA22853
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for ftpd. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information or perform certain actions with escalated privileges. [Read More]


patched Gentoo update for bugzilla
Vendor Patch. Secunia Advisory 38 of 235 in 2006. 9,974 views.
Release Date:
2006-11-10
Secunia Advisory ID:
SA22790
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for bugzilla. This fixes some vulnerabilities, which can be exploited by malicious users to disclose potentially sensitive information, conduct cross-site scripting, script insertion, and request forgery attacks. [Read More]


patched Gentoo update for nvidia-drivers
Vendor Patch. Secunia Advisory 39 of 235 in 2006. 11,346 views.
Release Date:
2006-11-08
Secunia Advisory ID:
SA22764
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for nvidia-drivers. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges and potentially by malicious people to compromise a user's system. [Read More]


patched Gentoo update for qt
Vendor Patch. Secunia Advisory 40 of 235 in 2006. 9,435 views.
Release Date:
2006-11-06
Secunia Advisory ID:
SA22738
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for qt. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


patched Gentoo update for screen
Vendor Patch. Secunia Advisory 41 of 235 in 2006. 8,961 views.
Release Date:
2006-11-06
Secunia Advisory ID:
SA22707
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for screen. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Gentoo update for cheesetracker
Vendor Patch. Secunia Advisory 42 of 235 in 2006. 8,927 views.
Release Date:
2006-10-31
Secunia Advisory ID:
SA22643
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for cheesetracker. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for asterisk
Vendor Patch. Secunia Advisory 43 of 235 in 2006. 11,732 views.
Release Date:
2006-10-31
Secunia Advisory ID:
SA22651
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for asterisk. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for php
Vendor Patch. Secunia Advisory 44 of 235 in 2006. 10,635 views.
Release Date:
2006-10-31
Secunia Advisory ID:
SA22650
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update in php. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Gentoo update for openssl
Vendor Patch. Secunia Advisory 45 of 235 in 2006. 12,836 views.
Release Date:
2006-10-24
Secunia Advisory ID:
SA22544
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for openssl. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. [Read More]


patched Gentoo update for mod_tcl
Vendor Patch. Secunia Advisory 46 of 235 in 2006. 10,217 views.
Release Date:
2006-10-24
Secunia Advisory ID:
SA22549
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mod_tcl. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for clamav
Vendor Patch. Secunia Advisory 47 of 235 in 2006. 9,245 views.
Release Date:
2006-10-24
Secunia Advisory ID:
SA22551
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for libmusicbrainz
Vendor Patch. Secunia Advisory 48 of 235 in 2006. 8,247 views.
Release Date:
2006-10-23
Secunia Advisory ID:
SA22517
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libmusicbrainz. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for cscope
Vendor Patch. Secunia Advisory 49 of 235 in 2006. 8,852 views.
Release Date:
2006-10-20
Secunia Advisory ID:
SA22515
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for cscope. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for python
Vendor Patch. Secunia Advisory 50 of 235 in 2006. 8,086 views.
Release Date:
2006-10-18
Secunia Advisory ID:
SA22448
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for python. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for nss
Vendor Patch. Secunia Advisory 51 of 235 in 2006. 9,618 views.
Release Date:
2006-10-18
Secunia Advisory ID:
SA22446
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for nss. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for capi4hylafax
Vendor Patch. Secunia Advisory 52 of 235 in 2006. 7,791 views.
Release Date:
2006-10-18
Secunia Advisory ID:
SA22450
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for capi4hylafax. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for seamonkey
Vendor Patch. Secunia Advisory 53 of 235 in 2006. 11,467 views.
Release Date:
2006-10-16
Secunia Advisory ID:
SA22391
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Spoofing
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and potentially compromise a user's system. [Read More]


patched Gentoo update for ncompress
Vendor Patch. Secunia Advisory 54 of 235 in 2006. 31,967 views.
Release Date:
2006-10-06
Secunia Advisory ID:
SA22296
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ncompress. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


patched Gentoo update for mozilla-thunderbird
Vendor Patch. Secunia Advisory 55 of 235 in 2006. 10,767 views.
Release Date:
2006-10-05
Secunia Advisory ID:
SA22274
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to conduct man-in-the-middle attacks, bypass certain security restrictions, and potentially compromise a user's system. [Read More]


patched Gentoo update for netscape-flash
Vendor Patch. Secunia Advisory 56 of 235 in 2006. 9,909 views.
Release Date:
2006-10-05
Secunia Advisory ID:
SA22268
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for netscape-flash. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and potentially compromise a user's system. [Read More]


patched Gentoo update for dokuwiki
Vendor Patch. Secunia Advisory 57 of 235 in 2006. 11,507 views.
Release Date:
2006-09-29
Secunia Advisory ID:
SA22199
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for dokuwiki. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Gentoo update for mozilla-firefox
Vendor Patch. Secunia Advisory 58 of 235 in 2006. 11,602 views.
Release Date:
2006-09-29
Secunia Advisory ID:
SA22195
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Cross Site Scripting
Spoofing
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), conduct man-in-the-middle, spoofing, and cross-site scripting attacks, and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for opera
Vendor Patch. Secunia Advisory 59 of 235 in 2006. 8,655 views.
Release Date:
2006-09-29
Secunia Advisory ID:
SA22161
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Spoofing
Where:
From remote
Short Description:
Gentoo has issued an update for opera. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for openssh
Vendor Patch. Secunia Advisory 60 of 235 in 2006. 9,505 views.
Release Date:
2006-09-28
Secunia Advisory ID:
SA22164
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for openssh. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for tikiwiki
Vendor Patch. Secunia Advisory 61 of 235 in 2006. 8,421 views.
Release Date:
2006-09-27
Secunia Advisory ID:
SA22100
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
Gentoo has issued an update for tikiwiki. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. [Read More]


patched Gentoo update for gnutls
Vendor Patch. Secunia Advisory 62 of 235 in 2006. 10,225 views.
Release Date:
2006-09-27
Secunia Advisory ID:
SA22097
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for gnutls. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for imagemagick
Vendor Patch. Secunia Advisory 63 of 235 in 2006. 9,373 views.
Release Date:
2006-09-27
Secunia Advisory ID:
SA22096
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for imagemagick. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Gentoo update for gzip
Vendor Patch. Secunia Advisory 64 of 235 in 2006. 10,008 views.
Release Date:
2006-09-25
Secunia Advisory ID:
SA22085
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gzip. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for mailman
Vendor Patch. Secunia Advisory 65 of 235 in 2006. 10,370 views.
Release Date:
2006-09-19
Secunia Advisory ID:
SA22020
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Spoofing
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for mailman. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting or spoofing attacks, and cause a DoS (Denial of Service). [Read More]


patched Gentoo update for bind
Vendor Patch. Secunia Advisory 66 of 235 in 2006. 10,879 views.
Release Date:
2006-09-15
Secunia Advisory ID:
SA21912
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for bind. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for dokuwiki
Vendor Patch. Secunia Advisory 67 of 235 in 2006. 10,677 views.
Release Date:
2006-09-15
Secunia Advisory ID:
SA21936
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for dokuwiki. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for ffmpeg
Vendor Patch. Secunia Advisory 68 of 235 in 2006. 9,831 views.
Release Date:
2006-09-14
Secunia Advisory ID:
SA21921
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ffmpeg. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


patched Gentoo update for xine-lib
Vendor Patch. Secunia Advisory 69 of 235 in 2006. 9,361 views.
Release Date:
2006-09-14
Secunia Advisory ID:
SA21919
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for xine-lib. This fixes a weakness, which can be exploited by malicious people to crash certain applications on a user's system. [Read More]


patched Gentoo update for libXfont
Vendor Patch. Secunia Advisory 70 of 235 in 2006. 9,954 views.
Release Date:
2006-09-14
Secunia Advisory ID:
SA21908
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for libXfont. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for adplug
Vendor Patch. Secunia Advisory 71 of 235 in 2006. 9,256 views.
Release Date:
2006-09-13
Secunia Advisory ID:
SA21869
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for adplug. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise applications using the library. [Read More]


patched Gentoo update for openssl
Vendor Patch. Secunia Advisory 72 of 235 in 2006. 11,707 views.
Release Date:
2006-09-08
Secunia Advisory ID:
SA21823
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for openttd
Vendor Patch. Secunia Advisory 73 of 235 in 2006. 8,922 views.
Release Date:
2006-09-07
Secunia Advisory ID:
SA21799
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for openttd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for libXfont
Vendor Patch. Secunia Advisory 74 of 235 in 2006. 10,120 views.
Release Date:
2006-09-07
Secunia Advisory ID:
SA21798
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libXfont. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


patched Gentoo update for gtetrinet
Vendor Patch. Secunia Advisory 75 of 235 in 2006. 9,717 views.
Release Date:
2006-09-07
Secunia Advisory ID:
SA21800
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gtetrinet. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for streamripper
Vendor Patch. Secunia Advisory 76 of 235 in 2006. 9,416 views.
Release Date:
2006-09-07
Secunia Advisory ID:
SA21801
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for streamripper. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for php
Vendor Patch. Secunia Advisory 77 of 235 in 2006. 10,960 views.
Release Date:
2006-08-30
Secunia Advisory ID:
SA21683
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
Local system
Short Description:
Gentoo has issued an update for php. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


patched Gentoo update for motor
Vendor Patch. Secunia Advisory 78 of 235 in 2006. 9,671 views.
Release Date:
2006-08-30
Secunia Advisory ID:
SA21684
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for motor. This fixes a vulnerability, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


patched Gentoo update for wireshark
Vendor Patch. Secunia Advisory 79 of 235 in 2006. 11,774 views.
Release Date:
2006-08-30
Secunia Advisory ID:
SA21682
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo Update for Multiple Packages
Vendor Patch. Secunia Advisory 80 of 235 in 2006. 12,509 views.
Release Date:
2006-08-29
Secunia Advisory ID:
SA21660
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for multiple packages. This fixes some security issues, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


unpatched Gentoo alsaplayer Multiple Buffer Overflow Vulnerabilities
Unpatched. Secunia Advisory 81 of 235 in 2006. 11,539 views.
Release Date:
2006-08-28
Secunia Advisory ID:
SA21639
Solution Status:
Unpatched
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has acknowledged some vulnerabilities in alsaplayer, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for heartbeat
Vendor Patch. Secunia Advisory 82 of 235 in 2006. 10,963 views.
Release Date:
2006-08-25
Secunia Advisory ID:
SA21629
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for heartbeat. This fixes some vulnerabilities, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for heimdal
Vendor Patch. Secunia Advisory 83 of 235 in 2006. 8,202 views.
Release Date:
2006-08-24
Secunia Advisory ID:
SA21613
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for heimdal. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


patched Gentoo update for rails
Vendor Patch. Secunia Advisory 84 of 235 in 2006. 9,732 views.
Release Date:
2006-08-15
Secunia Advisory ID:
SA21466
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Unknown
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for rails. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo warzone2100 Buffer Overflow Vulnerabilities
Vendor Patch. Secunia Advisory 85 of 235 in 2006. 10,470 views.
Release Date:
2006-08-11
Secunia Advisory ID:
SA21474
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has acknowledged some vulnerabilities in warzone2100, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for wordpress
Vendor Patch. Secunia Advisory 86 of 235 in 2006. 8,082 views.
Release Date:
2006-08-11
Secunia Advisory ID:
SA21447
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Unknown
Exposure of system information
Where:
From remote
Short Description:
Gentoo has issued an update for wordpress. This fixes a weakness, which can be exploited by malicious people to disclose system information, and some vulnerabilities with unknown impact. [Read More]


patched Gentoo update for libwmf
Vendor Patch. Secunia Advisory 87 of 235 in 2006. 9,343 views.
Release Date:
2006-08-11
Secunia Advisory ID:
SA21473
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libwmf. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the vulnerable library. [Read More]


patched Gentoo update for net-server
Vendor Patch. Secunia Advisory 88 of 235 in 2006. 7,826 views.
Release Date:
2006-08-11
Secunia Advisory ID:
SA21452
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for net-server. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for mit-krb5
Vendor Patch. Secunia Advisory 89 of 235 in 2006. 9,062 views.
Release Date:
2006-08-11
Secunia Advisory ID:
SA21461
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for mit-krb5. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


patched Gentoo update for dumb
Vendor Patch. Secunia Advisory 90 of 235 in 2006. 8,081 views.
Release Date:
2006-08-09
Secunia Advisory ID:
SA21416
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for dumb. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for x11vnc
Vendor Patch. Secunia Advisory 91 of 235 in 2006. 8,776 views.
Release Date:
2006-08-08
Secunia Advisory ID:
SA21405
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for x11vnc. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for clamav
Vendor Patch. Secunia Advisory 92 of 235 in 2006. 9,479 views.
Release Date:
2006-08-08
Secunia Advisory ID:
SA21368
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for mysql
Vendor Patch. Secunia Advisory 93 of 235 in 2006. 8,925 views.
Release Date:
2006-08-07
Secunia Advisory ID:
SA21366
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for mysql. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


patched Gentoo updates for webmin/usermin
Vendor Patch. Secunia Advisory 94 of 235 in 2006. 9,854 views.
Release Date:
2006-08-07
Secunia Advisory ID:
SA21365
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued updates for webmin and usermin. These fix a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


patched Gentoo update for gnupg
Vendor Patch. Secunia Advisory 95 of 235 in 2006. 8,616 views.
Release Date:
2006-08-07
Secunia Advisory ID:
SA21378
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for gnupg. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for tiff
Vendor Patch. Secunia Advisory 96 of 235 in 2006. 10,451 views.
Release Date:
2006-08-07
Secunia Advisory ID:
SA21370
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for tiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Gentoo update for pike
Vendor Patch. Secunia Advisory 97 of 235 in 2006. 9,302 views.
Release Date:
2006-08-07
Secunia Advisory ID:
SA21362
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for pike. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct SQL injection attacks. [Read More]


patched Gentoo update for seamonkey
Vendor Patch. Secunia Advisory 98 of 235 in 2006. 12,161 views.
Release Date:
2006-08-04
Secunia Advisory ID:
SA21343
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. [Read More]


patched Gentoo update for courier
Vendor Patch. Secunia Advisory 99 of 235 in 2006. 9,218 views.
Release Date:
2006-08-04
Secunia Advisory ID:
SA21350
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for courier. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for libvncserver
Vendor Patch. Secunia Advisory 100 of 235 in 2006. 9,602 views.
Release Date:
2006-08-04
Secunia Advisory ID:
SA21349
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for libvncserver. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for mozilla-firefox
Vendor Patch. Secunia Advisory 101 of 235 in 2006. 13,158 views.
Release Date:
2006-08-04
Secunia Advisory ID:
SA21361
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. [Read More]


patched Gentoo update for mozilla-thunderbird
Vendor Patch. Secunia Advisory 102 of 235 in 2006. 10,744 views.
Release Date:
2006-08-04
Secunia Advisory ID:
SA21358
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. [Read More]


patched Gentoo update for apache
Vendor Patch. Secunia Advisory 103 of 235 in 2006. 13,306 views.
Release Date:
2006-08-02
Secunia Advisory ID:
SA21315
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for apache. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


unpatched Gentoo tunepimp Release Date Lookup Buffer Overflow
Unpatched. Secunia Advisory 104 of 235 in 2006. 8,284 views.
Release Date:
2006-08-01
Secunia Advisory ID:
SA21277
Solution Status:
Unpatched
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has acknowledged a vulnerability in tunepimp, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for audacious
Vendor Patch. Secunia Advisory 105 of 235 in 2006. 8,467 views.
Release Date:
2006-07-31
Secunia Advisory ID:
SA21295
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for audacious. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system. [Read More]


patched Gentoo update for OpenOffice.org
Vendor Patch. Secunia Advisory 106 of 235 in 2006. 8,582 views.
Release Date:
2006-07-31
Secunia Advisory ID:
SA21278
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for OpenOffice.org. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for samba
Vendor Patch. Secunia Advisory 107 of 235 in 2006. 8,476 views.
Release Date:
2006-07-26
Secunia Advisory ID:
SA21190
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for gimp
Vendor Patch. Secunia Advisory 108 of 235 in 2006. 8,984 views.
Release Date:
2006-07-24
Secunia Advisory ID:
SA21170
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gimp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


patched Gentoo update for xine-lib
Vendor Patch. Secunia Advisory 109 of 235 in 2006. 9,639 views.
Release Date:
2006-07-21
Secunia Advisory ID:
SA21139
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xine-lib. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


patched Gentoo update for shoutcast-server-bin
Vendor Patch. Secunia Advisory 110 of 235 in 2006. 8,398 views.
Release Date:
2006-07-10
Secunia Advisory ID:
SA21005
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for shoutcast-server-bin. This fixes some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks or to gain knowledge of sensitive information. [Read More]


patched Gentoo update for postgresql
Vendor Patch. Secunia Advisory 111 of 235 in 2006. 9,317 views.
Release Date:
2006-07-10
Secunia Advisory ID:
SA21001
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for postgresql. This fixes some vulnerabilities, which potentially can be exploited by malicious people to conduct SQL injection attacks. [Read More]


patched Gentoo update for freetype
Vendor Patch. Secunia Advisory 112 of 235 in 2006. 8,623 views.
Release Date:
2006-07-10
Secunia Advisory ID:
SA21000
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise applications using the library. [Read More]


patched Gentoo update for tiff
Vendor Patch. Secunia Advisory 113 of 235 in 2006. 9,411 views.
Release Date:
2006-07-10
Secunia Advisory ID:
SA21002
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for tiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo mpg123 Heap Overflow Vulnerability
Vendor Patch. Secunia Advisory 114 of 235 in 2006. 11,424 views.
Release Date:
2006-07-04
Secunia Advisory ID:
SA20937
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Horst Schirmeier has reported a vulnerability in Gentoo's mpg123 package, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for kiax
Vendor Patch. Secunia Advisory 115 of 235 in 2006. 8,661 views.
Release Date:
2006-07-03
Secunia Advisory ID:
SA20900
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for kiax. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for mutt
Vendor Patch. Secunia Advisory 116 of 235 in 2006. 9,249 views.
Release Date:
2006-06-29
Secunia Advisory ID:
SA20854
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mutt. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


patched Gentoo update for tikiwiki
Vendor Patch. Secunia Advisory 117 of 235 in 2006. 8,830 views.
Release Date:
2006-06-29
Secunia Advisory ID:
SA20850
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for tikiwiki. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. [Read More]


patched Gentoo update for horde
Vendor Patch. Secunia Advisory 118 of 235 in 2006. 8,464 views.
Release Date:
2006-06-29
Secunia Advisory ID:
SA20849
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for horde. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


patched Gentoo update for hashcash
Vendor Patch. Secunia Advisory 119 of 235 in 2006. 8,832 views.
Release Date:
2006-06-27
Secunia Advisory ID:
SA20846
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for hashcash. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for emech
Vendor Patch. Secunia Advisory 120 of 235 in 2006. 9,081 views.
Release Date:
2006-06-27
Secunia Advisory ID:
SA20837
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for emech. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for wv2
Vendor Patch. Secunia Advisory 121 of 235 in 2006. 8,016 views.
Release Date:
2006-06-26
Secunia Advisory ID:
SA20844
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for wv2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library. [Read More]


patched Gentoo update for aRts
Vendor Patch. Secunia Advisory 122 of 235 in 2006. 9,961 views.
Release Date:
2006-06-23
Secunia Advisory ID:
SA20786
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for aRts. This fixes a security issue, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


patched Gentoo update for kdebase / KDM
Vendor Patch. Secunia Advisory 123 of 235 in 2006. 9,527 views.
Release Date:
2006-06-23
Secunia Advisory ID:
SA20785
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for kdebase / KDM. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


partial Gentoo update for mozilla-thunderbird
Partial Fix. Secunia Advisory 124 of 235 in 2006. 9,752 views.
Release Date:
2006-06-20
Secunia Advisory ID:
SA20709
Solution Status:
Partial Fix
Criticality:
Highly critical
Impact:
Security Bypass
Cross Site Scripting
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP response smuggling attacks, and potentially compromise a user's system. [Read More]


patched Gentoo update for typespeed
Vendor Patch. Secunia Advisory 125 of 235 in 2006. 7,906 views.
Release Date:
2006-06-20
Secunia Advisory ID:
SA20708
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for typespeed. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for sendmail
Vendor Patch. Secunia Advisory 126 of 235 in 2006. 9,665 views.
Release Date:
2006-06-16
Secunia Advisory ID:
SA20684
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for sendmail. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for pam_mysql
Vendor Patch. Secunia Advisory 127 of 235 in 2006. 9,353 views.
Release Date:
2006-06-16
Secunia Advisory ID:
SA20690
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for pam_mysql. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Gentoo update for openldap
Vendor Patch. Secunia Advisory 128 of 235 in 2006. 8,915 views.
Release Date:
2006-06-16
Secunia Advisory ID:
SA20685
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for openldap. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for asterisk
Vendor Patch. Secunia Advisory 129 of 235 in 2006. 8,259 views.
Release Date:
2006-06-15
Secunia Advisory ID:
SA20658
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for asterisk. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for DokuWiki
Vendor Patch. Secunia Advisory 130 of 235 in 2006. 9,374 views.
Release Date:
2006-06-15
Secunia Advisory ID:
SA20669
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for DokuWiki. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for gdm
Vendor Patch. Secunia Advisory 131 of 235 in 2006. 8,216 views.
Release Date:
2006-06-13
Secunia Advisory ID:
SA20636
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
Local system
Short Description:
Gentoo has issued an update for gdm. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


patched Gentoo update for vixie-cron
Vendor Patch. Secunia Advisory 132 of 235 in 2006. 9,081 views.
Release Date:
2006-06-12
Secunia Advisory ID:
SA20616
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for vixie-cron. This fixes a security issue, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


patched Gentoo update for wordpress
Vendor Patch. Secunia Advisory 133 of 235 in 2006. 6,872 views.
Release Date:
2006-06-12
Secunia Advisory ID:
SA20608
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for wordpress. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


partial Gentoo update for firefox
Partial Fix. Secunia Advisory 134 of 235 in 2006. 10,648 views.
Release Date:
2006-06-12
Secunia Advisory ID:
SA20561
Solution Status:
Partial Fix
Criticality:
Highly critical
Impact:
Security Bypass
Cross Site Scripting
System access
Where:
From remote
Short Description:
Gentoo has issued an update for firefox. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP response smuggling attacks, and potentially compromise a user's system. [Read More]


patched Gentoo update for cscope
Vendor Patch. Secunia Advisory 135 of 235 in 2006. 8,125 views.
Release Date:
2006-06-12
Secunia Advisory ID:
SA20564
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for cscope. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


patched Gentoo update for jpeg
Vendor Patch. Secunia Advisory 136 of 235 in 2006. 10,038 views.
Release Date:
2006-06-12
Secunia Advisory ID:
SA20563
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for jpeg. This fixes a security issue, which potentially can be malicious people to cause a DoS (Denial of Service) against applications and services using the jpeg library. [Read More]


patched Gentoo update for Spamassassin
Vendor Patch. Secunia Advisory 137 of 235 in 2006. 7,515 views.
Release Date:
2006-06-12
Secunia Advisory ID:
SA20566
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for spamassassin. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for mysql
Vendor Patch. Secunia Advisory 138 of 235 in 2006. 7,993 views.
Release Date:
2006-06-12
Secunia Advisory ID:
SA20562
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for MySQL. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct SQL injection attacks. [Read More]


patched Gentoo update for pound
Vendor Patch. Secunia Advisory 139 of 235 in 2006. 6,997 views.
Release Date:
2006-06-08
Secunia Advisory ID:
SA20510
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for pound. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct HTTP request smuggling attacks. [Read More]


patched Gentoo update for shadow
Vendor Patch. Secunia Advisory 140 of 235 in 2006. 7,490 views.
Release Date:
2006-06-08
Secunia Advisory ID:
SA20506
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for shadow. This fixes a security issue, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


patched Gentoo update for dia
Vendor Patch. Secunia Advisory 141 of 235 in 2006. 7,517 views.
Release Date:
2006-06-08
Secunia Advisory ID:
SA20513
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for dia. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for awstats
Vendor Patch. Secunia Advisory 142 of 235 in 2006. 13,375 views.
Release Date:
2006-06-08
Secunia Advisory ID:
SA20496
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Cross Site Scripting
Exposure of system information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for awstats. This fixes some vulnerabilities, which can be exploited by malicious people to disclose system information, conduct cross-site scripting attacks, and to compromise a vulnerable system. [Read More]


patched Gentoo update for tor
Vendor Patch. Secunia Advisory 143 of 235 in 2006. 9,076 views.
Release Date:
2006-06-08
Secunia Advisory ID:
SA20514
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Spoofing
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for tor. This fixes a weakness and some vulnerabilities, which can be exploited by malicious people to spoof log entries, disclose certain sensitive information, and cause a DoS (Denial of Service). [Read More]


patched Gentoo update for cherrypy
Vendor Patch. Secunia Advisory 144 of 235 in 2006. 8,224 views.
Release Date:
2006-05-31
Secunia Advisory ID:
SA20344
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for cherrypy. This fixes a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


patched Gentoo update for libtiff
Vendor Patch. Secunia Advisory 145 of 235 in 2006. 9,162 views.
Release Date:
2006-05-31
Secunia Advisory ID:
SA20345
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libtiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


patched Gentoo update for quagga
Vendor Patch. Secunia Advisory 146 of 235 in 2006. 8,943 views.
Release Date:
2006-05-22
Secunia Advisory ID:
SA20138
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Exposure of system information
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for quagga. This fixes two security issues and a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service), and by malicious people to bypass certain security restrictions and to disclose system information. [Read More]


patched Gentoo update for libextractor
Vendor Patch. Secunia Advisory 147 of 235 in 2006. 7,479 views.
Release Date:
2006-05-22
Secunia Advisory ID:
SA20160
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libextractor. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application that uses the library. [Read More]


patched Gentoo update for mysql
Vendor Patch. Secunia Advisory 148 of 235 in 2006. 9,914 views.
Release Date:
2006-05-12
Secunia Advisory ID:
SA20073
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
Gentoo has issued an update for mysql. This fixes two vulnerabilities, which can be exploited by malicious users to disclose potentially sensitive information. [Read More]


patched Gentoo update for quake
Vendor Patch. Secunia Advisory 149 of 235 in 2006. 9,897 views.
Release Date:
2006-05-10
Secunia Advisory ID:
SA20065
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for multiple packages based on the Quake 3 engine. These fix a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


patched Gentoo update for ruby
Vendor Patch. Secunia Advisory 150 of 235 in 2006. 8,377 views.
Release Date:
2006-05-10
Secunia Advisory ID:
SA20064
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for pdnsd
Vendor Patch. Secunia Advisory 151 of 235 in 2006. 8,486 views.
Release Date:
2006-05-10
Secunia Advisory ID:
SA20055
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for pdnsd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for php
Vendor Patch. Secunia Advisory 152 of 235 in 2006. 9,955 views.
Release Date:
2006-05-09
Secunia Advisory ID:
SA20052
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Cross Site Scripting
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for php. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to gain knowledge of potentially sensitive information, to conduct cross-site scripting attacks, and to compromise a vulnerable system. [Read More]


patched Gentoo update for mozilla-thunderbird
Vendor Patch. Secunia Advisory 153 of 235 in 2006. 12,362 views.
Release Date:
2006-05-09
Secunia Advisory ID:
SA20051
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Cross Site Scripting
Spoofing
Exposure of system information
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and phishing attacks, bypass certain security restrictions, disclose sensitive information, and potentially compromise a user's system. [Read More]


patched Gentoo update for nagios
Vendor Patch. Secunia Advisory 154 of 235 in 2006. 8,089 views.
Release Date:
2006-05-08
Secunia Advisory ID:
SA20013
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for nagios. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for mozilla-firefox
Vendor Patch. Secunia Advisory 155 of 235 in 2006. 9,470 views.
Release Date:
2006-05-08
Secunia Advisory ID:
SA20019
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-firefox. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


patched Gentoo update for rsync
Vendor Patch. Secunia Advisory 156 of 235 in 2006. 8,047 views.
Release Date:
2006-05-08
Secunia Advisory ID:
SA20011
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for rsync. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for xorg-x11
Vendor Patch. Secunia Advisory 157 of 235 in 2006. 11,371 views.
Release Date:
2006-05-03
Secunia Advisory ID:
SA19915
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for xorg-x11. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for phpwebsite
Vendor Patch. Secunia Advisory 158 of 235 in 2006. 7,371 views.
Release Date:
2006-05-03
Secunia Advisory ID:
SA19914
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for phpwebsite. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for clamav
Vendor Patch. Secunia Advisory 159 of 235 in 2006. 8,587 views.
Release Date:
2006-05-03
Secunia Advisory ID:
SA19912
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. [Read More]


patched Gentoo update for mplayer
Vendor Patch. Secunia Advisory 160 of 235 in 2006. 9,009 views.
Release Date:
2006-05-02
Secunia Advisory ID:
SA19919
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mplayer. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


patched Gentoo update for mozilla
Vendor Patch. Secunia Advisory 161 of 235 in 2006. 11,714 views.
Release Date:
2006-05-01
Secunia Advisory ID:
SA19902
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Cross Site Scripting
Spoofing
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and phishing attacks, bypass certain security restrictions, cause a DoS (Denial of Service), disclose sensitive information, and potentially compromise a user's system. [Read More]


patched Gentoo update for ethereal
Vendor Patch. Secunia Advisory 162 of 235 in 2006. 10,745 views.
Release Date:
2006-04-27
Secunia Advisory ID:
SA19839
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ethereal. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Gentoo update for xine-ui
Vendor Patch. Secunia Advisory 163 of 235 in 2006. 8,984 views.
Release Date:
2006-04-27
Secunia Advisory ID:
SA19854
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xine-ui. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for xine-lib
Vendor Patch. Secunia Advisory 164 of 235 in 2006. 8,061 views.
Release Date:
2006-04-27
Secunia Advisory ID:
SA19856
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xine-lib. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for crossfire-server
Vendor Patch. Secunia Advisory 165 of 235 in 2006. 8,175 views.
Release Date:
2006-04-24
Secunia Advisory ID:
SA19785
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for crossfire-server. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for fbida
Vendor Patch. Secunia Advisory 166 of 235 in 2006. 8,521 views.
Release Date:
2006-04-24
Secunia Advisory ID:
SA19766
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for fbida. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for dia
Vendor Patch. Secunia Advisory 167 of 235 in 2006. 7,699 views.
Release Date:
2006-04-24
Secunia Advisory ID:
SA19765
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for dia. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for mozilla-firefox / mozilla-firefox-bin
Vendor Patch. Secunia Advisory 168 of 235 in 2006. 13,017 views.
Release Date:
2006-04-24
Secunia Advisory ID:
SA19759
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
Cross Site Scripting
Spoofing
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-firefox / mozilla-firefox-bin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and phishing attacks, bypass certain security restrictions, disclose sensitive information, cause a DoS (Denial of Service), and potentially compromise a user's system. [Read More]


patched Gentoo update for zgv/xzgv
Vendor Patch. Secunia Advisory 169 of 235 in 2006. 10,738 views.
Release Date:
2006-04-21
Secunia Advisory ID:
SA19757
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for zgv and xzgv. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for cyrus-sasl
Vendor Patch. Secunia Advisory 170 of 235 in 2006. 10,219 views.
Release Date:
2006-04-21
Secunia Advisory ID:
SA19753
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for cyrus-sasl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for libapreq2
Vendor Patch. Secunia Advisory 171 of 235 in 2006. 8,153 views.
Release Date:
2006-04-18
Secunia Advisory ID:
SA19658
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for libapreq2. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for cacti
Vendor Patch. Secunia Advisory 172 of 235 in 2006. 9,814 views.
Release Date:
2006-04-17
Secunia Advisory ID:
SA19691
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of system information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for cacti. This fixes two security issues and some vulnerabilities, which can be exploited by malicious people to disclose system information, conduct cross-site scripting attacks, execute arbitrary SQL code, and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for clamav
Vendor Patch. Secunia Advisory 173 of 235 in 2006. 10,120 views.
Release Date:
2006-04-10
Secunia Advisory ID:
SA19567
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. [Read More]


patched Gentoo update for kaffeine
Vendor Patch. Secunia Advisory 174 of 235 in 2006. 8,258 views.
Release Date:
2006-04-06
Secunia Advisory ID:
SA19542
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for kaffeine. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo Doomsday Format String Vulnerabilities
Vendor Patch. Secunia Advisory 175 of 235 in 2006. 8,174 views.
Release Date:
2006-04-06
Secunia Advisory ID:
SA19519
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has acknowledged some vulnerabilities in doomsday, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for horde
Vendor Patch. Secunia Advisory 176 of 235 in 2006. 9,228 views.
Release Date:
2006-04-05
Secunia Advisory ID:
SA19528
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for horde. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information or compromise a vulnerable system. [Read More]


patched Gentoo update for freeradius
Vendor Patch. Secunia Advisory 177 of 235 in 2006. 8,716 views.
Release Date:
2006-04-05
Secunia Advisory ID:
SA19527
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for freeradius. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and bypass certain security restrictions. [Read More]


patched Gentoo update for mediawiki
Vendor Patch. Secunia Advisory 178 of 235 in 2006. 8,676 views.
Release Date:
2006-04-04
Secunia Advisory ID:
SA19517
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for mediawiki. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


patched Gentoo bsd-games Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 179 of 235 in 2006. 10,512 views.
Release Date:
2006-03-30
Secunia Advisory ID:
SA19442
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Tavis Ormandy has reported some vulnerabilities in the bsd-games package, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for openoffice / openoffice-bin
Vendor Patch. Secunia Advisory 180 of 235 in 2006. 10,389 views.
Release Date:
2006-03-28
Secunia Advisory ID:
SA19433
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Unknown
Where:
Local system
Short Description:
Gentoo has issued updates for openoffice / openoffice-bin. These fix a vulnerability, which has an unknown impact. [Read More]


patched Gentoo update for realplayer
Vendor Patch. Secunia Advisory 181 of 235 in 2006. 11,237 views.
Release Date:
2006-03-27
Secunia Advisory ID:
SA19390
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for realplayer. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo nethack / falconseye / slashem Privilege Escalation
Vendor Workaround. Secunia Advisory 182 of 235 in 2006. 12,451 views.
Release Date:
2006-03-24
Secunia Advisory ID:
SA19376
Solution Status:
Vendor Workaround
Criticality:
Less critical
Impact:
Manipulation of data
Privilege escalation
Where:
Local system
Short Description:
Gentoo has reported some vulnerabilities in the nethack / falconseye / slashem packages, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for sendmail
Vendor Patch. Secunia Advisory 183 of 235 in 2006. 9,801 views.
Release Date:
2006-03-23
Secunia Advisory ID:
SA19363
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for sendmail. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for php
Vendor Patch. Secunia Advisory 184 of 235 in 2006. 9,717 views.
Release Date:
2006-03-23
Secunia Advisory ID:
SA19355
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
Gentoo has issued an update for php. This fixes a vulnerability, which can be exploited by malicious people to conduct HTTP response splitting attacks, potentially conduct cross-site scripting attacks, and potentially compromise a vulnerable system. [Read More]


patched Gentoo update for curl
Vendor Patch. Secunia Advisory 185 of 235 in 2006. 8,749 views.
Release Date:
2006-03-22
Secunia Advisory ID:
SA19344
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for curl. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for pngcrush
Vendor Patch. Secunia Advisory 186 of 235 in 2006. 9,885 views.
Release Date:
2006-03-22
Secunia Advisory ID:
SA19334
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for pngcrush. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for netscape-flash
Vendor Patch. Secunia Advisory 187 of 235 in 2006. 9,054 views.
Release Date:
2006-03-22
Secunia Advisory ID:
SA19328
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for netscape-flash. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for peercast
Vendor Patch. Secunia Advisory 188 of 235 in 2006. 9,235 views.
Release Date:
2006-03-21
Secunia Advisory ID:
SA19291
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for peercast. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for heimdal
Vendor Patch. Secunia Advisory 189 of 235 in 2006. 9,124 views.
Release Date:
2006-03-20
Secunia Advisory ID:
SA19302
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
From local network
Short Description:
Gentoo has issued an update for heimdal. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for PEAR-Auth
Vendor Patch. Secunia Advisory 190 of 235 in 2006. 8,202 views.
Release Date:
2006-03-20
Secunia Advisory ID:
SA19301
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for PEAR-Auth. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for crypt-cbc
Vendor Patch. Secunia Advisory 191 of 235 in 2006. 10,345 views.
Release Date:
2006-03-20
Secunia Advisory ID:
SA19303
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for crypt-cbc. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for metamail
Vendor Patch. Secunia Advisory 192 of 235 in 2006. 8,179 views.
Release Date:
2006-03-20
Secunia Advisory ID:
SA19304
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for metamail. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for zoo
Vendor Patch. Secunia Advisory 193 of 235 in 2006. 7,968 views.
Release Date:
2006-03-16
Secunia Advisory ID:
SA19254
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for zoo. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for freeciv
Vendor Patch. Secunia Advisory 194 of 235 in 2006. 9,162 views.
Release Date:
2006-03-16
Secunia Advisory ID:
SA19253
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for freeciv. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for gnupg
Vendor Patch. Secunia Advisory 195 of 235 in 2006. 8,869 views.
Release Date:
2006-03-13
Secunia Advisory ID:
SA19232
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for gnupg. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for flex
Vendor Patch. Secunia Advisory 196 of 235 in 2006. 8,431 views.
Release Date:
2006-03-13
Secunia Advisory ID:
SA19228
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for flex. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for squirrelmail
Vendor Patch. Secunia Advisory 197 of 235 in 2006. 9,805 views.
Release Date:
2006-03-13
Secunia Advisory ID:
SA19205
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for squirrelmail. This fixes some vulnerabilities, which can be exploited by malicious users to manipulate certain information and by malicious people to conduct cross-site scripting attacks. [Read More]


patched Gentoo cube Buffer Overflow and Denial of Service
Vendor Workaround. Secunia Advisory 198 of 235 in 2006. 9,337 views.
Release Date:
2006-03-13
Secunia Advisory ID:
SA19199
Solution Status:
Vendor Workaround
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has acknowledged some vulnerabilities in cube, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. [Read More]


patched Gentoo update for tar
Vendor Patch. Secunia Advisory 199 of 235 in 2006. 9,404 views.
Release Date:
2006-03-13
Secunia Advisory ID:
SA19236
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for tar. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and to compromise a user's system. [Read More]


patched Gentoo update for zoo
Vendor Patch. Secunia Advisory 200 of 235 in 2006. 8,626 views.
Release Date:
2006-03-07
Secunia Advisory ID:
SA19148
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for zoo. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


patched Gentoo update for wordpress
Vendor Patch. Secunia Advisory 201 of 235 in 2006. 8,388 views.
Release Date:
2006-03-06
Secunia Advisory ID:
SA19123
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for wordpress. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks. [Read More]


patched Gentoo update for up-imapproxy
Vendor Patch. Secunia Advisory 202 of 235 in 2006. 8,936 views.
Release Date:
2006-03-06
Secunia Advisory ID:
SA19113
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for up-imapproxy. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for teTeX / pTeX / CSTeX
Vendor Patch. Secunia Advisory 203 of 235 in 2006. 9,691 views.
Release Date:
2006-03-06
Secunia Advisory ID:
SA19125
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for teTeX, pTeX, and CSTeX. These fix a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


patched Gentoo update for mplayer
Vendor Patch. Secunia Advisory 204 of 235 in 2006. 10,000 views.
Release Date:
2006-03-06
Secunia Advisory ID:
SA19114
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mplayer. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


patched Gentoo update for noweb
Vendor Patch. Secunia Advisory 205 of 235 in 2006. 8,456 views.
Release Date:
2006-02-27
Secunia Advisory ID:
SA19027
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for noweb. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


patched Gentoo update for graphicsmagick
Vendor Patch. Secunia Advisory 206 of 235 in 2006. 9,831 views.
Release Date:
2006-02-27
Secunia Advisory ID:
SA19030
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for graphicsmagick. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for gpdf
Vendor Patch. Secunia Advisory 207 of 235 in 2006. 8,754 views.
Release Date:
2006-02-22
Secunia Advisory ID:
SA18983
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gpdf. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


patched Gentoo update for openssh / dropbear
Vendor Patch. Secunia Advisory 208 of 235 in 2006. 10,139 views.
Release Date:
2006-02-21
Secunia Advisory ID:
SA18969
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for openssh / dropbear. This fixes a weakness, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


patched Gentoo update for gnupg
Vendor Patch. Secunia Advisory 209 of 235 in 2006. 10,028 views.
Release Date:
2006-02-20
Secunia Advisory ID:
SA18956
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for gnupg. This fixes a security issue, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Gentoo update for bomberclone
Vendor Patch. Secunia Advisory 210 of 235 in 2006. 9,794 views.
Release Date:
2006-02-17
Secunia Advisory ID:
SA18915
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for bomberclone. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for libtasn1/gnutls
Vendor Patch. Secunia Advisory 211 of 235 in 2006. 9,716 views.
Release Date:
2006-02-17
Secunia Advisory ID:
SA18898
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued updates for libtasn1/gnutls. These fix a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for sun-jdk/sun-jre-bin
Vendor Patch. Secunia Advisory 212 of 235 in 2006. 9,303 views.
Release Date:
2006-02-15
Secunia Advisory ID:
SA18884
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for sun-jdk and sun-jre-bin. These fix some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for imagemagick
Vendor Patch. Secunia Advisory 213 of 235 in 2006. 8,817 views.
Release Date:
2006-02-14
Secunia Advisory ID:
SA18851
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for imagemagick. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for kdegraphics/kpdf
Vendor Patch. Secunia Advisory 214 of 235 in 2006. 9,198 views.
Release Date:
2006-02-13
Secunia Advisory ID:
SA18826
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for kdegraphics and kpdf. These fix a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


patched Gentoo update for xpdf/poppler
Vendor Patch. Secunia Advisory 215 of 235 in 2006. 9,394 views.
Release Date:
2006-02-13
Secunia Advisory ID:
SA18825
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued updates for xpdf and poppler. These fix a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


patched Gentoo update for apache
Vendor Patch. Secunia Advisory 216 of 235 in 2006. 11,171 views.
Release Date:
2006-02-07
Secunia Advisory ID:
SA18743
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for apache. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for adodb
Vendor Patch. Secunia Advisory 217 of 235 in 2006. 9,388 views.
Release Date:
2006-02-07
Secunia Advisory ID:
SA18745
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for adodb. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct SQL injection attacks. [Read More]


patched Gentoo update for gst-plugins-ffmpeg
Vendor Patch. Secunia Advisory 218 of 235 in 2006. 9,218 views.
Release Date:
2006-02-06
Secunia Advisory ID:
SA18746
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gst-plugins-ffmpeg. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


patched Gentoo updates for xpdf/poppler/gpdf/libextractor/pdftohtml
Vendor Patch. Secunia Advisory 219 of 235 in 2006. 10,460 views.
Release Date:
2006-01-31
Secunia Advisory ID:
SA18644
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for xpdf/poppler/gpdf/libextractor/pdftohtml. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), and potentially to compromise a user's system. [Read More]


patched Gentoo update for mydns
Vendor Patch. Secunia Advisory 220 of 235 in 2006. 8,811 views.
Release Date:
2006-01-31
Secunia Advisory ID:
SA18653
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for mydns. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Gentoo update for libast
Vendor Patch. Secunia Advisory 221 of 235 in 2006. 9,017 views.
Release Date:
2006-01-30
Secunia Advisory ID:
SA18632
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for libast. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Gentoo update for paros
Vendor Patch. Secunia Advisory 222 of 235 in 2006. 7,831 views.
Release Date:
2006-01-30
Secunia Advisory ID:
SA18626
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Exposure of sensitive information
Where:
From local network
Short Description:
Gentoo has issued an update for paros. This fixes a security issue, which can be exploited by malicious people to disclose sensitive information and bypass certain security restrictions. [Read More]


patched Gentoo update for gallery
Vendor Patch. Secunia Advisory 223 of 235 in 2006. 10,099 views.
Release Date:
2006-01-27
Secunia Advisory ID:
SA18627
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for gallery. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct script insertion attacks. [Read More]


patched Gentoo update for trac
Vendor Patch. Secunia Advisory 224 of 235 in 2006. 9,758 views.
Release Date:
2006-01-26
Secunia Advisory ID:
SA18625
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for trac. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


patched Gentoo update for kdelibs
Vendor Patch. Secunia Advisory 225 of 235 in 2006. 9,606 views.
Release Date:
2006-01-23
Secunia Advisory ID:
SA18570
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for kdelibs. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. [Read More]


partial Gentoo update for sun-jdk/sun-jre-bin/blackdown-jdk/blackdown-jre
Partial Fix. Secunia Advisory 226 of 235 in 2006. 9,591 views.
Release Date:
2006-01-16
Secunia Advisory ID:
SA18435
Solution Status:
Partial Fix
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued updates for sun-jdk, sun-jre-bin, blackdown-jdk, and blackdown-jre. These fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for blender
Vendor Patch. Secunia Advisory 227 of 235 in 2006. 8,283 views.
Release Date:
2006-01-13
Secunia Advisory ID:
SA18452
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for blender. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a user's system. [Read More]


patched Gentoo update for wine
Vendor Patch. Secunia Advisory 228 of 235 in 2006. 9,669 views.
Release Date:
2006-01-13
Secunia Advisory ID:
SA18451
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for wine. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for clamav
Vendor Patch. Secunia Advisory 229 of 235 in 2006. 9,121 views.
Release Date:
2006-01-13
Secunia Advisory ID:
SA18453
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for mod_auth_pgsql
Vendor Patch. Secunia Advisory 230 of 235 in 2006. 8,645 views.
Release Date:
2006-01-11
Secunia Advisory ID:
SA18403
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mod_auth_pgsql. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Gentoo update for xine-lib / ffmpeg
Vendor Patch. Secunia Advisory 231 of 235 in 2006. 9,917 views.
Release Date:
2006-01-11
Secunia Advisory ID:
SA18400
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xine-lib / ffmpeg. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


patched Gentoo update for vmware
Vendor Patch. Secunia Advisory 232 of 235 in 2006. 8,447 views.
Release Date:
2006-01-09
Secunia Advisory ID:
SA18344
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for vmware. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Gentoo update for hylafax
Vendor Patch. Secunia Advisory 233 of 235 in 2006. 8,228 views.
Release Date:
2006-01-06
Secunia Advisory ID:
SA18337
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Gentoo has issued an update for hylafax. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to compromise a vulnerable system. [Read More]


patched Gentoo update for kdegraphics / kpdf / koffice / kword
Vendor Patch. Secunia Advisory 234 of 235 in 2006. 9,707 views.
Release Date:
2006-01-05
Secunia Advisory ID:
SA18313
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Unknown
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for kdegraphics / kpdf / koffice / kword. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), potentially to compromise a user's system and with an unknown impact. [Read More]


patched Gentoo pinentry Insecure Permissions setgid Binaries Security Issue
Vendor Patch. Secunia Advisory 235 of 235 in 2006. 8,974 views.
Release Date:
2006-01-04
Secunia Advisory ID:
SA18284
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Tavis Ormandy has reported a security issue in pinentry, which potentially can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Gentoo Linux 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


Secunia is a member of FIRST Secunia is a member of EDUcause Secunia is a member of The Open Group Secunia is a member of FS-ISAC
 
Secunia © 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer
follow Secunia on Facebook follow Secunia on Twitter follow Secunia on LinkedIn follow Secunia on YouTube follow Secunia Xing follow Secunias RSS feed follow Secunia on Google+