Gentoo Linux Distribution - Page 150
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Clam AntiVirus is vulnerable to a Denial of Service attack when processing certain Quantum archives.
A vulnerability in sudo may allow local users to elevate privileges.
Trac may allow remote attackers to upload files, possibly leading to the execution of arbitrary code.
Cacti is vulnerable to several SQL injection and file inclusion vulnerabilities.
Squirrelmail is vulnerable to several cross-site scripting vulnerabilities which could lead to a compromise of webmail accounts.
A flaw in Tor may allow the disclosure of arbitrary memory portions.
SpamAssassin and Vipul's Razor are vulnerable to a Denial of Service attack when handling certain malformed messages.
cpio contains a flaw which may allow a specially crafted cpio archive to extract files to an arbitrary directory.
PeerCast suffers from a format string vulnerability that could allow arbitrary code execution.
Sun's and Blackdown's JDK or JRE may allow untrusted applets to elevate their privileges.
The webapp-config utility insecurely creates temporary files in a world writable directory, potentially allowing the execution of arbitrary commands. [More...]
MediaWiki is vulnerable to a cross-site scripting attack that could allow arbitrary scripting code execution.
Gaim contains two remote Denial of Service vulnerabilities.
LutelWall is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files.
gedit suffers from a format string vulnerability that could allow arbitrary code execution.
GNU shtool and ocaml-mysql are vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files.
A format string vulnerability in Ettercap could allow a remote attacker to execute arbitrary code.
libextractor is affected by several overflow vulnerabilities in the PDF, Real and PNG extractors, making it vulnerable to execution of arbitrary code. [More...]
Executable files with insecure permissions can be modified causing an unsuspecting user to run arbitrary code.
Wordpress contains SQL injection and XSS vulnerabilities.
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.