LPRng package fixed insecure temporary file creation issue for debugging in PostScript format.
Reporter | Title | Published | Views | Family All 14 |
---|---|---|---|---|
RedHat Linux | (RHSA-2003:150) LPRng security update | 22 May 200300:00 | – | redhat |
CVE | CVE-2003-0136 | 5 May 200304:00 | – | cve |
securityvulns | [SECURITY] [DSA 285-1] New lprng packages fix insecure temporary file creation | 15 Apr 200300:00 | – | securityvulns |
Tenable Nessus | RHEL 2.1 : LPRng (RHSA-2003:150) | 6 Jul 200400:00 | – | nessus |
Tenable Nessus | Mandrake Linux Security Advisory : LPRng (MDKSA-2003:060) | 31 Jul 200400:00 | – | nessus |
Tenable Nessus | Debian DSA-285-1 : lprng - insecure temporary file | 29 Sep 200400:00 | – | nessus |
Veracode | Arbitrary File Write | 6 Dec 202003:24 | – | veracode |
OSV | lprng - insecure temporary file | 14 Apr 200300:00 | – | osv |
OpenVAS | Debian Security Advisory DSA 285-1 (lprng) | 17 Jan 200800:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-285) | 17 Jan 200800:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 3 | arm | lprng | 3.8.10-1.2 | lprng_3.8.10-1.2_arm.deb |
Debian | 3 | ia64 | lprng | 3.8.10-1.2 | lprng_3.8.10-1.2_ia64.deb |
Debian | 3 | mips | lprng | 3.8.10-1.2 | lprng_3.8.10-1.2_mips.deb |
Debian | 3 | all | lprng-doc | 3.8.10-1.2 | lprng-doc_3.8.10-1.2_all.deb |
Debian | 3 | alpha | lprng | 3.8.10-1.2 | lprng_3.8.10-1.2_alpha.deb |
Debian | 3 | all | lprng | 3.8.10-1.2 | lprng_3.8.10-1.2_all.deb |
Debian | 3 | i386 | lprng | 3.8.10-1.2 | lprng_3.8.10-1.2_i386.deb |
Debian | 3 | hppa | lprng | 3.8.10-1.2 | lprng_3.8.10-1.2_hppa.deb |
Debian | 3 | mipsel | lprng | 3.8.10-1.2 | lprng_3.8.10-1.2_mipsel.deb |
Debian | 3 | powerpc | lprng | 3.8.10-1.2 | lprng_3.8.10-1.2_powerpc.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo