Search for packages
purl | pkg:ebuild/kde-base/kdm@7.1 |
Next non-vulnerable version | 8.4.18-r1 |
Latest non-vulnerable version | 804.028-r2 |
Risk | 10.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-1hh8-62ty-aaaa
Aliases: CVE-2010-0732 |
gdk/gdkwindow.c in GTK+ before 2.18.5, as used in gnome-screensaver before 2.28.1, performs implicit paints on windows of type GDK_WINDOW_FOREIGN, which triggers an X error in certain circumstances and consequently allows physically proximate attackers to bypass screen locking and access an unattended workstation by pressing the Enter key many times. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-1jzu-evut-aaaj
Aliases: CVE-2010-0001 |
Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-2bfw-g4nt-aaaq
Aliases: CVE-2010-2056 |
GNU gv before 3.7.0 allows local users to overwrite arbitrary files via a symlink attack on a temporary file. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-324b-yk3u-aaaj
Aliases: CVE-2009-0040 |
CVE-2009-0040 libpng arbitrary free() flaw |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-3ny7-bryb-aaad
Aliases: CVE-2010-1511 |
CVE-2010-1000 CVE-2010-1511 kdenetwork: improper sanitization of metalink attribute for downloading files |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-4bxv-tkhm-aaar
Aliases: CVE-2008-1382 |
CVE-2008-1382 libpng unknown chunk handling flaw |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-4kvw-jbhm-aaae
Aliases: CVE-2010-2251 |
The get1 command, as used by lftpget, in LFTP before 4.0.6 does not properly validate a server-provided filename before determining the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a Content-Disposition header that suggests a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-5efc-3mxh-aaaq
Aliases: CVE-2009-0946 |
Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-6554-n4af-aaaj
Aliases: CVE-2010-0829 |
Multiple array index errors in set.c in dvipng 1.11 and 1.12, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed DVI file. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-6aua-1ypj-aaah
Aliases: CVE-2010-2945 |
The default configuration of SLiM before 1.3.2 places ./ (dot slash) at the beginning of the default_path option, which might allow local users to gain privileges via a Trojan horse program in the current working directory, related to slim.conf and cfg.cpp. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-94c8-pgaf-aaad
Aliases: CVE-2009-4029 |
CVE-2009-4029 Automake: Race condition by creation of "distdir" based directory hierarchy |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-b6ge-jcrd-aaaq
Aliases: CVE-2008-6218 |
CVE-2008-6218 libpng: "png_handle_tEXt()" memory leak vulnerability - DoS (memory exhaustion) via a crafted PNG file. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-b73r-cav3-aaae
Aliases: CVE-2010-2060 |
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-cm5w-cvy3-aaar
Aliases: CVE-2010-0436 |
CVE-2010-0436 kdm privilege escalation flaw |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-cq4v-6npr-aaae
Aliases: CVE-2009-0361 |
Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-h411-6zh8-aaan
Aliases: CVE-2009-0360 |
Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-h9h1-h44a-aaas
Aliases: CVE-2008-5907 |
CVE-2008-5907 libpng,libpng10: Zeroing value of an arbitrary memory location in utilities for writing PNG files |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-kdf2-e615-aaaj
Aliases: CVE-2009-3736 |
ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-kzvy-qy9e-aaah
Aliases: CVE-2009-2624 |
The huft_build function in inflate.c in gzip before 1.3.13 creates a hufts (aka huffman) table that is too small, which allows remote attackers to cause a denial of service (application crash or infinite loop) or possibly execute arbitrary code via a crafted archive. NOTE: this issue is caused by a CVE-2006-4334 regression. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-m75x-8caa-aaah
Aliases: CVE-2009-4411 |
The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-mwu7-u4py-aaas
Aliases: CVE-2008-0553 |
Stack-based buffer overflow in the ReadImage function in tkImgGIF.c in Tk (Tcl/Tk) before 8.5.1 allows remote attackers to execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-n2s3-deqk-aaam
Aliases: CVE-2006-3005 |
The JPEG library in media-libs/jpeg before 6b-r7 on Gentoo Linux is built without the -maxmem feature, which could allow context-dependent attackers to cause a denial of service (memory exhaustion) via a crafted JPEG file that exceeds the intended memory limits. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-n6d7-z5xp-aaaa
Aliases: CVE-2009-4896 |
Multiple directory traversal vulnerabilities in the mlmmj-php-admin web interface for Mailing List Managing Made Joyful (mlmmj) 1.2.15 through 1.2.17 allow remote authenticated users to overwrite, create, or delete arbitrary files, or determine the existence of arbitrary directories, via a .. (dot dot) in a list name in a (1) edit or (2) save action. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-p1vr-dybe-aaaj
Aliases: CVE-2010-2529 |
Unspecified vulnerability in ping.c in iputils 20020927, 20070202, 20071127, and 20100214 on Mandriva Linux allows remote attackers to cause a denial of service (hang) via a crafted echo response. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-qbdj-5438-aaar
Aliases: CVE-2010-2192 |
The make_lockdir_name function in policy.c in pmount 0.9.18 allow local users to overwrite arbitrary files via a symlink attack on a file in /var/lock/. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-rspx-3qs1-aaaf
Aliases: CVE-2007-2741 |
Stack-based buffer overflow in Little CMS (lcms) before 1.15 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted ICC profile in a JPG file. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-tdub-7gfq-aaaq
Aliases: CVE-2008-6661 |
Multiple integer overflows in the scanning engine in Bitdefender for Linux 7.60825 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed (1) NeoLite and (2) ASProtect packed PE file. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-wnh2-s874-aaaj
Aliases: CVE-2010-1205 |
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Buffer overflow in pngpread.c in libpng, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-x576-evu3-aaaa
Aliases: CVE-2009-2042 |
libpng before 1.2.37 does not properly parse 1-bit interlaced images with width values that are not divisible by 8, which causes libpng to include uninitialized bits in certain rows of a PNG file and might allow remote attackers to read portions of sensitive memory via "out-of-bounds pixels" in the file. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-xnty-rjac-aaar
Aliases: CVE-2010-1000 |
CVE-2010-1000 CVE-2010-1511 kdenetwork: improper sanitization of metalink attribute for downloading files |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-zctz-yts9-aaan
Aliases: CVE-2010-2809 |
The default configuration of the <Button2> binding in Uzbl before 2010.08.05 does not properly use the @SELECTED_URI feature, which allows user-assisted remote attackers to execute arbitrary commands via a crafted HREF attribute of an A element in an HTML document. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T13:04:14.680569+00:00 | Gentoo Importer | Affected by | VCID-6aua-1ypj-aaah | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:04:10.180477+00:00 | Gentoo Importer | Affected by | VCID-zctz-yts9-aaan | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:04:05.753266+00:00 | Gentoo Importer | Affected by | VCID-p1vr-dybe-aaaj | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:04:01.371544+00:00 | Gentoo Importer | Affected by | VCID-4kvw-jbhm-aaae | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:03:56.766042+00:00 | Gentoo Importer | Affected by | VCID-qbdj-5438-aaar | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:03:52.165591+00:00 | Gentoo Importer | Affected by | VCID-b73r-cav3-aaae | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:03:47.744049+00:00 | Gentoo Importer | Affected by | VCID-2bfw-g4nt-aaaq | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:03:43.130831+00:00 | Gentoo Importer | Affected by | VCID-3ny7-bryb-aaad | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:03:38.529296+00:00 | Gentoo Importer | Affected by | VCID-wnh2-s874-aaaj | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:03:34.029612+00:00 | Gentoo Importer | Affected by | VCID-xnty-rjac-aaar | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:03:29.502293+00:00 | Gentoo Importer | Affected by | VCID-6554-n4af-aaaj | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:03:24.899352+00:00 | Gentoo Importer | Affected by | VCID-1hh8-62ty-aaaa | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:03:20.282336+00:00 | Gentoo Importer | Affected by | VCID-cm5w-cvy3-aaar | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:03:15.673703+00:00 | Gentoo Importer | Affected by | VCID-1jzu-evut-aaaj | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:03:11.081258+00:00 | Gentoo Importer | Affected by | VCID-n6d7-z5xp-aaaa | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:03:06.369762+00:00 | Gentoo Importer | Affected by | VCID-m75x-8caa-aaah | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:03:01.689105+00:00 | Gentoo Importer | Affected by | VCID-94c8-pgaf-aaad | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:02:57.038820+00:00 | Gentoo Importer | Affected by | VCID-kdf2-e615-aaaj | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:02:52.438204+00:00 | Gentoo Importer | Affected by | VCID-kzvy-qy9e-aaah | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:02:47.851870+00:00 | Gentoo Importer | Affected by | VCID-x576-evu3-aaaa | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:02:43.265655+00:00 | Gentoo Importer | Affected by | VCID-5efc-3mxh-aaaq | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:02:38.679743+00:00 | Gentoo Importer | Affected by | VCID-cq4v-6npr-aaae | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:02:34.083824+00:00 | Gentoo Importer | Affected by | VCID-h411-6zh8-aaan | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:02:29.496021+00:00 | Gentoo Importer | Affected by | VCID-324b-yk3u-aaaj | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:02:24.925037+00:00 | Gentoo Importer | Affected by | VCID-tdub-7gfq-aaaq | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:02:20.343943+00:00 | Gentoo Importer | Affected by | VCID-b6ge-jcrd-aaaq | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:02:15.763366+00:00 | Gentoo Importer | Affected by | VCID-h9h1-h44a-aaas | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:02:11.165493+00:00 | Gentoo Importer | Affected by | VCID-4bxv-tkhm-aaar | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:02:06.545612+00:00 | Gentoo Importer | Affected by | VCID-mwu7-u4py-aaas | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:02:01.946710+00:00 | Gentoo Importer | Affected by | VCID-rspx-3qs1-aaaf | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2025-03-28T13:01:57.350950+00:00 | Gentoo Importer | Affected by | VCID-n2s3-deqk-aaam | https://security.gentoo.org/glsa/201412-08 | 36.0.0 |
2024-09-18T07:58:18.613318+00:00 | Gentoo Importer | Affected by | VCID-6aua-1ypj-aaah | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:58:14.112296+00:00 | Gentoo Importer | Affected by | VCID-zctz-yts9-aaan | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:58:09.648199+00:00 | Gentoo Importer | Affected by | VCID-p1vr-dybe-aaaj | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:58:05.197813+00:00 | Gentoo Importer | Affected by | VCID-4kvw-jbhm-aaae | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:58:00.741318+00:00 | Gentoo Importer | Affected by | VCID-qbdj-5438-aaar | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:57:56.416193+00:00 | Gentoo Importer | Affected by | VCID-b73r-cav3-aaae | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:57:51.954125+00:00 | Gentoo Importer | Affected by | VCID-2bfw-g4nt-aaaq | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:57:47.492067+00:00 | Gentoo Importer | Affected by | VCID-3ny7-bryb-aaad | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:57:43.147040+00:00 | Gentoo Importer | Affected by | VCID-wnh2-s874-aaaj | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:57:38.693077+00:00 | Gentoo Importer | Affected by | VCID-xnty-rjac-aaar | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:57:34.254000+00:00 | Gentoo Importer | Affected by | VCID-6554-n4af-aaaj | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:57:29.814371+00:00 | Gentoo Importer | Affected by | VCID-1hh8-62ty-aaaa | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:57:25.374856+00:00 | Gentoo Importer | Affected by | VCID-cm5w-cvy3-aaar | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:57:20.930340+00:00 | Gentoo Importer | Affected by | VCID-1jzu-evut-aaaj | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:57:16.499376+00:00 | Gentoo Importer | Affected by | VCID-n6d7-z5xp-aaaa | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:57:12.048004+00:00 | Gentoo Importer | Affected by | VCID-m75x-8caa-aaah | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:57:07.621101+00:00 | Gentoo Importer | Affected by | VCID-94c8-pgaf-aaad | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:57:03.177613+00:00 | Gentoo Importer | Affected by | VCID-kdf2-e615-aaaj | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:56:58.740410+00:00 | Gentoo Importer | Affected by | VCID-kzvy-qy9e-aaah | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:56:54.295405+00:00 | Gentoo Importer | Affected by | VCID-x576-evu3-aaaa | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:56:49.832325+00:00 | Gentoo Importer | Affected by | VCID-5efc-3mxh-aaaq | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:56:45.437809+00:00 | Gentoo Importer | Affected by | VCID-cq4v-6npr-aaae | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:56:40.994147+00:00 | Gentoo Importer | Affected by | VCID-h411-6zh8-aaan | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:56:36.556186+00:00 | Gentoo Importer | Affected by | VCID-324b-yk3u-aaaj | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:56:32.140003+00:00 | Gentoo Importer | Affected by | VCID-tdub-7gfq-aaaq | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:56:27.705541+00:00 | Gentoo Importer | Affected by | VCID-b6ge-jcrd-aaaq | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:56:23.288627+00:00 | Gentoo Importer | Affected by | VCID-h9h1-h44a-aaas | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:56:18.857111+00:00 | Gentoo Importer | Affected by | VCID-4bxv-tkhm-aaar | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:56:14.425233+00:00 | Gentoo Importer | Affected by | VCID-mwu7-u4py-aaas | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:56:09.989767+00:00 | Gentoo Importer | Affected by | VCID-rspx-3qs1-aaaf | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-09-18T07:56:05.511681+00:00 | Gentoo Importer | Affected by | VCID-n2s3-deqk-aaam | https://security.gentoo.org/glsa/201412-08 | 34.0.1 |
2024-01-04T02:03:02.230462+00:00 | Gentoo Importer | Affected by | VCID-6aua-1ypj-aaah | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:02:57.600243+00:00 | Gentoo Importer | Affected by | VCID-zctz-yts9-aaan | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:02:52.956557+00:00 | Gentoo Importer | Affected by | VCID-p1vr-dybe-aaaj | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:02:48.324029+00:00 | Gentoo Importer | Affected by | VCID-4kvw-jbhm-aaae | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:02:43.708842+00:00 | Gentoo Importer | Affected by | VCID-qbdj-5438-aaar | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:02:39.094837+00:00 | Gentoo Importer | Affected by | VCID-b73r-cav3-aaae | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:02:34.534484+00:00 | Gentoo Importer | Affected by | VCID-2bfw-g4nt-aaaq | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:02:29.667404+00:00 | Gentoo Importer | Affected by | VCID-3ny7-bryb-aaad | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:02:25.100470+00:00 | Gentoo Importer | Affected by | VCID-wnh2-s874-aaaj | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:02:20.695727+00:00 | Gentoo Importer | Affected by | VCID-xnty-rjac-aaar | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:02:16.092635+00:00 | Gentoo Importer | Affected by | VCID-6554-n4af-aaaj | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:02:11.502647+00:00 | Gentoo Importer | Affected by | VCID-1hh8-62ty-aaaa | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:02:06.883393+00:00 | Gentoo Importer | Affected by | VCID-cm5w-cvy3-aaar | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:02:02.259876+00:00 | Gentoo Importer | Affected by | VCID-1jzu-evut-aaaj | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:01:57.643323+00:00 | Gentoo Importer | Affected by | VCID-n6d7-z5xp-aaaa | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:01:53.047195+00:00 | Gentoo Importer | Affected by | VCID-m75x-8caa-aaah | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:01:48.428881+00:00 | Gentoo Importer | Affected by | VCID-94c8-pgaf-aaad | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:01:43.821652+00:00 | Gentoo Importer | Affected by | VCID-kdf2-e615-aaaj | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:01:39.214303+00:00 | Gentoo Importer | Affected by | VCID-kzvy-qy9e-aaah | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:01:34.613855+00:00 | Gentoo Importer | Affected by | VCID-x576-evu3-aaaa | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:01:30.005440+00:00 | Gentoo Importer | Affected by | VCID-5efc-3mxh-aaaq | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:01:25.425007+00:00 | Gentoo Importer | Affected by | VCID-cq4v-6npr-aaae | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:01:20.837201+00:00 | Gentoo Importer | Affected by | VCID-h411-6zh8-aaan | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:01:16.251334+00:00 | Gentoo Importer | Affected by | VCID-324b-yk3u-aaaj | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:01:11.602376+00:00 | Gentoo Importer | Affected by | VCID-tdub-7gfq-aaaq | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:01:07.052454+00:00 | Gentoo Importer | Affected by | VCID-b6ge-jcrd-aaaq | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:01:02.464238+00:00 | Gentoo Importer | Affected by | VCID-h9h1-h44a-aaas | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:00:57.880394+00:00 | Gentoo Importer | Affected by | VCID-4bxv-tkhm-aaar | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:00:53.284701+00:00 | Gentoo Importer | Affected by | VCID-mwu7-u4py-aaas | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:00:48.686221+00:00 | Gentoo Importer | Affected by | VCID-rspx-3qs1-aaaf | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |
2024-01-04T02:00:44.123094+00:00 | Gentoo Importer | Affected by | VCID-n2s3-deqk-aaam | https://security.gentoo.org/glsa/201412-08 | 34.0.0rc1 |