Vulnerability Database
Blog
FAQ
Docs
DSA-1473-1
See a problem?
Please try reporting it
to the source
first.
Source
https://security-tracker.debian.org/tracker/DSA-1473-1
Import Source
https://storage.googleapis.com/debian-osv/dsa-osv/DSA-1473-1.json
JSON Data
https://api.osv.dev/v1/vulns/DSA-1473-1
Related
CVE-2007-6350
CVE-2007-6415
Published
2008-01-21T00:00:00Z
Modified
2024-01-09T20:22:20.461245Z
Summary
scponly - arbitrary code execution
Details
References
Affected packages
Debian:3.1
/
scponly
Package
Name
scponly
Purl
pkg:deb/debian/scponly?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
4.0-1sarge2
Affected versions
4.*
4.0-1
4.0-1sarge1
Debian:4.0
/
scponly
Package
Name
scponly
Purl
pkg:deb/debian/scponly?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
4.6-1etch1
Affected versions
4.*
4.6-1
DSA-1473-1 - OSV