Search for packages
purl | pkg:ebuild/app-emulation/vmware-workstation@2.5.5.328052 |
Next non-vulnerable version | 4.5.2.8848-r5 |
Latest non-vulnerable version | 5.5.5.56455 |
Risk | 10.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-1r8y-jjg8-aaac
Aliases: CVE-2008-1808 |
Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow. | There are no reported fixed by versions. |
VCID-324b-yk3u-aaaj
Aliases: CVE-2009-0040 |
CVE-2009-0040 libpng arbitrary free() flaw | There are no reported fixed by versions. |
VCID-4n6s-aqht-aaaq
Aliases: CVE-2008-1340 |
Virtual Machine Communication Interface (VMCI) in VMware Workstation 6.0.x before 6.0.3, VMware Player 2.0.x before 2.0.3, and VMware ACE 2.0.x before 2.0.1 allows attackers to cause a denial of service (host OS crash) via crafted VMCI calls that trigger "memory exhaustion and memory corruption." | There are no reported fixed by versions. |
VCID-4wm6-we6u-aaap
Aliases: CVE-2010-1138 |
The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware Workstation 6.5.x before 6.5.4 build 246459 on Windows, VMware Player 3.0 before 3.0.1 build 227600, VMware Player 2.5.x before 2.5.4 build 246459 on Windows, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware Server 2.x, and VMware Fusion 3.0 before 3.0.1 build 232708 and 2.x before 2.0.7 build 246742 allows remote attackers to obtain sensitive information from memory on the host OS by examining received network packets, related to interaction between the guest OS and the host vmware-vmx process. | There are no reported fixed by versions. |
VCID-5nv9-hkcc-aaam
Aliases: CVE-2008-1447 |
The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug." | There are no reported fixed by versions. |
VCID-5uq8-xwe5-aaae
Aliases: CVE-2009-0909 |
Heap-based buffer overflow in the VNnc Codec in VMware Workstation 6.5.x before 6.5.2 build 156735, VMware Player 2.5.x before 2.5.2 build 156735, VMware ACE 2.5.x before 2.5.2 build 156735, and VMware Server 2.0.x before 2.0.1 build 156745 allows remote attackers to execute arbitrary code via a crafted web page or video file, aka ZDI-CAN-435. | There are no reported fixed by versions. |
VCID-6f1s-nevu-aaas
Aliases: CVE-2010-1141 |
VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly access libraries, which allows user-assisted remote attackers to execute arbitrary code by tricking a Windows guest OS user into clicking on a file that is stored on a network share. | There are no reported fixed by versions. |
VCID-6gm2-wd6m-aaaq
Aliases: CVE-2007-5269 |
CVE-2007-5269 libpng DoS via multiple out-of-bounds reads | There are no reported fixed by versions. |
VCID-75h2-y5kg-aaap
Aliases: CVE-2008-2101 |
The VMware Consolidated Backup (VCB) command-line utilities in VMware ESX 3.0.1 through 3.0.3 and ESX 3.5 place a password on the command line, which allows local users to obtain sensitive information by listing the process. | There are no reported fixed by versions. |
VCID-7gw3-q645-aaaa
Aliases: CVE-2008-1361 |
VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation that causes the authd process to connect to an arbitrary named pipe, a different vulnerability than CVE-2008-1362. | There are no reported fixed by versions. |
VCID-7nz3-h5na-aaab
Aliases: CVE-2009-3732 |
Format string vulnerability in vmware-vmrc.exe build 158248 in VMware Remote Console (aka VMrc) allows remote attackers to execute arbitrary code via unspecified vectors. | There are no reported fixed by versions. |
VCID-97wy-acxg-aaac
Aliases: CVE-2009-3733 |
Directory traversal vulnerability in VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138 on Linux, VMware ESXi 3.5, and VMware ESX 3.0.3 and 3.5 allows remote attackers to read arbitrary files via unspecified vectors. | There are no reported fixed by versions. |
VCID-9p8g-csu6-aaad
Aliases: CVE-2008-4916 |
Unspecified vulnerability in a guest virtual device driver in VMware Workstation before 5.5.9 build 126128, and 6.5.1 and earlier 6.x versions; VMware Player before 1.0.9 build 126128, and 2.5.1 and earlier 2.x versions; VMware ACE before 1.0.8 build 125922, and 2.5.1 and earlier 2.x versions; VMware Server 1.x before 1.0.8 build 126538 and 2.0.x before 2.0.1 build 156745; VMware Fusion before 2.0.1; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to cause a denial of service (host OS crash) via unknown vectors. | There are no reported fixed by versions. |
VCID-a1nr-zzmq-aaag
Aliases: CVE-2008-1807 |
FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via an invalid "number of axes" field in a Printer Font Binary (PFB) file, which triggers a free of arbitrary memory locations, leading to memory corruption. | There are no reported fixed by versions. |
VCID-aa2z-nmw2-aaaa
Aliases: CVE-2008-2100 |
Multiple buffer overflows in VIX API 1.1.x before 1.1.4 build 93057 on VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware ESX 3.0.1 through 3.5 allow guest OS users to execute arbitrary code on the host OS via unspecified vectors. | There are no reported fixed by versions. |
VCID-ah98-b6qr-aaak
Aliases: CVE-2008-1362 |
VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges or cause a denial of service by impersonating the authd process through an unspecified use of an "insecurely created named pipe," a different vulnerability than CVE-2008-1361. | There are no reported fixed by versions. |
VCID-ahh2-fayx-aaaf
Aliases: CVE-2009-0910 |
Heap-based buffer overflow in the VNnc Codec in VMware Workstation 6.5.x before 6.5.2 build 156735, VMware Player 2.5.x before 2.5.2 build 156735, VMware ACE 2.5.x before 2.5.2 build 156735, and VMware Server 2.0.x before 2.0.1 build 156745 allows remote attackers to execute arbitrary code via a crafted web page or video file, aka ZDI-CAN-436. | There are no reported fixed by versions. |
VCID-c1xm-7ayh-aaaf
Aliases: CVE-2010-1137 |
Cross-site scripting (XSS) vulnerability in WebAccess in VMware VirtualCenter 2.0.2 and 2.5 and VMware ESX 3.0.3 and 3.5, and the Server Console in VMware Server 1.0, allows remote attackers to inject arbitrary web script or HTML via the name of a virtual machine. | There are no reported fixed by versions. |
VCID-fetj-m5rr-aaas
Aliases: CVE-2008-1363 |
VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation of a config.ini file located in an Application Data folder, which can be used for "hijacking the VMX process." | There are no reported fixed by versions. |
VCID-fswn-m58k-aaak
Aliases: CVE-2008-1364 |
Unspecified vulnerability in the DHCP service in VMware Workstation 5.5.x before 5.5.6, VMware Player 1.0.x before 1.0.6, VMware ACE 1.0.x before 1.0.5, VMware Server 1.0.x before 1.0.5, and VMware Fusion 1.1.x before 1.1.1 allows attackers to cause a denial of service. | There are no reported fixed by versions. |
VCID-gcc7-tmmq-aaaj
Aliases: CVE-2008-4917 |
Unspecified vulnerability in VMware Workstation 5.5.8 and earlier, and 6.0.5 and earlier 6.x versions; VMware Player 1.0.8 and earlier, and 2.0.5 and earlier 2.x versions; VMware Server 1.0.9 and earlier; VMware ESXi 3.5; and VMware ESX 3.0.2 through 3.5 allows guest OS users to have an unknown impact by sending the virtual hardware a request that triggers an arbitrary physical-memory write operation, leading to memory corruption. | There are no reported fixed by versions. |
VCID-hcwx-gks2-aaaf
Aliases: CVE-2008-4915 |
The CPU hardware emulation in VMware Workstation 6.0.5 and earlier and 5.5.8 and earlier; Player 2.0.x through 2.0.5 and 1.0.x through 1.0.8; ACE 2.0.x through 2.0.5 and earlier, and 1.0.x through 1.0.7; Server 1.0.x through 1.0.7; ESX 2.5.4 through 3.5; and ESXi 3.5, when running 32-bit and 64-bit guest operating systems, does not properly handle the Trap flag, which allows authenticated guest OS users to gain privileges on the guest OS. | There are no reported fixed by versions. |
VCID-jf49-nkj8-aaaj
Aliases: CVE-2008-0967 |
Untrusted search path vulnerability in vmware-authd in VMware Workstation 5.x before 5.5.7 build 91707 and 6.x before 6.0.4 build 93057, VMware Player 1.x before 1.0.7 build 91707 and 2.x before 2.0.4 build 93057, and VMware Server before 1.0.6 build 91891 on Linux, and VMware ESXi 3.5 and VMware ESX 2.5.4 through 3.5, allows local users to gain privileges via a library path option in a configuration file. | There are no reported fixed by versions. |
VCID-jgye-qfzm-aaan
Aliases: CVE-2009-1244 |
Unspecified vulnerability in the virtual machine display function in VMware Workstation 6.5.1 and earlier; VMware Player 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745; VMware Fusion before 2.0.4 build 159196; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to execute arbitrary code on the host OS via unknown vectors, a different vulnerability than CVE-2008-4916. | There are no reported fixed by versions. |
VCID-jtu2-tmr8-aaas
Aliases: CVE-2010-1142 |
VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly load VMware programs, which might allow Windows guest OS users to gain privileges by placing a Trojan horse program at an unspecified location on the guest OS disk. | There are no reported fixed by versions. |
VCID-m3v7-b6tr-aaaa
Aliases: CVE-2011-3868 |
Buffer overflow in VMware Workstation 7.x before 7.1.5, VMware Player 3.x before 3.1.5, VMware Fusion 3.1.x before 3.1.3, and VMware AMS allows remote attackers to execute arbitrary code via a crafted UDF filesystem in an ISO image. | There are no reported fixed by versions. |
VCID-nrt6-e1rr-aaaa
Aliases: CVE-2010-1139 |
Format string vulnerability in vmrun in VMware VIX API 1.6.x, VMware Workstation 6.5.x before 6.5.4 build 246459, VMware Player 2.5.x before 2.5.4 build 246459, and VMware Server 2.x on Linux, and VMware Fusion 2.x before 2.0.7 build 246742, allows local users to gain privileges via format string specifiers in process metadata. | There are no reported fixed by versions. |
VCID-ns7f-1qct-aaap
Aliases: CVE-2008-2098 |
Heap-based buffer overflow in the VMware Host Guest File System (HGFS) in VMware Workstation 6 before 6.0.4 build 93057, VMware Player 2 before 2.0.4 build 93057, VMware ACE 2 before 2.0.2 build 93057, and VMware Fusion before 1.1.2 build 87978, when folder sharing is used, allows guest OS users to execute arbitrary code on the host OS via unspecified vectors. | There are no reported fixed by versions. |
VCID-p3k8-6e5t-aaas
Aliases: CVE-2007-5671 |
HGFS.sys in the VMware Tools package in VMware Workstation 5.x before 5.5.6 build 80404, VMware Player before 1.0.6 build 80404, VMware ACE before 1.0.5 build 79846, VMware Server before 1.0.5 build 80187, and VMware ESX 2.5.4 through 3.0.2 does not properly validate arguments in user-mode METHOD_NEITHER IOCTLs to the \\.\hgfs device, which allows guest OS users to modify arbitrary memory locations in guest kernel memory and gain privileges. | There are no reported fixed by versions. |
VCID-p6fe-jgzc-aaae
Aliases: CVE-2009-3707 |
VMware Authentication Daemon 1.0 in vmware-authd.exe in the VMware Authorization Service in VMware Workstation 7.0 before 7.0.1 build 227600 and 6.5.x before 6.5.4 build 246459, VMware Player 3.0 before 3.0.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, and VMware Server 2.x allows remote attackers to cause a denial of service (process crash) via a \x25\xFF sequence in the USER and PASS commands, related to a "format string DoS" issue. NOTE: some of these details are obtained from third party information. | There are no reported fixed by versions. |
VCID-pa5e-re2b-aaaj
Aliases: CVE-2007-5503 |
CVE-2007-5503 cairo integer overflow | There are no reported fixed by versions. |
VCID-pehg-kk6h-aaae
Aliases: CVE-2010-1143 |
Cross-site scripting (XSS) vulnerability in VMware View (formerly Virtual Desktop Manager or VDM) 3.1.x before 3.1.3 build 252693 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | There are no reported fixed by versions. |
VCID-qsxf-bepg-aaak
Aliases: CVE-2008-1806 |
Integer overflow in FreeType2 before 2.3.6 allows context-dependent attackers to execute arbitrary code via a crafted set of 16-bit length values within the Private dictionary table in a Printer Font Binary (PFB) file, which triggers a heap-based buffer overflow. | There are no reported fixed by versions. |
VCID-s6ad-1bz3-aaaj
Aliases: CVE-2008-1392 |
The default configuration of VMware Workstation 6.0.2, VMware Player 2.0.x before 2.0.3, and VMware ACE 2.0.x before 2.0.1 makes the console of the guest OS accessible through anonymous VIX API calls, which has unknown impact and attack vectors. | There are no reported fixed by versions. |
VCID-uyzx-g3m8-aaam
Aliases: CVE-2010-1140 |
The USB service in VMware Workstation 7.0 before 7.0.1 build 227600 and VMware Player 3.0 before 3.0.1 build 227600 on Windows might allow host OS users to gain privileges by placing a Trojan horse program at an unspecified location on the host OS disk. | There are no reported fixed by versions. |
VCID-wtp4-179x-aaac
Aliases: CVE-2009-4811 |
VMware Authentication Daemon 1.0 in vmware-authd.exe in the VMware Authorization Service in VMware Workstation 7.0 before 7.0.1 build 227600 and 6.5.x before 6.5.4 build 246459, VMware Player 3.0 before 3.0.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, and VMware Server 2.x allows remote attackers to cause a denial of service (process crash) via a \x25\x90 sequence in the USER and PASS commands, a related issue to CVE-2009-3707. NOTE: some of these details are obtained from third party information. | There are no reported fixed by versions. |
VCID-ysde-9ngt-aaag
Aliases: CVE-2009-2267 |
VMware Workstation 6.5.x before 6.5.3 build 185404, VMware Player 2.5.x before 2.5.3 build 185404, VMware ACE 2.5.x before 2.5.3 build 185404, VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138, VMware Fusion 2.x before 2.0.6 build 196839, VMware ESXi 3.5 and 4.0, and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0, when Virtual-8086 mode is used, do not properly set the exception code upon a page fault (aka #PF) exception, which allows guest OS users to gain privileges on the guest OS by specifying a crafted value for the cs register. | There are no reported fixed by versions. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T12:45:49.399754+00:00 | Gentoo Importer | Affected by | VCID-m3v7-b6tr-aaaa | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:49.354971+00:00 | Gentoo Importer | Affected by | VCID-pehg-kk6h-aaae | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:49.310220+00:00 | Gentoo Importer | Affected by | VCID-jtu2-tmr8-aaas | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:49.268628+00:00 | Gentoo Importer | Affected by | VCID-6f1s-nevu-aaas | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:49.225850+00:00 | Gentoo Importer | Affected by | VCID-uyzx-g3m8-aaam | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:49.180955+00:00 | Gentoo Importer | Affected by | VCID-nrt6-e1rr-aaaa | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:49.136060+00:00 | Gentoo Importer | Affected by | VCID-4wm6-we6u-aaap | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:49.093105+00:00 | Gentoo Importer | Affected by | VCID-c1xm-7ayh-aaaf | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:49.049303+00:00 | Gentoo Importer | Affected by | VCID-wtp4-179x-aaac | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:49.004270+00:00 | Gentoo Importer | Affected by | VCID-97wy-acxg-aaac | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.959340+00:00 | Gentoo Importer | Affected by | VCID-7nz3-h5na-aaab | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.914218+00:00 | Gentoo Importer | Affected by | VCID-p6fe-jgzc-aaae | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.868742+00:00 | Gentoo Importer | Affected by | VCID-ysde-9ngt-aaag | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.825843+00:00 | Gentoo Importer | Affected by | VCID-jgye-qfzm-aaan | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.782148+00:00 | Gentoo Importer | Affected by | VCID-ahh2-fayx-aaaf | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.736366+00:00 | Gentoo Importer | Affected by | VCID-5uq8-xwe5-aaae | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.691334+00:00 | Gentoo Importer | Affected by | VCID-324b-yk3u-aaaj | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.649747+00:00 | Gentoo Importer | Affected by | VCID-gcc7-tmmq-aaaj | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.605960+00:00 | Gentoo Importer | Affected by | VCID-9p8g-csu6-aaad | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.560955+00:00 | Gentoo Importer | Affected by | VCID-hcwx-gks2-aaaf | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.516164+00:00 | Gentoo Importer | Affected by | VCID-75h2-y5kg-aaap | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.475123+00:00 | Gentoo Importer | Affected by | VCID-aa2z-nmw2-aaaa | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.431990+00:00 | Gentoo Importer | Affected by | VCID-ns7f-1qct-aaap | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.386906+00:00 | Gentoo Importer | Affected by | VCID-1r8y-jjg8-aaac | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.341888+00:00 | Gentoo Importer | Affected by | VCID-a1nr-zzmq-aaag | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.300392+00:00 | Gentoo Importer | Affected by | VCID-qsxf-bepg-aaak | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.256553+00:00 | Gentoo Importer | Affected by | VCID-5nv9-hkcc-aaam | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.211915+00:00 | Gentoo Importer | Affected by | VCID-s6ad-1bz3-aaaj | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.166940+00:00 | Gentoo Importer | Affected by | VCID-fswn-m58k-aaak | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.125307+00:00 | Gentoo Importer | Affected by | VCID-fetj-m5rr-aaas | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.081712+00:00 | Gentoo Importer | Affected by | VCID-ah98-b6qr-aaak | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:48.036691+00:00 | Gentoo Importer | Affected by | VCID-7gw3-q645-aaaa | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:47.992192+00:00 | Gentoo Importer | Affected by | VCID-4n6s-aqht-aaaq | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:47.949342+00:00 | Gentoo Importer | Affected by | VCID-jf49-nkj8-aaaj | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:47.905673+00:00 | Gentoo Importer | Affected by | VCID-p3k8-6e5t-aaas | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:47.860632+00:00 | Gentoo Importer | Affected by | VCID-pa5e-re2b-aaaj | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2025-03-28T12:45:47.815594+00:00 | Gentoo Importer | Affected by | VCID-6gm2-wd6m-aaaq | https://security.gentoo.org/glsa/201209-25 | 36.0.0 |
2024-09-18T07:40:29.034826+00:00 | Gentoo Importer | Affected by | VCID-m3v7-b6tr-aaaa | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.984458+00:00 | Gentoo Importer | Affected by | VCID-pehg-kk6h-aaae | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.936724+00:00 | Gentoo Importer | Affected by | VCID-jtu2-tmr8-aaas | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.887363+00:00 | Gentoo Importer | Affected by | VCID-6f1s-nevu-aaas | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.836874+00:00 | Gentoo Importer | Affected by | VCID-uyzx-g3m8-aaam | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.788716+00:00 | Gentoo Importer | Affected by | VCID-nrt6-e1rr-aaaa | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.738750+00:00 | Gentoo Importer | Affected by | VCID-4wm6-we6u-aaap | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.690110+00:00 | Gentoo Importer | Affected by | VCID-c1xm-7ayh-aaaf | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.639427+00:00 | Gentoo Importer | Affected by | VCID-wtp4-179x-aaac | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.588952+00:00 | Gentoo Importer | Affected by | VCID-97wy-acxg-aaac | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.538971+00:00 | Gentoo Importer | Affected by | VCID-7nz3-h5na-aaab | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.487176+00:00 | Gentoo Importer | Affected by | VCID-p6fe-jgzc-aaae | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.436218+00:00 | Gentoo Importer | Affected by | VCID-ysde-9ngt-aaag | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.385530+00:00 | Gentoo Importer | Affected by | VCID-jgye-qfzm-aaan | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.336682+00:00 | Gentoo Importer | Affected by | VCID-ahh2-fayx-aaaf | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.286047+00:00 | Gentoo Importer | Affected by | VCID-5uq8-xwe5-aaae | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.239837+00:00 | Gentoo Importer | Affected by | VCID-324b-yk3u-aaaj | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.195460+00:00 | Gentoo Importer | Affected by | VCID-gcc7-tmmq-aaaj | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.149045+00:00 | Gentoo Importer | Affected by | VCID-9p8g-csu6-aaad | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.097342+00:00 | Gentoo Importer | Affected by | VCID-hcwx-gks2-aaaf | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:28.046090+00:00 | Gentoo Importer | Affected by | VCID-75h2-y5kg-aaap | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:27.997219+00:00 | Gentoo Importer | Affected by | VCID-aa2z-nmw2-aaaa | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:27.942747+00:00 | Gentoo Importer | Affected by | VCID-ns7f-1qct-aaap | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:27.894467+00:00 | Gentoo Importer | Affected by | VCID-1r8y-jjg8-aaac | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:27.845569+00:00 | Gentoo Importer | Affected by | VCID-a1nr-zzmq-aaag | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:27.796675+00:00 | Gentoo Importer | Affected by | VCID-qsxf-bepg-aaak | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:27.746209+00:00 | Gentoo Importer | Affected by | VCID-5nv9-hkcc-aaam | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:27.697667+00:00 | Gentoo Importer | Affected by | VCID-s6ad-1bz3-aaaj | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:27.648228+00:00 | Gentoo Importer | Affected by | VCID-fswn-m58k-aaak | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:27.601104+00:00 | Gentoo Importer | Affected by | VCID-fetj-m5rr-aaas | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:27.554944+00:00 | Gentoo Importer | Affected by | VCID-ah98-b6qr-aaak | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:27.508844+00:00 | Gentoo Importer | Affected by | VCID-7gw3-q645-aaaa | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:27.461635+00:00 | Gentoo Importer | Affected by | VCID-4n6s-aqht-aaaq | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:27.389207+00:00 | Gentoo Importer | Affected by | VCID-jf49-nkj8-aaaj | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:27.277551+00:00 | Gentoo Importer | Affected by | VCID-p3k8-6e5t-aaas | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:27.192012+00:00 | Gentoo Importer | Affected by | VCID-pa5e-re2b-aaaj | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-09-18T07:40:27.105197+00:00 | Gentoo Importer | Affected by | VCID-6gm2-wd6m-aaaq | https://security.gentoo.org/glsa/201209-25 | 34.0.1 |
2024-01-04T01:46:24.143312+00:00 | Gentoo Importer | Affected by | VCID-m3v7-b6tr-aaaa | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:24.090071+00:00 | Gentoo Importer | Affected by | VCID-pehg-kk6h-aaae | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:24.042147+00:00 | Gentoo Importer | Affected by | VCID-jtu2-tmr8-aaas | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.993561+00:00 | Gentoo Importer | Affected by | VCID-6f1s-nevu-aaas | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.945707+00:00 | Gentoo Importer | Affected by | VCID-uyzx-g3m8-aaam | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.895313+00:00 | Gentoo Importer | Affected by | VCID-nrt6-e1rr-aaaa | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.845434+00:00 | Gentoo Importer | Affected by | VCID-4wm6-we6u-aaap | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.800161+00:00 | Gentoo Importer | Affected by | VCID-c1xm-7ayh-aaaf | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.754748+00:00 | Gentoo Importer | Affected by | VCID-wtp4-179x-aaac | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.709639+00:00 | Gentoo Importer | Affected by | VCID-97wy-acxg-aaac | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.664596+00:00 | Gentoo Importer | Affected by | VCID-7nz3-h5na-aaab | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.619250+00:00 | Gentoo Importer | Affected by | VCID-p6fe-jgzc-aaae | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.573978+00:00 | Gentoo Importer | Affected by | VCID-ysde-9ngt-aaag | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.528606+00:00 | Gentoo Importer | Affected by | VCID-jgye-qfzm-aaan | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.480578+00:00 | Gentoo Importer | Affected by | VCID-ahh2-fayx-aaaf | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.432574+00:00 | Gentoo Importer | Affected by | VCID-5uq8-xwe5-aaae | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.384642+00:00 | Gentoo Importer | Affected by | VCID-324b-yk3u-aaaj | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.334708+00:00 | Gentoo Importer | Affected by | VCID-gcc7-tmmq-aaaj | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.286662+00:00 | Gentoo Importer | Affected by | VCID-9p8g-csu6-aaad | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.238298+00:00 | Gentoo Importer | Affected by | VCID-hcwx-gks2-aaaf | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.190366+00:00 | Gentoo Importer | Affected by | VCID-75h2-y5kg-aaap | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.142434+00:00 | Gentoo Importer | Affected by | VCID-aa2z-nmw2-aaaa | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.092176+00:00 | Gentoo Importer | Affected by | VCID-ns7f-1qct-aaap | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.046733+00:00 | Gentoo Importer | Affected by | VCID-1r8y-jjg8-aaac | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:23.001480+00:00 | Gentoo Importer | Affected by | VCID-a1nr-zzmq-aaag | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:22.956134+00:00 | Gentoo Importer | Affected by | VCID-qsxf-bepg-aaak | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:22.910673+00:00 | Gentoo Importer | Affected by | VCID-5nv9-hkcc-aaam | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:22.865455+00:00 | Gentoo Importer | Affected by | VCID-s6ad-1bz3-aaaj | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:22.820196+00:00 | Gentoo Importer | Affected by | VCID-fswn-m58k-aaak | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:22.774904+00:00 | Gentoo Importer | Affected by | VCID-fetj-m5rr-aaas | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:22.724832+00:00 | Gentoo Importer | Affected by | VCID-ah98-b6qr-aaak | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:22.671839+00:00 | Gentoo Importer | Affected by | VCID-7gw3-q645-aaaa | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:22.623671+00:00 | Gentoo Importer | Affected by | VCID-4n6s-aqht-aaaq | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:22.568160+00:00 | Gentoo Importer | Affected by | VCID-jf49-nkj8-aaaj | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:22.512539+00:00 | Gentoo Importer | Affected by | VCID-p3k8-6e5t-aaas | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:22.461439+00:00 | Gentoo Importer | Affected by | VCID-pa5e-re2b-aaaj | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |
2024-01-04T01:46:22.411201+00:00 | Gentoo Importer | Affected by | VCID-6gm2-wd6m-aaaq | https://security.gentoo.org/glsa/201209-25 | 34.0.0rc1 |