Mutt security update for NFS file system and APOP authentication vulnerabilities
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | RHEL 3 / 4 / 5 : mutt (RHSA-2007:0386) | 4 Jun 200700:00 | – | nessus |
![]() | CentOS 3 / 4 / 5 : mutt (CESA-2007:0386) | 4 Jun 200700:00 | – | nessus |
![]() | Scientific Linux Security Update : mutt on SL5.x, SL4.x, SL3.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
![]() | Oracle Linux 5 : Moderate: / mutt (ELSA-2007-0386) | 12 Jul 201300:00 | – | nessus |
![]() | Fedora Core 5 : mutt-1.4.2.1-8.fc5 (2007-540) | 1 Jun 200700:00 | – | nessus |
![]() | Fedora Core 6 : mutt-1.4.2.3-1.fc6 (2007-539) | 1 Jun 200700:00 | – | nessus |
![]() | Mandrake Linux Security Advisory : mutt (MDKSA-2007:113) | 5 Jun 200700:00 | – | nessus |
![]() | Fedora 7 : mutt-1.5.14-4.fc7 (2007-0002) | 24 Sep 201200:00 | – | nessus |
![]() | FreeBSD : mutt -- buffer overflow vulnerability (863f95d3-3df1-11dc-b3d3-0016179b2dd5) | 30 Jul 200700:00 | – | nessus |
![]() | Mandrake Linux Security Advisory : fetchmail (MDKSA-2007:105) | 20 May 200700:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 3 | s390x | mutt | 1.4.1-5.el3 | mutt-1.4.1-5.el3.s390x.rpm |
RedHat | 5 | x86_64 | mutt | 1.4.2.2-3.0.2.el5 | mutt-1.4.2.2-3.0.2.el5.x86_64.rpm |
RedHat | 3 | ppc | mutt | 1.4.1-5.el3 | mutt-1.4.1-5.el3.ppc.rpm |
RedHat | 3 | s390 | mutt | 1.4.1-5.el3 | mutt-1.4.1-5.el3.s390.rpm |
RedHat | 5 | ppc | mutt | 1.4.2.2-3.0.2.el5 | mutt-1.4.2.2-3.0.2.el5.ppc.rpm |
RedHat | 3 | ia64 | mutt | 1.4.1-5.el3 | mutt-1.4.1-5.el3.ia64.rpm |
RedHat | 5 | s390x | mutt | 1.4.2.2-3.0.2.el5 | mutt-1.4.2.2-3.0.2.el5.s390x.rpm |
RedHat | 5 | ia64 | mutt | 1.4.2.2-3.0.2.el5 | mutt-1.4.2.2-3.0.2.el5.ia64.rpm |
RedHat | 3 | x86_64 | mutt | 1.4.1-5.el3 | mutt-1.4.1-5.el3.x86_64.rpm |
RedHat | 4 | i386 | mutt | 1.4.1-12.0.3.el4 | mutt-1.4.1-12.0.3.el4.i386.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo