New xzgv packages fix integer overflow vulnerabilities enabling remote code execution.
Reporter | Title | Published | Views | Family All 24 |
---|---|---|---|---|
![]() | Debian Security Advisory DSA 614-1 (xzgv) | 17 Jan 200800:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-614-1) | 17 Jan 200800:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200501-09 (xzgv) | 24 Sep 200800:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200501-09 (xzgv) | 24 Sep 200800:00 | – | openvas |
![]() | FreeBSD Ports: zgv | 4 Sep 200800:00 | – | openvas |
![]() | FreeBSD Ports: zgv | 4 Sep 200800:00 | – | openvas |
![]() | DSA-614-1 xzgv - integer overflows | 21 Dec 200400:00 | – | osv |
![]() | CVE-2004-0994 | 10 Jan 200505:00 | – | osv |
![]() | GLSA-200501-09 : xzgv: Multiple overflows | 14 Feb 200500:00 | – | nessus |
![]() | FreeBSD : zgv -- exploitable heap overflows (249a8c42-6973-11d9-ae49-000c41e2cdad) | 13 Jul 200500:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 3 | m68k | xzgv | 0.7-6woody2 | xzgv_0.7-6woody2_m68k.deb |
Debian | 3 | mips | xzgv | 0.7-6woody2 | xzgv_0.7-6woody2_mips.deb |
Debian | 3 | arm | xzgv | 0.7-6woody2 | xzgv_0.7-6woody2_arm.deb |
Debian | 3 | all | xzgv | 0.7-6woody2 | xzgv_0.7-6woody2_all.deb |
Debian | 3 | i386 | xzgv | 0.7-6woody2 | xzgv_0.7-6woody2_i386.deb |
Debian | 3 | mipsel | xzgv | 0.7-6woody2 | xzgv_0.7-6woody2_mipsel.deb |
Debian | 3 | alpha | xzgv | 0.7-6woody2 | xzgv_0.7-6woody2_alpha.deb |
Debian | 3 | powerpc | xzgv | 0.7-6woody2 | xzgv_0.7-6woody2_powerpc.deb |
Debian | 3 | ia64 | xzgv | 0.7-6woody2 | xzgv_0.7-6woody2_ia64.deb |
Debian | 3 | s390 | xzgv | 0.7-6woody2 | xzgv_0.7-6woody2_s390.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo