Lucene search

K

[SECURITY] [DSA 564-1] New mpg123 packages fix arbitrary code exceution

🗓️ 13 Oct 2004 13:34:00Reported by DebianType 
debian
 debian
🔗 lists.debian.org👁 21 Views

mpg123 package fixed a vulnerability allowing arbitrary code execution via unsanitized input.

Show more
Related
Packages
ReporterTitlePublishedViews
Family
Cvelist
CVE-2004-0805
20 Oct 200404:00
cvelist
OpenVAS
Debian Security Advisory DSA 564-1 (mpg123)
17 Jan 200800:00
openvas
OpenVAS
FreeBSD Ports: mpg123, mpg123-nas, mpg123-esound
4 Sep 200800:00
openvas
OpenVAS
Gentoo Security Advisory GLSA 200409-20 (mpg123)
24 Sep 200800:00
openvas
OpenVAS
Debian Security Advisory DSA 564-1 (mpg123)
17 Jan 200800:00
openvas
OpenVAS
Gentoo Security Advisory GLSA 200409-20 (mpg123)
24 Sep 200800:00
openvas
OpenVAS
FreeBSD Ports: mpg123, mpg123-nas, mpg123-esound
4 Sep 200800:00
openvas
UbuntuCve
CVE-2004-0805
23 Dec 200400:00
ubuntucve
Debian
[SECURITY] [DSA 564-1] New mpg123 packages fix arbitrary code exceution
13 Oct 200413:00
debian
FreeBSD
mpg123 buffer overflow
16 Aug 200300:00
freebsd
Rows per page
OSOS VersionArchitecturePackagePackage VersionFilename
Debian3allmpg1230.59r-13woody3mpg123_0.59r-13woody3_all.deb

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
13 Oct 2004 13:00Current
6.6Medium risk
Vulners AI Score6.6
CVSS27.5
EPSS0.121
21
.json
Report