Stack-based buffer overflow in fullpath function of zoo 2.1
Reporter | Title | Published | Views | Family All 21 |
---|---|---|---|---|
![]() | Debian Security Advisory DSA 991-1 (zoo) | 17 Jan 200800:00 | – | openvas |
![]() | FreeBSD Ports: zoo | 4 Sep 200800:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200603-05 (zoo) | 24 Sep 200800:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200603-05 (zoo) | 24 Sep 200800:00 | – | openvas |
![]() | FreeBSD Ports: zoo | 4 Sep 200800:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-991-1) | 17 Jan 200800:00 | – | openvas |
![]() | CVE-2006-0855 | 23 Feb 200600:00 | – | ubuntucve |
![]() | CVE-2006-0855 | 23 Feb 200621:02 | – | cve |
![]() | CVE-2006-0855 | 23 Feb 200621:00 | – | cvelist |
![]() | [SECURITY] [DSA 991-1] New zoo packages fix arbitrary code execution | 10 Mar 200610:23 | – | debian |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 9 | all | zoo | 2.10-28 | zoo_2.10-28_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo