Moderate pam security, bug fix, and enhancement update for Pluggable Authentication Module
Reporter | Title | Published | Views | Family All 68 |
---|---|---|---|---|
![]() | pam - several | 24 Oct 201100:00 | – | osv |
![]() | RHSA-2013:0521 Red Hat Security Advisory: pam security, bug fix, and enhancement update | 15 Sep 202420:21 | – | osv |
![]() | OPENSUSE-SU-2024:10405-1 pam-1.3.0-3.4 on GA media | 15 Jun 202400:00 | – | osv |
![]() | Scientific Linux Security Update : pam on SL6.x i386/x86_64 (20130221) | 1 Mar 201300:00 | – | nessus |
![]() | CentOS 6 : pam (CESA-2013:0521) | 10 Mar 201300:00 | – | nessus |
![]() | Oracle Linux 6 : pam (ELSA-2013-0521) | 12 Jul 201300:00 | – | nessus |
![]() | Amazon Linux AMI : pam (ALAS-2013-160) | 4 Sep 201300:00 | – | nessus |
![]() | openSUSE Security Update : pam (openSUSE-SU-2011:1204-1) | 13 Jun 201400:00 | – | nessus |
![]() | RHEL 6 : pam (RHSA-2013:0521) | 21 Feb 201300:00 | – | nessus |
![]() | Debian DSA-2326-1 : pam - several vulnerabilities | 25 Oct 201100:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 6 | s390x | pam-devel | 1.1.1-13.el6 | pam-devel-1.1.1-13.el6.s390x.rpm |
RedHat | 6 | s390x | pam | 1.1.1-13.el6 | pam-1.1.1-13.el6.s390x.rpm |
RedHat | 6 | ppc64 | pam-devel | 1.1.1-13.el6 | pam-devel-1.1.1-13.el6.ppc64.rpm |
RedHat | 6 | src | pam | 1.1.1-13.el6 | pam-1.1.1-13.el6.src.rpm |
RedHat | 6 | i686 | pam-debuginfo | 1.1.1-13.el6 | pam-debuginfo-1.1.1-13.el6.i686.rpm |
RedHat | 6 | x86_64 | pam-debuginfo | 1.1.1-13.el6 | pam-debuginfo-1.1.1-13.el6.x86_64.rpm |
RedHat | 6 | i686 | pam | 1.1.1-13.el6 | pam-1.1.1-13.el6.i686.rpm |
RedHat | 6 | ppc64 | pam-debuginfo | 1.1.1-13.el6 | pam-debuginfo-1.1.1-13.el6.ppc64.rpm |
RedHat | 6 | ppc | pam | 1.1.1-13.el6 | pam-1.1.1-13.el6.ppc.rpm |
RedHat | 6 | s390 | pam-debuginfo | 1.1.1-13.el6 | pam-debuginfo-1.1.1-13.el6.s390.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo