hivex library update for Windows Registry securit
Reporter | Title | Published | Views | Family All 35 |
---|---|---|---|---|
![]() | CVE-2014-9273 | 8 Dec 201416:00 | – | cvelist |
![]() | CentOS 6 : hivex (CESA-2015:1378) | 28 Jul 201500:00 | – | nessus |
![]() | RHEL 7 : hivex (RHSA-2015:0301) | 5 Mar 201500:00 | – | nessus |
![]() | SUSE SLES12 Security Update : hivex (SUSE-SU-2015:0320-1) | 20 May 201500:00 | – | nessus |
![]() | CentOS 7 : hivex (CESA-2015:0301) | 18 Mar 201500:00 | – | nessus |
![]() | Oracle Linux 6 : hivex (ELSA-2015-1378) | 30 Jul 201500:00 | – | nessus |
![]() | openSUSE Security Update : hivex (openSUSE-SU-2015:0189-1) | 3 Feb 201500:00 | – | nessus |
![]() | Oracle Linux 7 : hivex (ELSA-2015-0301) | 10 Mar 201500:00 | – | nessus |
![]() | Scientific Linux Security Update : hivex on SL6.x x86_64 (20150722) | 4 Aug 201500:00 | – | nessus |
![]() | GLSA-201503-07 : hivex: User-assisted execution of arbitrary code | 24 Mar 201500:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 6 | x86_64 | hivex | 1.3.3-4.3.el6 | hivex-1.3.3-4.3.el6.x86_64.rpm |
RedHat | 6 | x86_64 | hivex-debuginfo | 1.3.3-4.3.el6 | hivex-debuginfo-1.3.3-4.3.el6.x86_64.rpm |
RedHat | 6 | i686 | hivex | 1.3.3-4.3.el6 | hivex-1.3.3-4.3.el6.i686.rpm |
RedHat | 6 | i686 | hivex-debuginfo | 1.3.3-4.3.el6 | hivex-debuginfo-1.3.3-4.3.el6.i686.rpm |
RedHat | 6 | x86_64 | perl-hivex | 1.3.3-4.3.el6 | perl-hivex-1.3.3-4.3.el6.x86_64.rpm |
RedHat | 6 | x86_64 | hivex-devel | 1.3.3-4.3.el6 | hivex-devel-1.3.3-4.3.el6.x86_64.rpm |
RedHat | 6 | x86_64 | ocaml-hivex | 1.3.3-4.3.el6 | ocaml-hivex-1.3.3-4.3.el6.x86_64.rpm |
RedHat | 6 | src | hivex | 1.3.3-4.3.el6 | hivex-1.3.3-4.3.el6.src.rpm |
RedHat | 6 | x86_64 | ocaml-hivex-devel | 1.3.3-4.3.el6 | ocaml-hivex-devel-1.3.3-4.3.el6.x86_64.rpm |
RedHat | 6 | x86_64 | python-hivex | 1.3.3-4.3.el6 | python-hivex-1.3.3-4.3.el6.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo