freetype integer overflow CVE-2007-275
Reporter | Title | Published | Views | Family All 131 |
---|---|---|---|---|
![]() | Mandriva Update for freetype2 MDKSA-2007:121 (freetype2) | 9 Apr 200900:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200705-22 (freetype) | 24 Sep 200800:00 | – | openvas |
![]() | Ubuntu Update for freetype vulnerability USN-466-1 | 23 Mar 200900:00 | – | openvas |
![]() | SLES9: Security update for freetype2 | 10 Oct 200900:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-466-1) | 23 Mar 200900:00 | – | openvas |
![]() | Fedora Update for freetype FEDORA-2007-0033 | 27 Feb 200900:00 | – | openvas |
![]() | Fedora Update for freetype FEDORA-2007-0033 | 27 Feb 200900:00 | – | openvas |
![]() | Debian Security Advisory DSA 1334-1 (freetype) | 17 Jan 200800:00 | – | openvas |
![]() | SLES10: Security update for freetype2 | 13 Oct 200900:00 | – | openvas |
![]() | Mandriva Update for freetype2 MDKSA-2007:121 (freetype2) | 9 Apr 200900:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 2 | ia64 | freetype-utils | 2.0.3-10.el21 | freetype-utils-2.0.3-10.el21.ia64.rpm |
RedHat | 5 | ppc | freetype-demos | 2.2.1-19.el5 | freetype-demos-2.2.1-19.el5.ppc.rpm |
RedHat | 2 | i386 | freetype-devel | 2.0.3-10.el21 | freetype-devel-2.0.3-10.el21.i386.rpm |
RedHat | 4 | x86_64 | freetype-demos | 2.1.9-6.el4 | freetype-demos-2.1.9-6.el4.x86_64.rpm |
RedHat | 2 | ia64 | freetype-devel | 2.0.3-10.el21 | freetype-devel-2.0.3-10.el21.ia64.rpm |
RedHat | 4 | i386 | freetype | 2.1.9-6.el4 | freetype-2.1.9-6.el4.i386.rpm |
RedHat | 4 | ia64 | freetype | 2.1.9-6.el4 | freetype-2.1.9-6.el4.ia64.rpm |
RedHat | 5 | ia64 | freetype-devel | 2.2.1-19.el5 | freetype-devel-2.2.1-19.el5.ia64.rpm |
RedHat | 5 | s390x | freetype | 2.2.1-19.el5 | freetype-2.2.1-19.el5.s390x.rpm |
RedHat | 3 | x86_64 | freetype | 2.1.4-7.el3 | freetype-2.1.4-7.el3.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo