Buffer overflow in pcdsvgaview in xpcd 2.08 allows local users to execute arbitrary code
Reporter | Title | Published | Views | Family All 13 |
---|---|---|---|---|
![]() | CVE-2005-0074 | 11 Feb 200505:00 | – | cvelist |
![]() | FreeBSD : xpcd -- buffer overflow (d337b206-200f-11dc-a197-0011098b2f36) | 14 Oct 201100:00 | – | nessus |
![]() | Debian DSA-676-1 : xpcd - buffer overflow | 11 Feb 200500:00 | – | nessus |
![]() | Debian: Security Advisory (DSA-676-1) | 17 Jan 200800:00 | – | openvas |
![]() | FreeBSD Ports: xpcd | 4 Sep 200800:00 | – | openvas |
![]() | Debian Security Advisory DSA 676-1 (xpcd) | 17 Jan 200800:00 | – | openvas |
![]() | FreeBSD Ports: xpcd | 4 Sep 200800:00 | – | openvas |
![]() | xpcd -- buffer overflow | 11 Feb 200500:00 | – | freebsd |
![]() | CVE-2005-0074 | 11 Feb 200505:00 | – | nvd |
![]() | [SECURITY] [DSA 676-1] New xpcd packages fix arbitrary code execution as root | 11 Feb 200510:29 | – | debian |
Source | Link |
---|---|
debian | www.debian.org/security/2005/dsa-676 |
secunia | www.secunia.com/advisories/14250 |
secunia | www.secunia.com/advisories/14248 |
securitytracker | www.securitytracker.com/id |
securityfocus | www.securityfocus.com/bid/12523 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo