pam security update with privilege escalation vulnerabilitie
Reporter | Title | Published | Views | Family All 110 |
---|---|---|---|---|
![]() | Oracle Linux 5 : pam (ELSA-2010-0819) | 12 Jul 201300:00 | – | nessus |
![]() | RHEL 5 : pam (RHSA-2010:0819) | 2 Nov 201000:00 | – | nessus |
![]() | CentOS 5 : pam (CESA-2010:0819) | 24 Nov 201000:00 | – | nessus |
![]() | Oracle Linux 6 : pam (ELSA-2010-0891) | 12 Jul 201300:00 | – | nessus |
![]() | RHEL 6 : pam (RHSA-2010:0891) | 18 Nov 201000:00 | – | nessus |
![]() | Fedora 13 : pam-1.1.1-6.fc13 (2010-17112) | 5 Nov 201000:00 | – | nessus |
![]() | Mandriva Linux Security Advisory : pam (MDVSA-2010:220) | 4 Nov 201000:00 | – | nessus |
![]() | Fedora 12 : pam-1.1.1-6.fc12 (2010-17133) | 18 Nov 201000:00 | – | nessus |
![]() | Fedora 14 : pam-1.1.1-6.fc14 (2010-17155) | 8 Nov 201000:00 | – | nessus |
![]() | Scientific Linux Security Update : pam on SL5.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | ppc64 | pam | 0.99.6.2-6.el5_5.2 | pam-0.99.6.2-6.el5_5.2.ppc64.rpm |
RedHat | 5 | s390x | pam | 0.99.6.2-6.el5_5.2 | pam-0.99.6.2-6.el5_5.2.s390x.rpm |
RedHat | 5 | s390 | pam | 0.99.6.2-6.el5_5.2 | pam-0.99.6.2-6.el5_5.2.s390.rpm |
RedHat | 5 | x86_64 | pam | 0.99.6.2-6.el5_5.2 | pam-0.99.6.2-6.el5_5.2.x86_64.rpm |
RedHat | 5 | i386 | pam | 0.99.6.2-6.el5_5.2 | pam-0.99.6.2-6.el5_5.2.i386.rpm |
RedHat | 5 | ppc64 | pam-devel | 0.99.6.2-6.el5_5.2 | pam-devel-0.99.6.2-6.el5_5.2.ppc64.rpm |
RedHat | 5 | ia64 | pam-devel | 0.99.6.2-6.el5_5.2 | pam-devel-0.99.6.2-6.el5_5.2.ia64.rpm |
RedHat | 5 | x86_64 | pam-devel | 0.99.6.2-6.el5_5.2 | pam-devel-0.99.6.2-6.el5_5.2.x86_64.rpm |
RedHat | 5 | s390x | pam-devel | 0.99.6.2-6.el5_5.2 | pam-devel-0.99.6.2-6.el5_5.2.s390x.rpm |
RedHat | 5 | src | pam | 0.99.6.2-6.el5_5.2 | pam-0.99.6.2-6.el5_5.2.src.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo