WML packages fix insecure temporary files, preventing local denial of servic
Reporter | Title | Published | Views | Family All 28 |
---|---|---|---|---|
OpenVAS | Mandriva Update for wml MDVSA-2008:076 (wml) | 9 Apr 200900:00 | – | openvas |
OpenVAS | Gentoo Security Advisory GLSA 200803-23 (wml) | 24 Sep 200800:00 | – | openvas |
OpenVAS | Debian Security Advisory DSA 1492-1 (wml) | 15 Feb 200800:00 | – | openvas |
OpenVAS | Gentoo Security Advisory GLSA 200803-23 (wml) | 24 Sep 200800:00 | – | openvas |
OpenVAS | Mandriva Update for wml MDVSA-2008:076 (wml) | 9 Apr 200900:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-1492-1) | 15 Feb 200800:00 | – | openvas |
OSV | wml | 10 Feb 200800:00 | – | osv |
Tenable Nessus | GLSA-200803-23 : Website META Language: Insecure temporary file usage | 17 Mar 200800:00 | – | nessus |
Tenable Nessus | Mandriva Linux Security Advisory : wml (MDVSA-2008:076) | 23 Apr 200900:00 | – | nessus |
Tenable Nessus | Debian DSA-1492-1 : wml - insecure temporary files | 11 Feb 200800:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 4 | hppa | wml | 2.0.11-1etch1 | wml_2.0.11-1etch1_hppa.deb |
Debian | 4 | mips | wml | 2.0.11-1etch1 | wml_2.0.11-1etch1_mips.deb |
Debian | 4 | ia64 | wml | 2.0.11-1etch1 | wml_2.0.11-1etch1_ia64.deb |
Debian | 4 | s390 | wml | 2.0.11-1etch1 | wml_2.0.11-1etch1_s390.deb |
Debian | 4 | sparc | wml | 2.0.11-1etch1 | wml_2.0.11-1etch1_sparc.deb |
Debian | 4 | mipsel | wml | 2.0.11-1etch1 | wml_2.0.11-1etch1_mipsel.deb |
Debian | 4 | all | wml | 2.0.11-1etch1 | wml_2.0.11-1etch1_all.deb |
Debian | 4 | amd64 | wml | 2.0.11-1etch1 | wml_2.0.11-1etch1_amd64.deb |
Debian | 4 | powerpc | wml | 2.0.11-1etch1 | wml_2.0.11-1etch1_powerpc.deb |
Debian | 4 | i386 | wml | 2.0.11-1etch1 | wml_2.0.11-1etch1_i386.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo