Filters

Open Source Development Team Sthttpdthttpd.c in sthttpd before 2.26.4-r2 and thttpd 2.25b use world-readable permissions for /var/log/th…

2.1
First published (updated )

Gentoo LogrotateRace Condition

1.9
First published (updated )

Gentoo LogrotateA denial of service flaw was found in the way the logrotate utility performed arguments sanitization…

1.9
First published (updated )

Zoneminder ZoneminderZoneMinder 1.23.3 on Gentoo Linux uses 0644 permissions for /etc/zm.conf, which allows local users t…

2.1
First published (updated )

Gentoo CmanThe (1) fence_apc and (2) fence_apc_snmp programs, as used in (a) fence 2.02.00-r1 and possibly (b) …

1.9
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Gentoo Php ToolkitInput Validation

3.6
First published (updated )

Gentoo LinuxThe docert function in ssl-cert.eclass, when used by src_compile or src_install on Gentoo Linux, sto…

1.9
First published (updated )

Gentoo PortageInfoleak

2.1
First published (updated )

Paul Vixie Vixie CronVixie Cron before 4.1-r10 on Gentoo Linux is installed with insecure permissions, which allows local…

2.1
First published (updated )

Redhat Enterprise LinuxThe DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink…

2.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Gentoo Rootkit HunterThe (1) check_update.sh and (2) rkhunter script in Rootkit Hunter before 1.2.3-r1 create temporary f…

2.1
First published (updated )

FreeBSD FreeBSDRace Condition

3.7
First published (updated )

Debian Tetex-binThe xdvizilla script in tetex-bin 2.0.2 creates temporary files with predictable file names, which a…

2.1
First published (updated )

Debian Debian Linuxmain.c in cscope 15-4 and 15-5 creates temporary files with predictable filenames, which allows loca…

2.1
First published (updated )

Jean-jacques Sarton MtinkThe mtink status monitor before 1.0.5 for Epson printers allows local users to overwrite arbitrary f…

2.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Gentoo Linuxdispatch-conf in Portage 2.0.51-r2 and earlier allows local users to overwrite arbitrary files via a…

2.1
First published (updated )

Gentoo Linuxqpkg in Gentoolkit 0.2.0_pre10 and earlier allows local users to overwrite arbitrary files via a sym…

2.1
First published (updated )

Thibault Godouet FCronFcron 2.0.1, 2.9.4, and possibly earlier versions leak file descriptors of open files, which allows …

2.1
First published (updated )

Thibault Godouet FCronfcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to delete arbitr…

2.1
First published (updated )

Thibault Godouet FCronfcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to gain sensitiv…

2.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

OpenSSL OpenSSLThe der_chop script in the openssl package in Trustix Secure Linux 1.5 through 2.1 and other operati…

2.1
First published (updated )

Lvm Logical Volume Management UtilitiesThe lvmcreate_initrd script in the lvm package in Trustix Secure Linux 1.5 through 2.1, and possibly…

2.1
First published (updated )

Ubuntu Ubuntu LinuxThe groffer script in the Groff package 1.18 and later versions, as used in Trustix Secure Linux 1.5…

2.1
First published (updated )

Getmail Getmailgetmail 4.x before 4.2.0, when run as root, allows local users to overwrite arbitrary files via a sy…

1.2
First published (updated )

Getmail Getmailgetmail 4.x before 4.2.0, and other versions before 3.2.5, when run as root, allows local users to w…

2.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Trustix Secure LinuxFloating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit b…

2.1
First published (updated )

Redhat Enterprise LinuxUnknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, suc…

2.1
First published (updated )

Linux Linux kernelLinux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash),…

2.1
First published (updated )

Linux Linux kernelBuffer Overflow

2.1
First published (updated )

Midnight Commander Midnight CommanderMultiple vulnerabilities in Midnight Commander (mc) before 4.6.0, with unknown impact, related to "I…

2.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

The Pax Team Pax LinuxThe arch_get_unmapped_area function in mmap.c in the PaX patches for Linux kernel 2.6, when Address …

2.1
First published (updated )

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203