freetype security update with multiple patches to address buffer overflow and ignore fragment issue
Reporter | Title | Published | Views | Family All 129 |
---|---|---|---|---|
![]() | RedHat Update for freetype RHSA-2010:0578-01 | 2 Aug 201000:00 | – | openvas |
![]() | CentOS Update for freetype CESA-2010:0578 centos5 i386 | 9 Aug 201100:00 | – | openvas |
![]() | CentOS Update for freetype CESA-2010:0578 centos5 i386 | 9 Aug 201100:00 | – | openvas |
![]() | RedHat Update for freetype RHSA-2010:0578-01 | 2 Aug 201000:00 | – | openvas |
![]() | Oracle: Security Advisory (ELSA-2010-0578) | 6 Oct 201500:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-963-1) | 23 Jul 201000:00 | – | openvas |
![]() | Ubuntu Update for freetype vulnerabilities USN-963-1 | 23 Jul 201000:00 | – | openvas |
![]() | RedHat Update for freetype RHSA-2010:0577-01 | 2 Aug 201000:00 | – | openvas |
![]() | FreeType Memory Corruption and Buffer Overflow Vulnerabilities (Windows) | 1 Sep 201000:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-2070-1) | 22 Jul 201000:00 | – | openvas |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo