Gentoo Essential and Critical Security Patch Updates - Page 139
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
xine-lib is vulnerable to a buffer overflow in the Real Media input plugin, which could lead to the execution of arbitrary code.
The wv library is vulnerable to multiple integer overflows which could lead to the execution of arbitrary code.
ProFTPD is affected by mutiple vulnerabilities allowing for the remote execution of arbitrary code.
A flaw in OpenLDAP allows remote unauthenticated attackers to cause a Denial of Service.
LHa is affected by several vulnerabilities including the remote execution of arbitrary code.
Mono is vulnerable to linking attacks, potentially allowing a local user to overwrite arbitrary files.
Ingo H3 is vulnerable to arbitrary shell command execution when handling procmail rules.
Kile uses default permissions for backup files, potentially leading to information disclosure.
GNU gv improperly handles user-supplied data possibly allowing for the execution of arbitrary code.
ImageMagick improperly handles PALM and DCM images, potentially resulting in the execution of arbitrary code.
Multiple buffer overflows have been reported in TIN, possibly leading to the execution of arbitrary code.
A flaw in fvwm-menu-directory may permit a local attacker to execute arbitrary commands with the privileges of another user.
Texinfo is vulnerable to a buffer overflow that could lead to the execution of arbitrary code.
qmailAdmin is vulnerable to a buffer overflow that could lead to the remote execution of arbitrary code.
TORQUE creates temporary files in an insecure manner which could lead to the execution of arbitrary code with elevated privileges.
The Ruby cgi.rb CGI library is vulnerable to a Denial of Service attack.
TikiWiki allows for the disclosure of MySQL database authentication credentials and for cross-site scripting attacks.
Flaws in WordPress allow a Denial of Service, the disclosure of user metadata and the overwriting of restricted files.
A vulnerability in libpng may allow a remote attacker to crash applications that handle untrusted images.
RPM is vulnerable to a buffer overflow and possibly the execution of arbitrary code when opening specially crafted packages.