Debian advisory DSA 754-1 fixes insecure temporary file creation in centeric
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
OpenVAS | Debian Security Advisory DSA 754-1 (centericq) | 17 Jan 200800:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-754-1) | 17 Jan 200800:00 | – | openvas |
CVE | CVE-2005-1914 | 18 Jul 200504:00 | – | cve |
Tenable Nessus | Debian DSA-754-1 : centericq - insecure temporary file | 13 Jul 200500:00 | – | nessus |
Tenable Nessus | Debian DSA-773-1 : amd64 - several vulnerabilities | 12 Jan 201200:00 | – | nessus |
Cvelist | CVE-2005-1914 | 17 Jul 200504:00 | – | cvelist |
UbuntuCve | CVE-2005-1914 | 18 Jul 200500:00 | – | ubuntucve |
NVD | CVE-2005-1914 | 18 Jul 200504:00 | – | nvd |
Debian | [SECURITY] [DSA 754-1] New centericq packages fix insecure temporary file creation | 13 Jul 200510:57 | – | debian |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 3.1 | arm | centericq-utf8 | 4.20.0-1sarge1 | centericq-utf8_4.20.0-1sarge1_arm.deb |
Debian | 3.1 | mipsel | centericq-utf8 | 4.20.0-1sarge1 | centericq-utf8_4.20.0-1sarge1_mipsel.deb |
Debian | 3.1 | m68k | centericq-common | 4.20.0-1sarge1 | centericq-common_4.20.0-1sarge1_m68k.deb |
Debian | 3.1 | ia64 | centericq-fribidi | 4.20.0-1sarge1 | centericq-fribidi_4.20.0-1sarge1_ia64.deb |
Debian | 3.1 | sparc | centericq-utf8 | 4.20.0-1sarge1 | centericq-utf8_4.20.0-1sarge1_sparc.deb |
Debian | 3.1 | mips | centericq-utf8 | 4.20.0-1sarge1 | centericq-utf8_4.20.0-1sarge1_mips.deb |
Debian | 3.1 | amd64 | centericq | 4.20.0-1sarge1 | centericq_4.20.0-1sarge1_amd64.deb |
Debian | 3.1 | alpha | centericq-utf8 | 4.20.0-1sarge1 | centericq-utf8_4.20.0-1sarge1_alpha.deb |
Debian | 3.1 | ia64 | centericq | 4.20.0-1sarge1 | centericq_4.20.0-1sarge1_ia64.deb |
Debian | 3.1 | mipsel | centericq-common | 4.20.0-1sarge1 | centericq-common_4.20.0-1sarge1_mipsel.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo