Heap-based buffer overflow in libspf
Reporter | Title | Published | Views | Family All 23 |
---|---|---|---|---|
![]() | Debian Security Advisory DSA 1659-1 (libspf2) | 1 Nov 200800:00 | – | openvas |
![]() | FreeBSD Ports: libspf2 | 1 Nov 200800:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200810-03 (libspf2) | 1 Nov 200800:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200810-03 (libspf2) | 1 Nov 200800:00 | – | openvas |
![]() | FreeBSD Ports: libspf2 | 1 Nov 200800:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-1659-1) | 1 Nov 200800:00 | – | openvas |
![]() | CVE-2008-2469 | 23 Oct 200822:00 | – | debiancve |
![]() | libspf2 - potential remote code execution | 23 Oct 200800:00 | – | osv |
![]() | CVE-2008-2469 | 23 Oct 200821:00 | – | cvelist |
![]() | CVE-2008-2469 | 23 Oct 200822:00 | – | nvd |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | libspf2 | 1.2.8 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo