Evolution PIM Tools Security Updat
Reporter | Title | Published | Views | Family All 32 |
---|---|---|---|---|
![]() | FreeBSD Ports: evolution | 4 Sep 200800:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-1016-1) | 17 Jan 200800:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200508-12 (evolution) | 24 Sep 200800:00 | – | openvas |
![]() | FreeBSD Ports: evolution | 4 Sep 200800:00 | – | openvas |
![]() | Debian Security Advisory DSA 1016-1 (evolution) | 17 Jan 200800:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200508-12 (evolution) | 24 Sep 200800:00 | – | openvas |
![]() | Debian DSA-1016-1 : evolution - format string vulnerabilities | 14 Oct 200600:00 | – | nessus |
![]() | Mandrake Linux Security Advisory : evolution (MDKSA-2005:141) | 5 Oct 200500:00 | – | nessus |
![]() | CentOS 3 / 4 : Evolution (CESA-2005:267) | 5 Jul 200600:00 | – | nessus |
![]() | GLSA-200508-12 : Evolution: Format string vulnerabilities | 23 Aug 200500:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | any | ia64 | evolution | 2.0.2-16.3 | evolution-2.0.2-16.3.ia64.rpm |
RedHat | any | src | evolution | 2.0.2-16.3 | evolution-2.0.2-16.3.src.rpm |
RedHat | any | i386 | evolution-devel | 2.0.2-16.3 | evolution-devel-2.0.2-16.3.i386.rpm |
RedHat | any | ppc | evolution | 2.0.2-16.3 | evolution-2.0.2-16.3.ppc.rpm |
RedHat | any | x86_64 | evolution | 2.0.2-16.3 | evolution-2.0.2-16.3.x86_64.rpm |
RedHat | any | s390x | evolution | 2.0.2-16.3 | evolution-2.0.2-16.3.s390x.rpm |
RedHat | any | s390 | evolution-devel | 2.0.2-16.3 | evolution-devel-2.0.2-16.3.s390.rpm |
RedHat | any | i386 | evolution | 2.0.2-16.3 | evolution-2.0.2-16.3.i386.rpm |
RedHat | any | s390x | evolution-devel | 2.0.2-16.3 | evolution-devel-2.0.2-16.3.s390x.rpm |
RedHat | any | s390 | evolution | 2.0.2-16.3 | evolution-2.0.2-16.3.s390.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo