Filters

Redhat Openstack PlatformPrefix Truncation Attacks in SSH Specification (Terrapin Attack)

First published (updated )

Gentoo PortageRace Condition

First published (updated )

Jabberd2 Jabberd2The Gentoo net-im/jabberd2 package through 2.6.1 sets the ownership of /var/run/jabber to the jabber…

First published (updated )

Gentoo Dev-python-flowerRace Condition

First published (updated )

Gentoo Xdg-utilsCommand Injection

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Transmissionbt TransmissionInteger Overflow

First published (updated )

Gentoo NullmailerThe Gentoo Nullmailer package before 1.11-r2 uses world-readable permissions for /etc/nullmailer/rem…

First published (updated )

MediaWiki MediaWikiXSS

First published (updated )

MediaWiki MediaWikiMediaWiki before 1.19.6 and 1.20.x before 1.20.5 does not allow extensions to prevent password chang…

First published (updated )

Aircrack-ng Aircrack-ngBuffer Overflow

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Gentoo WebminCSRF

First published (updated )

Gentoo Webminfile/edit_html.cgi in Webmin 1.590 and earlier does not perform an authorization check before showin…

First published (updated )

Gentoo Webminfile/show.cgi in Webmin 1.590 and earlier allows remote authenticated users to execute arbitrary com…

First published (updated )

Gentoo WebminInput Validation

First published (updated )

Gentoo LogrotateThe default configuration of logrotate on SUSE openSUSE Factory uses root privileges to process file…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Gentoo LogrotateThe default configuration of logrotate on Gentoo Linux uses root privileges to process files in dire…

First published (updated )

Gentoo LogrotateThe default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in …

First published (updated )

Gentoo LogrotateInput Validation, Command Injection

First published (updated )

Glyphandcog XpdfreaderCode Injection

First published (updated )

Gentoo PortageMultiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Firebird FirebirdThe default configuration of Firebird before 2.0.3.12981.0-r6 on Gentoo Linux sets the ISC_PASSWORD …

First published (updated )

Viewvc ViewvcInfoleak

First published (updated )

Viewvc ViewvcInfoleak

First published (updated )

Viewvc ViewvcInfoleak

First published (updated )

redhat/1.0.2Input Validation

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Gentoo Mldonkey EbuildThe Gentoo ebuild of MLDonkey before 2.9.0-r3 has a p2p user account with an empty default password …

First published (updated )

Gentoo NvclockThe set_default_speeds function in backend/backend.c in NVidia NVClock before 0.8b2 allows local use…

First published (updated )

Gentoo LinuxThe Linux Security Auditing Tool (LSAT) allows local users to overwrite arbitrary files via a symlin…

First published (updated )

WordPress WordPressXSS

First published (updated )

Gentoo LinuxThe gencert.sh script, when installing OpenLDAP before 2.1.30-r10, 2.2.x before 2.2.28-r7, and 2.3.x…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Gentoo Media-libs JpegThe JPEG library in media-libs/jpeg before 6b-r7 on Gentoo Linux is built without the -maxmem featur…

First published (updated )

Gentoo LinuxBuffer Overflow

First published (updated )

Gentoo App-crypt PinentryThe ebuild for pinentry before 0.7.2-r2 on Gentoo Linux sets setgid bits for pinentry programs, whic…

First published (updated )

Debian Debian LinuxXpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and oth…

First published (updated )

Debian Debian LinuxInteger Overflow

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Gentoo Linux EixSecond-order symlink vulnerability in eix-sync.in in Ebuild IndeX (eix) before 0.5.0_pre2 allows loc…

First published (updated )

Debian Debian LinuxXSS

First published (updated )

Lbl TcpdumpThe bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the dec…

First published (updated )

Gentoo Linux Webapp-configThe fn_show_postinst function in Gentoo webapp-config before 1.10-r14 allows local users to overwrit…

First published (updated )

Igor Khasilev Oops Proxy ServerFormat string vulnerability in the my_xlog function in lib.c for Oops! Proxy Server 1.5.23 and earli…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Sylpheed SylpheedBuffer Overflow

First published (updated )

Wpa Supplicant Wpa SupplicantBuffer Overflow

First published (updated )

Gentoo WebminThe ebuild of Webmin before 1.170-r3 on Gentoo Linux includes the encrypted root password in the min…

First published (updated )

Midnight Commander Midnight CommanderMidnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service (inf…

First published (updated )

Midnight Commander Midnight Commanderdirentry.c in Midnight Commander (mc) 4.5.55 and earlier allows attackers to cause a denial of servi…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Midnight Commander Midnight CommanderMidnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service by t…

First published (updated )

Midnight Commander Midnight CommanderMidnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service via …

First published (updated )

Midnight Commander Midnight CommanderMidnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service via …

First published (updated )

Midnight Commander Midnight CommanderMidnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service by c…

First published (updated )

Gentoo LinuxPortage before 2.0.50-r3 allows local users to overwrite arbitrary files via a hard link attack on t…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203