Multiple stack-based buffer overflows in Sarg might allow attackers to execute arbitrary code via unknown vector
Reporter | Title | Published | Views | Family All 15 |
---|---|---|---|---|
![]() | GLSA-201009-04 : SARG: User-assisted execution of arbitrary code | 8 Sep 201000:00 | – | nessus |
![]() | Mandriva Linux Security Advisory : sarg (MDVSA-2009:073) | 23 Apr 200900:00 | – | nessus |
![]() | OPENSUSE-SU-2024:11367-1 sarg-2.4.0-3.10 on GA media | 15 Jun 202400:00 | – | osv |
![]() | Stack overflow | 13 May 200823:20 | – | prion |
![]() | CVE-2008-1922 | 13 May 200800:00 | – | ubuntucve |
![]() | CVE-2008-1922 | 13 May 200823:20 | – | nvd |
![]() | Mandrake Security Advisory MDVSA-2009:073 (sarg) | 13 Mar 200900:00 | – | openvas |
![]() | Mandrake Security Advisory MDVSA-2009:073 (sarg) | 13 Mar 200900:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 201009-04 (SARG sarg) | 9 Mar 201100:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 201009-04 (SARG sarg) | 9 Mar 201100:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | sarg | 2.2.4-1 | sarg_2.2.4-1_all.deb |
Debian | 999 | all | sarg | 2.2.4-1 | sarg_2.2.4-1_all.deb |
Debian | 13 | all | sarg | 2.2.4-1 | sarg_2.2.4-1_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo