Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Gentoo Linux

This vulnerability report for Gentoo Linux contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Gentoo Linux then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Gentoo

Product Link N/A

Affected By 2095 Secunia advisories
8127 Vulnerabilities

Monitor Product Receive alerts for this product





215 Secunia Advisories in 2008

Secunia has issued a total of 215 Secunia advisories in 2008 for Gentoo Linux. Currently, 2% (5 out of 215) are marked as unpatched with the most severe being rated Highly critical

More information about the specific Secunia advisories affecting Gentoo Linux can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Gentoo update for imlib2
Vendor Patch. Secunia Advisory 1 of 215 in 2008. 4,695 views.
Release Date:
2008-12-24
Secunia Advisory ID:
SA33323
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for imlib2. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library. [Read More]


Gentoo update for ampache
Vendor Patch. Secunia Advisory 2 of 215 in 2008. 4,324 views.
Release Date:
2008-12-24
Secunia Advisory ID:
SA33316
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for ampache. This fixes a security issue, which can be exploited by malicious local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for vlc
Vendor Patch. Secunia Advisory 3 of 215 in 2008. 4,801 views.
Release Date:
2008-12-24
Secunia Advisory ID:
SA33315
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for vlc. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for clamav
Vendor Patch. Secunia Advisory 4 of 215 in 2008. 4,969 views.
Release Date:
2008-12-24
Secunia Advisory ID:
SA33317
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Gentoo phpCollab Multiple Vulnerabilities
Unpatched. Secunia Advisory 5 of 215 in 2008. 6,262 views.
Release Date:
2008-12-22
Secunia Advisory ID:
SA33258
Solution Status:
Unpatched
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has acknowledged some vulnerabilities in phpCollab, which can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Gentoo update for pdns
Vendor Patch. Secunia Advisory 6 of 215 in 2008. 3,267 views.
Release Date:
2008-12-22
Secunia Advisory ID:
SA33264
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for pdns. This fixes a weakness and a vulnerability, which can be exploited by malicious people to conduct spoofing attacks or cause a DoS (Denial of Service). [Read More]


Gentoo update for ruby
Vendor Patch. Secunia Advisory 7 of 215 in 2008. 5,528 views.
Release Date:
2008-12-17
Secunia Advisory ID:
SA33178
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ruby. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), conduct spoofing attacks, and potentially compromise a vulnerable system. [Read More]


Gentoo update for jasper
Vendor Patch. Secunia Advisory 8 of 215 in 2008. 4,265 views.
Release Date:
2008-12-17
Secunia Advisory ID:
SA33173
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for jasper. This fixes some vulnerabilities, which can be exploited by malicious people to compromise an application using the library. [Read More]


Gentoo update for povray
Vendor Patch. Secunia Advisory 9 of 215 in 2008. 5,257 views.
Release Date:
2008-12-15
Secunia Advisory ID:
SA33137
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for povray. This fixes a some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for openoffice and openoffice-bin
Vendor Patch. Secunia Advisory 10 of 215 in 2008. 4,365 views.
Release Date:
2008-12-15
Secunia Advisory ID:
SA33140
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Gentoo has issued an update for openoffice and openoffice-bin. This fixes some vulnerabilities and a security issue, which potentially can be exploited by malicious people to compromise a user's system, and by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for dovecot
Vendor Patch. Secunia Advisory 11 of 215 in 2008. 3,362 views.
Release Date:
2008-12-15
Secunia Advisory ID:
SA33149
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for dovecot. This fixes two security issues and a vulnerability, which can be exploited by malicious users to bypass certain security restrictions and malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for aview
Vendor Patch. Secunia Advisory 12 of 215 in 2008. 3,444 views.
Release Date:
2008-12-15
Secunia Advisory ID:
SA33139
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for aview. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for honeyd
Vendor Patch. Secunia Advisory 13 of 215 in 2008. 3,801 views.
Release Date:
2008-12-15
Secunia Advisory ID:
SA33141
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for honeyd. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for opensc
Vendor Patch. Secunia Advisory 14 of 215 in 2008. 4,138 views.
Release Date:
2008-12-11
Secunia Advisory ID:
SA33115
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for opensc. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for cups
Vendor Patch. Secunia Advisory 15 of 215 in 2008. 5,167 views.
Release Date:
2008-12-11
Secunia Advisory ID:
SA33111
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for cups. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for Archive-Tar
Vendor Patch. Secunia Advisory 16 of 215 in 2008. 3,920 views.
Release Date:
2008-12-11
Secunia Advisory ID:
SA33116
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for Archive-Tar. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for mgetty
Vendor Patch. Secunia Advisory 17 of 215 in 2008. 3,961 views.
Release Date:
2008-12-08
Secunia Advisory ID:
SA33051
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for mgetty. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for mantisbt
Vendor Patch. Secunia Advisory 18 of 215 in 2008. 3,967 views.
Release Date:
2008-12-03
Secunia Advisory ID:
SA32975
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mantisbt. This fixes a security issue and a vulnerability, which can be exploited by malicious users to disclose potentially sensitive information and compromise a vulnerable system. [Read More]


Gentoo update for ipsec-tools
Vendor Patch. Secunia Advisory 19 of 215 in 2008. 4,502 views.
Release Date:
2008-12-03
Secunia Advisory ID:
SA32971
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for ipsec-tools. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for optipng
Vendor Patch. Secunia Advisory 20 of 215 in 2008. 4,137 views.
Release Date:
2008-12-03
Secunia Advisory ID:
SA32962
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for optipng. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for lighttpd
Vendor Patch. Secunia Advisory 21 of 215 in 2008. 3,970 views.
Release Date:
2008-12-03
Secunia Advisory ID:
SA32972
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for lighttpd. This fixes a weakness and two vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service). [Read More]


Gentoo update for enscript
Vendor Patch. Secunia Advisory 22 of 215 in 2008. 4,237 views.
Release Date:
2008-12-03
Secunia Advisory ID:
SA32970
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for enscript. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for libxml2
Vendor Patch. Secunia Advisory 23 of 215 in 2008. 4,289 views.
Release Date:
2008-12-03
Secunia Advisory ID:
SA32974
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update to libxml2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Gentoo update for php
Vendor Patch. Secunia Advisory 24 of 215 in 2008. 4,161 views.
Release Date:
2008-11-17
Secunia Advisory ID:
SA32746
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Security Bypass
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for php. This fixes some vulnerabilities, where some have unknown impacts and others can be exploited by malicious users to bypass certain security restrictions, and potentially by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), or to compromise a vulnerable system. [Read More]


Gentoo update for gallery
Vendor Patch. Secunia Advisory 25 of 215 in 2008. 3,689 views.
Release Date:
2008-11-10
Secunia Advisory ID:
SA32662
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for gallery. This fixes some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and disclose potentially sensitive information. [Read More]


Gentoo update for faad2
Vendor Patch. Secunia Advisory 26 of 215 in 2008. 3,879 views.
Release Date:
2008-11-10
Secunia Advisory ID:
SA32661
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for faad2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for graphviz
Vendor Patch. Secunia Advisory 27 of 215 in 2008. 3,840 views.
Release Date:
2008-11-10
Secunia Advisory ID:
SA32656
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for graphviz. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for opera
Vendor Patch. Secunia Advisory 28 of 215 in 2008. 4,995 views.
Release Date:
2008-11-04
Secunia Advisory ID:
SA32538
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Spoofing
Exposure of system information
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for opera. This fixes some vulnerabilities, which can be exploited by malicious people to disclose system and potentially sensitive information, conduct spoofing and cross-site scripting attacks, bypass certain security restrictions, and potentially compromise a user's system. [Read More]


Gentoo update for libspf2
Vendor Patch. Secunia Advisory 29 of 215 in 2008. 4,248 views.
Release Date:
2008-10-31
Secunia Advisory ID:
SA32496
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libspf2. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library. [Read More]


Gentoo Portage Insecure Python Module Search Path Security Issue
Vendor Patch. Secunia Advisory 30 of 215 in 2008. 5,433 views.
Release Date:
2008-10-10
Secunia Advisory ID:
SA32228
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has acknowledged a security issue in portage, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for wordnet
Vendor Patch. Secunia Advisory 31 of 215 in 2008. 4,036 views.
Release Date:
2008-10-08
Secunia Advisory ID:
SA32184
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for wordnet. This fixes some vulnerabilities, which can potentially be exploited by malicious, local users to gain escalated privileges, and by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for clamav
Vendor Patch. Secunia Advisory 32 of 215 in 2008. 4,789 views.
Release Date:
2008-09-26
Secunia Advisory ID:
SA32030
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for git
Vendor Patch. Secunia Advisory 33 of 215 in 2008. 3,876 views.
Release Date:
2008-09-26
Secunia Advisory ID:
SA32029
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for git. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for wireshark
Vendor Patch. Secunia Advisory 34 of 215 in 2008. 4,631 views.
Release Date:
2008-09-26
Secunia Advisory ID:
SA32028
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for bitlbee
Vendor Patch. Secunia Advisory 35 of 215 in 2008. 3,955 views.
Release Date:
2008-09-24
Secunia Advisory ID:
SA31991
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for bitlbee. This fixes some security issues, which can be exploited by malicious people to bypass certain security restrictions and hijack accounts. [Read More]


Gentoo update for R
Vendor Patch. Secunia Advisory 36 of 215 in 2008. 3,667 views.
Release Date:
2008-09-23
Secunia Advisory ID:
SA31996
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for R. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for newsbeuter
Vendor Patch. Secunia Advisory 37 of 215 in 2008. 3,558 views.
Release Date:
2008-09-23
Secunia Advisory ID:
SA31995
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for newsbeuter. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for mantisbt
Vendor Patch. Secunia Advisory 38 of 215 in 2008. 3,980 views.
Release Date:
2008-09-22
Secunia Advisory ID:
SA31972
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mantisbt. This fixes some vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and malicious people to conduct cross-site scripting and cross-site request forgery attacks. [Read More]


Gentoo update for havp
Vendor Patch. Secunia Advisory 39 of 215 in 2008. 3,629 views.
Release Date:
2008-09-22
Secunia Advisory ID:
SA31971
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for havp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for postfix
Vendor Patch. Secunia Advisory 40 of 215 in 2008. 3,839 views.
Release Date:
2008-09-22
Secunia Advisory ID:
SA31986
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Gentoo has issued an update for postfix. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Gentoo update for Amarok
Vendor Patch. Secunia Advisory 41 of 215 in 2008. 2,154 views.
Release Date:
2008-09-09
Secunia Advisory ID:
SA31798
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for Amarok. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for tiff
Vendor Patch. Secunia Advisory 42 of 215 in 2008. 2,180 views.
Release Date:
2008-09-09
Secunia Advisory ID:
SA31797
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for tiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a user's system. [Read More]


Gentoo update for VLC
Vendor Patch. Secunia Advisory 43 of 215 in 2008. 2,543 views.
Release Date:
2008-09-08
Secunia Advisory ID:
SA31785
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for VLC. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for courier-authlib
Vendor Patch. Secunia Advisory 44 of 215 in 2008. 2,189 views.
Release Date:
2008-09-08
Secunia Advisory ID:
SA31790
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for courier-authlib. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Gentoo update for yelp
Vendor Patch. Secunia Advisory 45 of 215 in 2008. 4,056 views.
Release Date:
2008-09-05
Secunia Advisory ID:
SA31753
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for yelp. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for dnsmasq
Vendor Patch. Secunia Advisory 46 of 215 in 2008. 4,172 views.
Release Date:
2008-09-05
Secunia Advisory ID:
SA31754
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for dnsmasq. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and poison the DNS cache. [Read More]


Gentoo update for mysql
Vendor Patch. Secunia Advisory 47 of 215 in 2008. 3,961 views.
Release Date:
2008-09-05
Secunia Advisory ID:
SA31755
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Gentoo has issued an update for mysql. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Gentoo update for realplayer
Vendor Patch. Secunia Advisory 48 of 215 in 2008. 4,467 views.
Release Date:
2008-09-05
Secunia Advisory ID:
SA31756
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for realplayer. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for postfix
Vendor Patch. Secunia Advisory 49 of 215 in 2008. 5,961 views.
Release Date:
2008-08-15
Secunia Advisory ID:
SA31477
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for postfix. This fixes some security issues, which can be exploited by malicious, local users to disclose potentially sensitive information and perform certain actions with escalated privileges. [Read More]


Gentoo update for uudeview and nzbget
Vendor Patch. Secunia Advisory 50 of 215 in 2008. 4,095 views.
Release Date:
2008-08-12
Secunia Advisory ID:
SA31420
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
Local system
Short Description:
Gentoo has issued an update for uudeview and nzbget. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for stunnel
Vendor Patch. Secunia Advisory 51 of 215 in 2008. 4,419 views.
Release Date:
2008-08-11
Secunia Advisory ID:
SA31438
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for stunnel. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for clamav
Vendor Patch. Secunia Advisory 52 of 215 in 2008. 4,851 views.
Release Date:
2008-08-11
Secunia Advisory ID:
SA31437
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for openldap
Vendor Patch. Secunia Advisory 53 of 215 in 2008. 4,862 views.
Release Date:
2008-08-11
Secunia Advisory ID:
SA31436
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for openldap. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for acroread
Vendor Patch. Secunia Advisory 54 of 215 in 2008. 4,559 views.
Release Date:
2008-08-11
Secunia Advisory ID:
SA31428
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for acroread. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for dhcp
Vendor Patch. Secunia Advisory 55 of 215 in 2008. 6,147 views.
Release Date:
2008-08-07
Secunia Advisory ID:
SA31396
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for dhcp. This fixes a weakness, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for libxslt
Vendor Patch. Secunia Advisory 56 of 215 in 2008. 6,322 views.
Release Date:
2008-08-07
Secunia Advisory ID:
SA31395
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libxslt. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Gentoo update for xine-lib
Vendor Patch. Secunia Advisory 57 of 215 in 2008. 4,753 views.
Release Date:
2008-08-06
Secunia Advisory ID:
SA31372
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xine-lib. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for net-snmp
Vendor Patch. Secunia Advisory 58 of 215 in 2008. 5,087 views.
Release Date:
2008-08-06
Secunia Advisory ID:
SA31351
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for net-snmp. This fixes some vulnerabilities, which can be exploited by malicious people to spoof authenticated SNMPv3 packets or potentially to compromise a vulnerable system. [Read More]


Gentoo update for Mozilla products
Vendor Patch. Secunia Advisory 59 of 215 in 2008. 6,119 views.
Release Date:
2008-08-06
Secunia Advisory ID:
SA31377
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Exposure of sensitive information
Exposure of system information
Spoofing
Cross Site Scripting
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for various Mozilla products. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, disclose sensitive information, or potentially compromise a user's system. [Read More]


Gentoo update for wireshark
Vendor Patch. Secunia Advisory 60 of 215 in 2008. 5,525 views.
Release Date:
2008-08-06
Secunia Advisory ID:
SA31378
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information or cause a DoS (Denial of Service). [Read More]


Gentoo update for python
Vendor Patch. Secunia Advisory 61 of 215 in 2008. 6,665 views.
Release Date:
2008-08-04
Secunia Advisory ID:
SA31332
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for python. This fixes some vulnerabilities, where some have unknown impact and others can potentially be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. [Read More]


Gentoo update for vlc
Vendor Patch. Secunia Advisory 62 of 215 in 2008. 5,907 views.
Release Date:
2008-08-01
Secunia Advisory ID:
SA31317
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for vlc. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for audit
Vendor Patch. Secunia Advisory 63 of 215 in 2008. 4,775 views.
Release Date:
2008-08-01
Secunia Advisory ID:
SA31316
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for audit. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for pan
Vendor Patch. Secunia Advisory 64 of 215 in 2008. 5,038 views.
Release Date:
2008-08-01
Secunia Advisory ID:
SA31315
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for pan. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo BitchX Multiple Vulnerabilities
Unpatched. Secunia Advisory 65 of 215 in 2008. 5,119 views.
Release Date:
2008-07-22
Secunia Advisory ID:
SA31180
Solution Status:
Unpatched
Criticality:
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Gentoo has acknowledged a security issue and a vulnerability in bitchx, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to potentially compromise a user's system. [Read More]


Gentoo Bacula MySQL Director Password Disclosure Weakness
Unpatched. Secunia Advisory 66 of 215 in 2008. 4,861 views.
Release Date:
2008-07-22
Secunia Advisory ID:
SA31184
Solution Status:
Unpatched
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has acknowledged a weakness in bacula, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Gentoo update for peercast
Vendor Patch. Secunia Advisory 67 of 215 in 2008. 4,512 views.
Release Date:
2008-07-22
Secunia Advisory ID:
SA31182
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for peercast. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for mercurial
Vendor Patch. Secunia Advisory 68 of 215 in 2008. 4,185 views.
Release Date:
2008-07-16
Secunia Advisory ID:
SA31110
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for mercurial. This fixes a security issue, which can be exploited by malicious people to manipulate certain data. [Read More]


Gentoo update for bind
Vendor Patch. Secunia Advisory 69 of 215 in 2008. 5,860 views.
Release Date:
2008-07-14
Secunia Advisory ID:
SA31072
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Gentoo has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache. [Read More]


Gentoo update for nx
Vendor Patch. Secunia Advisory 70 of 215 in 2008. 6,025 views.
Release Date:
2008-07-10
Secunia Advisory ID:
SA31025
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Gentoo has issued an update for nx. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to gain escalated privileges. [Read More]


Gentoo update for openoffice and openoffice-bin
Vendor Patch. Secunia Advisory 71 of 215 in 2008. 5,034 views.
Release Date:
2008-07-10
Secunia Advisory ID:
SA31029
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for openoffice and openoffice-bin. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for apache
Vendor Patch. Secunia Advisory 72 of 215 in 2008. 8,186 views.
Release Date:
2008-07-10
Secunia Advisory ID:
SA31026
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for apache. This fixes a some vulnerabilities, which can be exploited by malicious people to conduct cross-site request forgery attacks and cause a DoS (Denial of Service). [Read More]


Gentoo update for poppler
Vendor Patch. Secunia Advisory 73 of 215 in 2008. 4,820 views.
Release Date:
2008-07-09
Secunia Advisory ID:
SA31002
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for poppler. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library. [Read More]


Gentoo update for libpcre and glib
Vendor Patch. Secunia Advisory 74 of 215 in 2008. 5,562 views.
Release Date:
2008-07-08
Secunia Advisory ID:
SA30972
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libpcre and glib. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Gentoo update for python
Vendor Patch. Secunia Advisory 75 of 215 in 2008. 6,166 views.
Release Date:
2008-07-01
Secunia Advisory ID:
SA30872
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for python. This fixes some security issues, which can potentially be exploited by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or to compromise a vulnerable system. [Read More]


Gentoo update for motion
Vendor Patch. Secunia Advisory 76 of 215 in 2008. 4,870 views.
Release Date:
2008-07-01
Secunia Advisory ID:
SA30864
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for motion. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for ibm-jdk-bin and ibm-jre-bin
Vendor Patch. Secunia Advisory 77 of 215 in 2008. 7,435 views.
Release Date:
2008-06-25
Secunia Advisory ID:
SA30780
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Exposure of system information
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ibm-jdk-bin and ibm-jre-bin. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, manipulate data, disclose sensitive/system information, cause a DoS (Denial of Service), or to compromise a vulnerable system. [Read More]


Gentoo update for libvorbis
Vendor Patch. Secunia Advisory 78 of 215 in 2008. 5,516 views.
Release Date:
2008-06-24
Secunia Advisory ID:
SA30820
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libvorbis. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise an application using the library. [Read More]


Gentoo update for freetype
Vendor Patch. Secunia Advisory 79 of 215 in 2008. 5,623 views.
Release Date:
2008-06-24
Secunia Advisory ID:
SA30819
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to compromise an application using the library. [Read More]


Gentoo update for openssl
Vendor Patch. Secunia Advisory 80 of 215 in 2008. 5,428 views.
Release Date:
2008-06-24
Secunia Advisory ID:
SA30825
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for openssl. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for xorg-server
Vendor Patch. Secunia Advisory 81 of 215 in 2008. 6,153 views.
Release Date:
2008-06-20
Secunia Advisory ID:
SA30772
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Gentoo has issued an update for xorg-server. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to gain escalated privileges. [Read More]


Gentoo update for cbrpager
Vendor Patch. Secunia Advisory 82 of 215 in 2008. 5,023 views.
Release Date:
2008-06-17
Secunia Advisory ID:
SA30701
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for cbrpager. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for evolution
Vendor Patch. Secunia Advisory 83 of 215 in 2008. 5,277 views.
Release Date:
2008-06-17
Secunia Advisory ID:
SA30702
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for evolution. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for rdesktop
Vendor Patch. Secunia Advisory 84 of 215 in 2008. 4,909 views.
Release Date:
2008-06-16
Secunia Advisory ID:
SA30713
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for rdesktop. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for imlib2
Vendor Patch. Secunia Advisory 85 of 215 in 2008. 5,206 views.
Release Date:
2008-06-09
Secunia Advisory ID:
SA30572
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for imlib2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. [Read More]


Gentoo update for libxslt
Vendor Patch. Secunia Advisory 86 of 215 in 2008. 4,888 views.
Release Date:
2008-06-04
Secunia Advisory ID:
SA30521
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libxslt. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. [Read More]


Gentoo update for mtr
Vendor Patch. Secunia Advisory 87 of 215 in 2008. 4,499 views.
Release Date:
2008-06-04
Secunia Advisory ID:
SA30522
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for mtr. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for mplayer
Vendor Patch. Secunia Advisory 88 of 215 in 2008. 5,084 views.
Release Date:
2008-05-30
Secunia Advisory ID:
SA30412
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mplayer. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for samba
Vendor Patch. Secunia Advisory 89 of 215 in 2008. 5,852 views.
Release Date:
2008-05-30
Secunia Advisory ID:
SA30396
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for roundup
Vendor Patch. Secunia Advisory 90 of 215 in 2008. 4,412 views.
Release Date:
2008-05-28
Secunia Advisory ID:
SA30274
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for roundup. This fixes some vulnerabilities and a security issue, where some have unknown impacts, while others can be exploited by malicious users to bypass certain security restrictions. [Read More]


Gentoo update for gnutls
Vendor Patch. Secunia Advisory 91 of 215 in 2008. 5,243 views.
Release Date:
2008-05-22
Secunia Advisory ID:
SA30338
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gnutls. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library. [Read More]


Gentoo Update for Mozilla Products
Vendor Patch. Secunia Advisory 92 of 215 in 2008. 8,298 views.
Release Date:
2008-05-21
Secunia Advisory ID:
SA30327
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Spoofing
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued updates for mozilla-firefox, mozilla-firefox-bin, seamonkey, seamonkey-bin, mozilla-thunderbird, mozilla-thunderbird-bin, and xulrunner. These fix some weaknesses and vulnerabilities, which can be exploited by malicious people to disclose sensitive information, conduct cross-site scripting attacks, bypass certain security restrictions, conduct spoofing attacks, or to compromise a user's system. [Read More]


Gentoo update for clamav
Vendor Patch. Secunia Advisory 93 of 215 in 2008. 6,180 views.
Release Date:
2008-05-21
Secunia Advisory ID:
SA30328
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, to cause a DoS (Denial of Service), or to compromise a vulnerable system. [Read More]


Gentoo update for perl and libperl
Vendor Patch. Secunia Advisory 94 of 215 in 2008. 5,688 views.
Release Date:
2008-05-21
Secunia Advisory ID:
SA30326
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for perl and libperl. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for libid3tag
Vendor Patch. Secunia Advisory 95 of 215 in 2008. 3,801 views.
Release Date:
2008-05-15
Secunia Advisory ID:
SA30182
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for libid3tag. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for openoffice and openoffice-bin
Vendor Patch. Secunia Advisory 96 of 215 in 2008. 4,855 views.
Release Date:
2008-05-15
Secunia Advisory ID:
SA30179
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for openoffice and openoffice-bin. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for cdf
Vendor Patch. Secunia Advisory 97 of 215 in 2008. 3,929 views.
Release Date:
2008-05-14
Secunia Advisory ID:
SA30169
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for cdf. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library. [Read More]


Gentoo update for chicken
Vendor Patch. Secunia Advisory 98 of 215 in 2008. 5,258 views.
Release Date:
2008-05-14
Secunia Advisory ID:
SA30219
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for chicken. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Gentoo update for aterm, eterm, rxvt, mrxvt, multi-aterm, wterm, and rxvt-unicode
Vendor Patch. Secunia Advisory 99 of 215 in 2008. 6,169 views.
Release Date:
2008-05-13
Secunia Advisory ID:
SA30229
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for aterm, eterm, rxvt, mrxvt, multi-aterm, wterm, and rxvt-unicode. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for blender
Vendor Patch. Secunia Advisory 100 of 215 in 2008. 4,264 views.
Release Date:
2008-05-13
Secunia Advisory ID:
SA30151
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for blender. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for ptex
Vendor Patch. Secunia Advisory 101 of 215 in 2008. 6,461 views.
Release Date:
2008-05-13
Secunia Advisory ID:
SA30168
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
System access
Where:
From remote
Short Description:
Gentoo has acknowledged some vulnerabilities in ptex, which can be exploited by malicious, local users to manipulate certain data and malicious people to compromise a user's system. [Read More]


Gentoo update for inspircd
Vendor Patch. Secunia Advisory 102 of 215 in 2008. 4,158 views.
Release Date:
2008-05-12
Secunia Advisory ID:
SA30163
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for inspircd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for pngcrush
Vendor Patch. Secunia Advisory 103 of 215 in 2008. 5,204 views.
Release Date:
2008-05-12
Secunia Advisory ID:
SA30174
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for pngcrush. This fixes a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information or potentially compromise a user's system. [Read More]


Gentoo update for firebird
Vendor Patch. Secunia Advisory 104 of 215 in 2008. 5,285 views.
Release Date:
2008-05-12
Secunia Advisory ID:
SA30162
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From local network
Short Description:
Gentoo has acknowledged a security issue in firebird, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for moinmoin
Vendor Patch. Secunia Advisory 105 of 215 in 2008. 4,230 views.
Release Date:
2008-05-12
Secunia Advisory ID:
SA30160
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for moinmoin. This fixes a vulnerability, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


Gentoo ltsp Multiple Vulnerabilities
Unpatched. Secunia Advisory 106 of 215 in 2008. 9,080 views.
Release Date:
2008-05-12
Secunia Advisory ID:
SA30161
Solution Status:
Unpatched
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Gentoo has acknowledged some vulnerabilities within the ltsp package, which can be exploited by malicious, local users to disclose potentially sensitive information, cause a DoS (Denial of Service), and gain escalated privileges, and by malicious people to cause a DoS or compromise a vulnerable system. [Read More]


Gentoo update for egroupware
Vendor Patch. Secunia Advisory 107 of 215 in 2008. 5,080 views.
Release Date:
2008-05-08
Secunia Advisory ID:
SA30073
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Gentoo has issued an update for egroupware. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system. [Read More]


Gentoo update for wireshark
Vendor Patch. Secunia Advisory 108 of 215 in 2008. 4,382 views.
Release Date:
2008-05-08
Secunia Advisory ID:
SA29971
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for horde
Vendor Patch. Secunia Advisory 109 of 215 in 2008. 5,176 views.
Release Date:
2008-05-06
Secunia Advisory ID:
SA30047
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for horde. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, and by malicious users to disclose sensitive information and potentially compromise a vulnerable system. [Read More]


Gentoo update for phpmyadmin
Vendor Patch. Secunia Advisory 110 of 215 in 2008. 4,983 views.
Release Date:
2008-05-06
Secunia Advisory ID:
SA30034
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for phpmyadmin. This fixes a vulnerability, which can be exploited by malicious users to disclose sensitive information. [Read More]


Gentoo update for kde
Vendor Patch. Secunia Advisory 111 of 215 in 2008. 6,031 views.
Release Date:
2008-04-29
Secunia Advisory ID:
SA29977
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Gentoo has issued an update for kdelibs. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or to potentially gain escalated privileges. [Read More]


Gentoo update for comix
Vendor Patch. Secunia Advisory 112 of 215 in 2008. 4,819 views.
Release Date:
2008-04-28
Secunia Advisory ID:
SA29956
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for comix. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), and by malicious people to compromise a user's system. [Read More]


Gentoo update for jrockit-jdk-bin
Vendor Patch. Secunia Advisory 113 of 215 in 2008. 7,396 views.
Release Date:
2008-04-25
Secunia Advisory ID:
SA29925
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Exposure of system information
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for jrockit-jdk-bin. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, manipulate data, disclose sensitive/system information, cause a DoS (Denial of Service), or to compromise a vulnerable system. [Read More]


Gentoo update for silc
Vendor Patch. Secunia Advisory 114 of 215 in 2008. 8,092 views.
Release Date:
2008-04-25
Secunia Advisory ID:
SA29946
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for silc. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Gentoo update for vlc
Vendor Patch. Secunia Advisory 115 of 215 in 2008. 8,881 views.
Release Date:
2008-04-24
Secunia Advisory ID:
SA29800
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for vlc. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for openfire
Vendor Patch. Secunia Advisory 116 of 215 in 2008. 8,428 views.
Release Date:
2008-04-24
Secunia Advisory ID:
SA29901
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for openfire. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for sun-jdk, sun-jre-bin, and emul-linux-x86-java
Vendor Patch. Secunia Advisory 117 of 215 in 2008. 8,113 views.
Release Date:
2008-04-21
Secunia Advisory ID:
SA29858
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Exposure of system information
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for sun-jdk, sun-jre-bin, and emul-linux-x86-java. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, manipulate data, disclose sensitive/system information, cause a DoS (Denial of Service), or to compromise a vulnerable system. [Read More]


Gentoo update for netscape-flash
Vendor Patch. Secunia Advisory 118 of 215 in 2008. 8,096 views.
Release Date:
2008-04-21
Secunia Advisory ID:
SA29865
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
System access
Where:
From remote
Short Description:
Gentoo has issued an update for netscape-flash. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, or to potentially compromise a user's system. [Read More]


Gentoo update for pdns-recursor
Vendor Patch. Secunia Advisory 119 of 215 in 2008. 5,172 views.
Release Date:
2008-04-21
Secunia Advisory ID:
SA29830
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Gentoo has issued an update for pdns-recursor. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache. [Read More]


Gentoo update for poppler
Vendor Patch. Secunia Advisory 120 of 215 in 2008. 4,252 views.
Release Date:
2008-04-21
Secunia Advisory ID:
SA29853
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for poppler. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for dbmail
Vendor Patch. Secunia Advisory 121 of 215 in 2008. 6,350 views.
Release Date:
2008-04-21
Secunia Advisory ID:
SA29937
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for dbmail. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for cups
Vendor Patch. Secunia Advisory 122 of 215 in 2008. 5,913 views.
Release Date:
2008-04-21
Secunia Advisory ID:
SA29902
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Gentoo has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for speex
Vendor Patch. Secunia Advisory 123 of 215 in 2008. 6,956 views.
Release Date:
2008-04-18
Secunia Advisory ID:
SA29866
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for speex. This fixes a security issue, which can potentially be exploited by malicious people to compromise an application using the library. [Read More]


Gentoo update for rsync
Vendor Patch. Secunia Advisory 124 of 215 in 2008. 6,078 views.
Release Date:
2008-04-17
Secunia Advisory ID:
SA29861
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for rsync. This fixes a vulnerability, which can potentially be exploited by malicious users to cause a DoS (Denial of Service) or to compromise a vulnerable system. [Read More]


Gentoo update for opera
Vendor Patch. Secunia Advisory 125 of 215 in 2008. 6,984 views.
Release Date:
2008-04-15
Secunia Advisory ID:
SA29679
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for opera. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for asterisk
Vendor Patch. Secunia Advisory 126 of 215 in 2008. 5,662 views.
Release Date:
2008-04-15
Secunia Advisory ID:
SA29782
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for asterisk. This fixes a security issue and some vulnerabilities, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for libpng
Vendor Patch. Secunia Advisory 127 of 215 in 2008. 7,047 views.
Release Date:
2008-04-15
Secunia Advisory ID:
SA29678
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libpng. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose potentially sensitive information, or potentially compromise an application using the library. [Read More]


Gentoo update for policyd-weight
Vendor Patch. Secunia Advisory 128 of 215 in 2008. 4,839 views.
Release Date:
2008-04-14
Secunia Advisory ID:
SA29738
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for policyd-weight. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for gnome-screensaver
Vendor Patch. Secunia Advisory 129 of 215 in 2008. 5,644 views.
Release Date:
2008-04-14
Secunia Advisory ID:
SA29759
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Gentoo has issued an update for gnome-screensaver. This fixes a security issue, which can be exploited by malicious people with physical access to bypass certain security restrictions. [Read More]


Gentoo update for tomcat
Vendor Patch. Secunia Advisory 130 of 215 in 2008. 8,069 views.
Release Date:
2008-04-11
Secunia Advisory ID:
SA29711
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for tomcat. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions, by malicious users to disclose potentially sensitive information, and by malicious people to manipulate certain data or to disclose sensitive information. [Read More]


Gentoo update for am-utils
Vendor Patch. Secunia Advisory 131 of 215 in 2008. 5,566 views.
Release Date:
2008-04-11
Secunia Advisory ID:
SA29694
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for am-utils. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for lighttpd
Vendor Patch. Secunia Advisory 132 of 215 in 2008. 6,400 views.
Release Date:
2008-04-11
Secunia Advisory ID:
SA29636
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for lighttpd. This fixes a security issue and a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information or cause a DoS (Denial of Service). [Read More]


Gentoo update for pecl-apc
Vendor Patch. Secunia Advisory 133 of 215 in 2008. 7,384 views.
Release Date:
2008-04-09
Secunia Advisory ID:
SA29745
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for pecl-apc. This fixes a vulnerability, which can be exploited by malicious users to bypass certain security restrictions and potentially by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for mysql
Vendor Patch. Secunia Advisory 134 of 215 in 2008. 6,390 views.
Release Date:
2008-04-07
Secunia Advisory ID:
SA29706
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Privilege escalation
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for mysql. This fixes a security issue and two vulnerabilities, which can be exploited by malicious users to gain escalated privileges, manipulate certain data, or to cause a DoS (Denial of Service). [Read More]


Gentoo update for openssh
Vendor Patch. Secunia Advisory 135 of 215 in 2008. 6,786 views.
Release Date:
2008-04-07
Secunia Advisory ID:
SA29683
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
Where:
Local system
Short Description:
Gentoo has issued an update for openssh. This fixes a weakness and a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions or to disclose sensitive information. [Read More]


Gentoo update for unzip
Vendor Patch. Secunia Advisory 136 of 215 in 2008. 6,107 views.
Release Date:
2008-04-07
Secunia Advisory ID:
SA29681
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for unzip. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for nxnode and nx
Vendor Patch. Secunia Advisory 137 of 215 in 2008. 7,449 views.
Release Date:
2008-04-07
Secunia Advisory ID:
SA29707
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Gentoo has issued an update for nxnode and nx. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to gain escalated privileges. [Read More]


Gentoo update for bzip2
Vendor Patch. Secunia Advisory 138 of 215 in 2008. 6,253 views.
Release Date:
2008-04-03
Secunia Advisory ID:
SA29656
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for bzip2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for cups
Vendor Patch. Secunia Advisory 139 of 215 in 2008. 7,532 views.
Release Date:
2008-04-02
Secunia Advisory ID:
SA29634
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for cups. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system. [Read More]


Gentoo update for wireshark
Vendor Patch. Secunia Advisory 140 of 215 in 2008. 5,401 views.
Release Date:
2008-03-25
Secunia Advisory ID:
SA29511
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for krb5
Vendor Patch. Secunia Advisory 141 of 215 in 2008. 5,772 views.
Release Date:
2008-03-25
Secunia Advisory ID:
SA29516
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. [Read More]


Gentoo update for openldap
Vendor Patch. Secunia Advisory 142 of 215 in 2008. 5,675 views.
Release Date:
2008-03-20
Secunia Advisory ID:
SA29461
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for openldap. This fixes some vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Gentoo update for viewvc
Vendor Patch. Secunia Advisory 143 of 215 in 2008. 6,937 views.
Release Date:
2008-03-20
Secunia Advisory ID:
SA29460
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for viewvc. This fixes some security issues, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo Multiple ebuilds ssl-cert eclass "docert()" Security Issue
Vendor Patch. Secunia Advisory 144 of 215 in 2008. 8,538 views.
Release Date:
2008-03-20
Secunia Advisory ID:
SA29436
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has acknowledged a security issue in multiple ebuilds, which can lead to the disclosure of sensitive information. [Read More]


Gentoo update for moinmoin
Vendor Patch. Secunia Advisory 145 of 215 in 2008. 5,002 views.
Release Date:
2008-03-19
Secunia Advisory ID:
SA29444
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for moinmoin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass security restrictions, manipulate certain data, or potentially compromise a vulnerable system. [Read More]


Gentoo update for acroread
Vendor Patch. Secunia Advisory 146 of 215 in 2008. 4,479 views.
Release Date:
2008-03-19
Secunia Advisory ID:
SA29425
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for acroread. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for dovecot
Vendor Patch. Secunia Advisory 147 of 215 in 2008. 4,789 views.
Release Date:
2008-03-18
Secunia Advisory ID:
SA29396
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for dovecot. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for libpcre and glib
Vendor Patch. Secunia Advisory 148 of 215 in 2008. 5,351 views.
Release Date:
2008-03-18
Secunia Advisory ID:
SA29282
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libpcre and glib. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. [Read More]


Gentoo update for wml
Vendor Patch. Secunia Advisory 149 of 215 in 2008. 5,049 views.
Release Date:
2008-03-17
Secunia Advisory ID:
SA29353
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for wml. This fixes some security issues, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for live
Vendor Patch. Secunia Advisory 150 of 215 in 2008. 7,112 views.
Release Date:
2008-03-14
Secunia Advisory ID:
SA29356
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for live. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for sarg
Vendor Patch. Secunia Advisory 151 of 215 in 2008. 7,224 views.
Release Date:
2008-03-13
Secunia Advisory ID:
SA29309
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
Gentoo has issued an update for sarg. This fixes some vulnerabilities, which can be exploited by malicious people to conduct script insertion attacks or to compromise a vulnerable system. [Read More]


Gentoo update for apache
Vendor Patch. Secunia Advisory 152 of 215 in 2008. 7,974 views.
Release Date:
2008-03-12
Secunia Advisory ID:
SA29348
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for apache. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and by malicious users to cause a DoS (Denial of Service). [Read More]


Gentoo update for icu
Vendor Patch. Secunia Advisory 153 of 215 in 2008. 5,352 views.
Release Date:
2008-03-12
Secunia Advisory ID:
SA29333
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for icu. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Gentoo update for pdflib
Vendor Patch. Secunia Advisory 154 of 215 in 2008. 4,891 views.
Release Date:
2008-03-11
Secunia Advisory ID:
SA29304
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for pdflib. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Gentoo update for mplayer
Vendor Patch. Secunia Advisory 155 of 215 in 2008. 6,162 views.
Release Date:
2008-03-11
Secunia Advisory ID:
SA29307
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mplayer. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for cacti
Vendor Patch. Secunia Advisory 156 of 215 in 2008. 5,539 views.
Release Date:
2008-03-11
Secunia Advisory ID:
SA29274
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for cacti. This fixes some vulnerabilities, which can be exploited by malicious people to conduct HTTP response splitting, cross-site scripting, and SQL injection attacks. [Read More]


Gentoo update for vlc
Vendor Patch. Secunia Advisory 157 of 215 in 2008. 5,548 views.
Release Date:
2008-03-10
Secunia Advisory ID:
SA29284
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for vlc. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for ghostscript
Vendor Patch. Secunia Advisory 158 of 215 in 2008. 5,872 views.
Release Date:
2008-03-10
Secunia Advisory ID:
SA29314
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for ghostscript-esp, ghostscript-gpl, and ghostscript-gnu. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for phpmyadmin
Vendor Patch. Secunia Advisory 159 of 215 in 2008. 5,558 views.
Release Date:
2008-03-10
Secunia Advisory ID:
SA29287
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for phpmyadmin. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Gentoo update for vobcopy
Vendor Patch. Secunia Advisory 160 of 215 in 2008. 4,577 views.
Release Date:
2008-03-06
Secunia Advisory ID:
SA29259
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for vobcopy. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for evolution
Vendor Patch. Secunia Advisory 161 of 215 in 2008. 4,682 views.
Release Date:
2008-03-06
Secunia Advisory ID:
SA29258
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for evolution. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for lighttpd
Vendor Patch. Secunia Advisory 162 of 215 in 2008. 4,832 views.
Release Date:
2008-03-06
Secunia Advisory ID:
SA29209
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for lighttpd. This fixes a security issue and a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information or cause a DoS (Denial of Service). [Read More]


Gentoo update for win32codecs
Vendor Patch. Secunia Advisory 163 of 215 in 2008. 6,489 views.
Release Date:
2008-03-05
Secunia Advisory ID:
SA29182
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for win32codecs. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for opera
Vendor Patch. Secunia Advisory 164 of 215 in 2008. 4,910 views.
Release Date:
2008-03-05
Secunia Advisory ID:
SA29152
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for opera. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, or to bypass certain security restrictions. [Read More]


Gentoo update for sword
Vendor Patch. Secunia Advisory 165 of 215 in 2008. 6,287 views.
Release Date:
2008-03-04
Secunia Advisory ID:
SA29181
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for sword. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Gentoo update for paramiko
Vendor Patch. Secunia Advisory 166 of 215 in 2008. 5,366 views.
Release Date:
2008-03-04
Secunia Advisory ID:
SA29168
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Gentoo has issued an update for paramiko. This fixes a weakness, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


Gentoo update for mantisbt
Vendor Patch. Secunia Advisory 167 of 215 in 2008. 5,821 views.
Release Date:
2008-03-04
Secunia Advisory ID:
SA29198
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for mantisbt. This fixes a vulnerability, which can be exploited by malicious users to conduct script insertion attacks. [Read More]


Gentoo update for splitvt
Vendor Patch. Secunia Advisory 168 of 215 in 2008. 5,933 views.
Release Date:
2008-03-04
Secunia Advisory ID:
SA29190
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for splitvt. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for acroread
Vendor Patch. Secunia Advisory 169 of 215 in 2008. 9,370 views.
Release Date:
2008-03-03
Secunia Advisory ID:
SA29205
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Exposure of system information
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
[Read More]


Gentoo update for firebird
Vendor Patch. Secunia Advisory 170 of 215 in 2008. 5,985 views.
Release Date:
2008-03-03
Secunia Advisory ID:
SA29203
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has issued an update for firebird. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Gentoo update for audacity
Vendor Patch. Secunia Advisory 171 of 215 in 2008. 5,904 views.
Release Date:
2008-03-03
Secunia Advisory ID:
SA29206
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
DoS
Where:
Local system
Short Description:
Gentoo has issued an update for audacity. This fixes a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or to delete arbitrary files and directories. [Read More]


Gentoo update for xine-lib
Vendor Patch. Secunia Advisory 172 of 215 in 2008. 7,379 views.
Release Date:
2008-02-27
Secunia Advisory ID:
SA29141
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update in xine-lib. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for asterisk
Vendor Patch. Secunia Advisory 173 of 215 in 2008. 5,147 views.
Release Date:
2008-02-27
Secunia Advisory ID:
SA29051
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for asterisk. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Gentoo update for python
Vendor Patch. Secunia Advisory 174 of 215 in 2008. 7,373 views.
Release Date:
2008-02-25
Secunia Advisory ID:
SA29085
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for python. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Gentoo udpate for clamav
Vendor Patch. Secunia Advisory 175 of 215 in 2008. 7,188 views.
Release Date:
2008-02-22
Secunia Advisory ID:
SA29060
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes some vulnerabilities, which can be exploited to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system. [Read More]


Gentoo update for boost
Vendor Patch. Secunia Advisory 176 of 215 in 2008. 6,548 views.
Release Date:
2008-02-15
Secunia Advisory ID:
SA28943
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for boost. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for pulseaudio
Vendor Patch. Secunia Advisory 177 of 215 in 2008. 5,752 views.
Release Date:
2008-02-14
Secunia Advisory ID:
SA28952
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for pulseaudio. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for gnumeric
Vendor Patch. Secunia Advisory 178 of 215 in 2008. 5,688 views.
Release Date:
2008-02-13
Secunia Advisory ID:
SA28948
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gnumeric. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for scponly
Vendor Patch. Secunia Advisory 179 of 215 in 2008. 5,801 views.
Release Date:
2008-02-13
Secunia Advisory ID:
SA28944
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Gentoo has issued an update for scponly. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Gentoo update for gallery
Vendor Patch. Secunia Advisory 180 of 215 in 2008. 6,578 views.
Release Date:
2008-02-12
Secunia Advisory ID:
SA28898
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for gallery. This fixes a weakness and some vulnerabilities, where some have unspecified impacts and others can be exploited by malicious users or malicious people to disclose sensitive information, conduct cross-site scripting attacks, bypass certain security restrictions, and potentially compromise a vulnerable system. [Read More]


Gentoo update for horde-imp
Vendor Patch. Secunia Advisory 181 of 215 in 2008. 4,228 views.
Release Date:
2008-02-12
Secunia Advisory ID:
SA28897
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Gentoo has issued an update for horde-imp. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions and manipulate data. [Read More]


Gentoo doomsday Multiple Vulnerabilities
Unpatched. Secunia Advisory 182 of 215 in 2008. 5,938 views.
Release Date:
2008-02-07
Secunia Advisory ID:
SA28821
Solution Status:
Unpatched
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has acknowledged some vulnerabilities in doomsday, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Gentoo update for sdl-image
Vendor Patch. Secunia Advisory 183 of 215 in 2008. 6,407 views.
Release Date:
2008-02-07
Secunia Advisory ID:
SA28830
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for sdl-image. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Gentoo update for kazehakase
Vendor Patch. Secunia Advisory 184 of 215 in 2008. 9,606 views.
Release Date:
2008-01-31
Secunia Advisory ID:
SA28720
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for kazehakase. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose potentially sensitive information, and compromise a user's system. [Read More]


Gentoo update for goffice
Vendor Patch. Secunia Advisory 185 of 215 in 2008. 9,874 views.
Release Date:
2008-01-31
Secunia Advisory ID:
SA28714
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for goffice. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose potentially sensitive information, and compromise a vulnerable system. [Read More]


Gentoo update for xdg-utils
Vendor Patch. Secunia Advisory 186 of 215 in 2008. 17,941 views.
Release Date:
2008-01-31
Secunia Advisory ID:
SA28728
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xdg-utils. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for peercast
Vendor Patch. Secunia Advisory 187 of 215 in 2008. 6,951 views.
Release Date:
2008-01-31
Secunia Advisory ID:
SA28719
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for peercast. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially to compromise a vulnerable system. [Read More]


Gentoo update for libxml2
Vendor Patch. Secunia Advisory 188 of 215 in 2008. 15,791 views.
Release Date:
2008-01-31
Secunia Advisory ID:
SA28716
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for netkit-ftpd
Vendor Patch. Secunia Advisory 189 of 215 in 2008. 6,628 views.
Release Date:
2008-01-30
Secunia Advisory ID:
SA28697
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has acknowledged a vulnerability in netkit-ftpd, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Gentoo update for maradns
Vendor Patch. Secunia Advisory 190 of 215 in 2008. 6,092 views.
Release Date:
2008-01-30
Secunia Advisory ID:
SA28650
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for maradns. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for postgresql
Vendor Patch. Secunia Advisory 191 of 215 in 2008. 7,223 views.
Release Date:
2008-01-29
Secunia Advisory ID:
SA28679
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for postgresql. This fixes some vulnerabilities, which can be exploited by malicious users to gain escalated privileges or to cause a DoS (Denial of Service). [Read More]


Gentoo update for ngircd
Vendor Patch. Secunia Advisory 192 of 215 in 2008. 20,179 views.
Release Date:
2008-01-28
Secunia Advisory ID:
SA28673
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for ngircd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for xine-lib
Vendor Patch. Secunia Advisory 193 of 215 in 2008. 6,475 views.
Release Date:
2008-01-28
Secunia Advisory ID:
SA28674
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for xine-lib. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for blam
Vendor Patch. Secunia Advisory 194 of 215 in 2008. 9,304 views.
Release Date:
2008-01-28
Secunia Advisory ID:
SA28672
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for blam. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Gentoo update for cherrypy
Vendor Patch. Secunia Advisory 195 of 215 in 2008. 6,877 views.
Release Date:
2008-01-28
Secunia Advisory ID:
SA28620
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Gentoo has issued an update for cherrypy. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Gentoo update for tikiwiki
Vendor Patch. Secunia Advisory 196 of 215 in 2008. 6,992 views.
Release Date:
2008-01-24
Secunia Advisory ID:
SA28602
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Cross Site Scripting
Where:
From remote
Short Description:
Gentoo has issued an update for tikiwiki. This fixes some vulnerabilities, where some have unknown impacts and others can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Gentoo update for xorg-server and libxfont
Vendor Patch. Secunia Advisory 197 of 215 in 2008. 11,754 views.
Release Date:
2008-01-21
Secunia Advisory ID:
SA28273
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Gentoo has issued an update for xorg-server and libxfont. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to gain escalated privileges. [Read More]


Gentoo update for netscape-flash
Vendor Patch. Secunia Advisory 198 of 215 in 2008. 7,275 views.
Release Date:
2008-01-21
Secunia Advisory ID:
SA28570
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for netscape-flash. This fixes some vulnerabilities, where one vulnerability has an unknown impact and others can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP request splitting attacks, disclose sensitive information, cause a Denial of Service (DoS), or to potentially compromise a user's system. [Read More]


Gentoo update for libcdio
Vendor Patch. Secunia Advisory 199 of 215 in 2008. 11,438 views.
Release Date:
2008-01-21
Secunia Advisory ID:
SA28569
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libcdio. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for R
Vendor Patch. Secunia Advisory 200 of 215 in 2008. 16,477 views.
Release Date:
2008-01-10
Secunia Advisory ID:
SA28406
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for R. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose sensitive information, or potentially compromise an application using the library. [Read More]


Gentoo update for squid
Vendor Patch. Secunia Advisory 201 of 215 in 2008. 6,498 views.
Release Date:
2008-01-10
Secunia Advisory ID:
SA28403
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for squid. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for claws-mail
Vendor Patch. Secunia Advisory 202 of 215 in 2008. 5,730 views.
Release Date:
2008-01-10
Secunia Advisory ID:
SA28402
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Gentoo has issued an update for claws-mail. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Gentoo update for openafs
Vendor Patch. Secunia Advisory 203 of 215 in 2008. 5,793 views.
Release Date:
2008-01-10
Secunia Advisory ID:
SA28401
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for openafs. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Gentoo update for unp
Vendor Patch. Secunia Advisory 204 of 215 in 2008. 6,612 views.
Release Date:
2008-01-09
Secunia Advisory ID:
SA28388
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for unp. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for libexif
Vendor Patch. Secunia Advisory 205 of 215 in 2008. 7,750 views.
Release Date:
2008-01-02
Secunia Advisory ID:
SA28266
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for libexif. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise an application using the library. [Read More]


Gentoo update for emul-linux-x86-gtklibs
Vendor Patch. Secunia Advisory 206 of 215 in 2008. 7,627 views.
Release Date:
2008-01-02
Secunia Advisory ID:
SA28289
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for emul-linux-x86-gtklibs. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. [Read More]


Gentoo update for opera
Vendor Patch. Secunia Advisory 207 of 215 in 2008. 7,510 views.
Release Date:
2008-01-02
Secunia Advisory ID:
SA28290
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Gentoo has issued an update for opera. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, and compromise a user's system. [Read More]


Gentoo update for wireshark
Vendor Patch. Secunia Advisory 208 of 215 in 2008. 8,097 views.
Release Date:
2008-01-02
Secunia Advisory ID:
SA28288
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Gentoo has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for openoffice, openoffice-bin, and hsqldb
Vendor Patch. Secunia Advisory 209 of 215 in 2008. 7,046 views.
Release Date:
2008-01-02
Secunia Advisory ID:
SA28286
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Gentoo has issued an update for openoffice, openoffice-bin, and hsqldb. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Gentoo update for mozilla-firefox/-bin and seamonkey/-bin
Vendor Patch. Secunia Advisory 210 of 215 in 2008. 8,106 views.
Release Date:
2008-01-02
Secunia Advisory ID:
SA28277
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for mozilla-firefox, mozilla-firefox-bin, seamonkey, and seamonkey-bin. This fixes a security issue and some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks and potentially compromise a user's system. [Read More]


Gentoo update for syslog-ng
Vendor Patch. Secunia Advisory 211 of 215 in 2008. 7,444 views.
Release Date:
2008-01-02
Secunia Advisory ID:
SA28279
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Gentoo has issued an update for syslog-ng. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Gentoo update for exiftags
Vendor Patch. Secunia Advisory 212 of 215 in 2008. 7,145 views.
Release Date:
2008-01-02
Secunia Advisory ID:
SA28268
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for exiftags. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Gentoo update for mt-daapd
Vendor Patch. Secunia Advisory 213 of 215 in 2008. 8,990 views.
Release Date:
2008-01-02
Secunia Advisory ID:
SA28269
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Gentoo has acknowledged some vulnerabilities mt-daapd, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Gentoo update for exiv2
Vendor Patch. Secunia Advisory 214 of 215 in 2008. 7,278 views.
Release Date:
2008-01-02
Secunia Advisory ID:
SA28267
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for exiv2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library. [Read More]


Gentoo update for clamav
Vendor Patch. Secunia Advisory 215 of 215 in 2008. 8,202 views.
Release Date:
2008-01-02
Secunia Advisory ID:
SA28278
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
DoS
System access
Where:
From remote
Short Description:
Gentoo has issued an update for clamav. This fixes some vulnerabilities, where one vulnerability has an unknown impact and others can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Gentoo Linux 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer