New gforge packages fix insecure temporary files. Upgrade to gforge version 4.5.14-22etch8 to fix potential arbitrary file overwrite vulnerability
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | Debian Security Advisory DSA 1577-1 (gforge) | 27 May 200800:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-1577-1) | 27 May 200800:00 | – | openvas |
![]() | CVE-2008-0167 | 18 May 200800:00 | – | ubuntucve |
![]() | CVE-2008-0167 | 18 May 200814:20 | – | cve |
![]() | Design/Logic Flaw | 18 May 200814:20 | – | prion |
![]() | CVE-2008-0167 | 18 May 200814:00 | – | cvelist |
![]() | Debian DSA-1577-1 : gforge - insecure temporary files | 19 May 200800:00 | – | nessus |
![]() | CVE-2008-0167 | 18 May 200814:20 | – | nvd |
![]() | phpQLAdmin 2.2.7 - Multiple Remote File Inclusions | 22 Feb 200800:00 | – | exploitdb |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 4 | all | gforge-shell-postgresql | 4.5.14-22etch8 | gforge-shell-postgresql_4.5.14-22etch8_all.deb |
Debian | 4 | all | gforge | 4.5.14-22etch8 | gforge_4.5.14-22etch8_all.deb |
Debian | 4 | all | gforge-lists-mailman | 4.5.14-22etch8 | gforge-lists-mailman_4.5.14-22etch8_all.deb |
Debian | 4 | all | gforge-mta-exim4 | 4.5.14-22etch8 | gforge-mta-exim4_4.5.14-22etch8_all.deb |
Debian | 4 | all | gforge-dns-bind9 | 4.5.14-22etch8 | gforge-dns-bind9_4.5.14-22etch8_all.deb |
Debian | 4 | all | gforge-mta-courier | 4.5.14-22etch8 | gforge-mta-courier_4.5.14-22etch8_all.deb |
Debian | 4 | all | gforge-mta-postfix | 4.5.14-22etch8 | gforge-mta-postfix_4.5.14-22etch8_all.deb |
Debian | 4 | all | gforge-web-apache | 4.5.14-22etch8 | gforge-web-apache_4.5.14-22etch8_all.deb |
Debian | 4 | all | gforge-ftp-proftpd | 4.5.14-22etch8 | gforge-ftp-proftpd_4.5.14-22etch8_all.deb |
Debian | 4 | all | gforge-mta-exim | 4.5.14-22etch8 | gforge-mta-exim_4.5.14-22etch8_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo