Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Canonical Ltd.
  4. xz-utils (Ubuntu package)
  5. 5.6.2-2ubuntu0.2

Known Vulnerabilities in xz-utils (Ubuntu package) 5.6.2-2ubuntu0.2

Show more ↓
5.6.2-2ubuntu0.2
5.6.1+really5.4.5-1ubuntu0.2
5.2.5-2ubuntu0.1
5.2.4-1
5.2.4-1ubuntu1.1
5.2.4-1ubuntu1
5.2.4
5.2.2-1.3
5.2.2-1.3ubuntu0.1
5.2.2-1.2
5.2.2-1.1
5.2.2
5.1.1alpha+201206142ubuntu2.16.04.1+esm1
5.1.1alpha+20120614-2.1
5.1.1alpha+20120614-2.1ubuntu1
5.1.1alpha+20120614-2
5.1.1alpha+20120614-2ubuntu2
5.1.1alpha+20120614-2ubuntu1
5.1.1alpha+20120614-1
5.1.1alpha+20120614
5.1.1alpha+20110809-3
5.1.1alpha+20110809-2
5.1.1alpha+20110809-1
5.1.1alpha+20110809
5.0.0-2
5.0.0-1
4.999.9beta+20100927-1
4.999.9beta+20100903-1
4.999.9beta+20100810-1
4.999.9beta+20100713-1
4.999.9beta+20100602-1
4.999.9beta+20100527-1
4.999.9beta+20100307-1
4.999.9beta+20100212-4
4.999.9beta+20100212-3
4.999.9beta+20100212-2
4.999.9beta+20100212-1
4.999.9beta+20100131-1
4.999.9beta+20100117-1
4.999.9beta+20091116-1
4.999.9beta+20091016-1
4.999.9beta+20091004-1
4.999.9beta+20091002-1
4.999.9beta-1
4.999.8beta-1



Cybersecurity Help is unaware of any recent vulnerabilities affecting xz-utils (Ubuntu package) 5.6.2-2ubuntu0.2.


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Cyber Security Week in Review: May 23, 2025
  • Russian GRU hackers accused of massive espionage campaign across NATO and allied nations
  • Chinese-speaking threat actors exploit Cityworks zero-day to hack into US govt agencies
  • Infamous Lumma stealer malware disrupted in global takedown
  • Hazy Hawk hijacks abandoned cloud resources of global orgs to spread scams and malware
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.