Libgtop packages fixed buffer overflow vulnerability allowing arbitrary code execution.
Reporter | Title | Published | Views | Family All 12 |
---|---|---|---|---|
Cvelist | CVE-2001-0928 | 2 Feb 200205:00 | – | cvelist |
OpenVAS | Debian Security Advisory DSA 301-1 (libgtop) | 17 Jan 200800:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-301) | 17 Jan 200800:00 | – | openvas |
OpenVAS | Debian Security Advisory DSA 098-1 (libgtop) | 17 Jan 200800:00 | – | openvas |
OpenVAS | Debian Security Advisory DSA 098-1 (libgtop) | 17 Jan 200800:00 | – | openvas |
OSV | libgtop - buffer overflow | 7 May 200300:00 | – | osv |
NVD | CVE-2001-0928 | 28 Nov 200105:00 | – | nvd |
Tenable Nessus | Mandrake Linux Security Advisory : libgtop (MDKSA-2001:094) | 31 Jul 200400:00 | – | nessus |
Tenable Nessus | Debian DSA-301-1 : libgtop - buffer overflow | 29 Sep 200400:00 | – | nessus |
Tenable Nessus | Debian DSA-098-1 : libgtop - format string vulnerability and buffer overflow | 29 Sep 200400:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 3 | m68k | libgtop-daemon | 1.0.13-3.1 | libgtop-daemon_1.0.13-3.1_m68k.deb |
Debian | 3 | mipsel | libgtop1 | 1.0.13-3.1 | libgtop1_1.0.13-3.1_mipsel.deb |
Debian | 3 | i386 | libgtop-dev | 1.0.13-3.1 | libgtop-dev_1.0.13-3.1_i386.deb |
Debian | 3 | i386 | libgtop-daemon | 1.0.13-3.1 | libgtop-daemon_1.0.13-3.1_i386.deb |
Debian | 3 | m68k | libgtop1 | 1.0.13-3.1 | libgtop1_1.0.13-3.1_m68k.deb |
Debian | 3 | hppa | libgtop-dev | 1.0.13-3.1 | libgtop-dev_1.0.13-3.1_hppa.deb |
Debian | 3 | powerpc | libgtop-daemon | 1.0.13-3.1 | libgtop-daemon_1.0.13-3.1_powerpc.deb |
Debian | 3 | mips | libgtop1 | 1.0.13-3.1 | libgtop1_1.0.13-3.1_mips.deb |
Debian | 3 | s390 | libgtop-dev | 1.0.13-3.1 | libgtop-dev_1.0.13-3.1_s390.deb |
Debian | 3 | arm | libgtop-dev | 1.0.13-3.1 | libgtop-dev_1.0.13-3.1_arm.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo