Update Midnight Commander to fix buffer overflows, insecure file creations, and format string issues.
Reporter | Title | Published | Views | Family All 40 |
---|---|---|---|---|
OpenVAS | Gentoo Security Advisory GLSA 200405-21 (MC) | 24 Sep 200800:00 | – | openvas |
OpenVAS | Slackware Advisory SSA:2004-136-01 mc | 11 Sep 201200:00 | – | openvas |
OpenVAS | FreeBSD Ports: mc | 4 Sep 200800:00 | – | openvas |
OpenVAS | Debian Security Advisory DSA 497-1 (mc) | 17 Jan 200800:00 | – | openvas |
OpenVAS | Gentoo Security Advisory GLSA 200405-21 (MC) | 24 Sep 200800:00 | – | openvas |
OpenVAS | FreeBSD Ports: mc | 4 Sep 200800:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-497) | 17 Jan 200800:00 | – | openvas |
OpenVAS | Slackware: Security Advisory (SSA:2004-136-01) | 10 Sep 201200:00 | – | openvas |
OSV | mc - several vulnerabilities | 29 Apr 200400:00 | – | osv |
Tenable Nessus | Debian DSA-497-1 : mc - several vulnerabilities | 29 Sep 200400:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 3 | ia64 | gmc | 4.5.55-1.2woody3 | gmc_4.5.55-1.2woody3_ia64.deb |
Debian | 3 | all | mc | 4.5.55-1.2woody3 | mc_4.5.55-1.2woody3_all.deb |
Debian | 3 | arm | mc | 4.5.55-1.2woody3 | mc_4.5.55-1.2woody3_arm.deb |
Debian | 3 | powerpc | mc-common | 4.5.55-1.2woody3 | mc-common_4.5.55-1.2woody3_powerpc.deb |
Debian | 3 | hppa | gmc | 4.5.55-1.2woody3 | gmc_4.5.55-1.2woody3_hppa.deb |
Debian | 3 | sparc | gmc | 4.5.55-1.2woody3 | gmc_4.5.55-1.2woody3_sparc.deb |
Debian | 3 | hppa | mc-common | 4.5.55-1.2woody3 | mc-common_4.5.55-1.2woody3_hppa.deb |
Debian | 3 | alpha | mc | 4.5.55-1.2woody3 | mc_4.5.55-1.2woody3_alpha.deb |
Debian | 3 | m68k | mc-common | 4.5.55-1.2woody3 | mc-common_4.5.55-1.2woody3_m68k.deb |
Debian | 3 | m68k | mc | 4.5.55-1.2woody3 | mc_4.5.55-1.2woody3_m68k.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo