Ubuntu Security Notice 4919-1 - It was discovered that OpenSLP did not properly validate URLs. A remote attacker could use this issue to cause OpenSLP to crash or possibly execute arbitrary code.
1df3203dfcd132b2d94298077fedeb17ca3e5f826e72ea5070c9d402f0ae889a
Gentoo Linux Security Advisory 202005-12 - Multiple vulnerabilities have been found in OpenSLP, the worst of which could result in the arbitrary execution of code. Versions less than or equal to 2.0.0-r5 are affected.
556ed88a88673e3ae306f769029cc5879baf1584d96d1dc5596110e415cbfb52
Red Hat Security Advisory 2020-0199-01 - OpenSLP is an open source implementation of the Service Location Protocol which is an Internet Engineering Task Force standards track protocol and provides a framework to allow networking applications to discover the existence, location, and configuration of networked services in enterprise networks. Issues addressed include buffer overflow and code execution vulnerabilities.
ee1a609d44b1e387587fd42bd06f64b674a73e249a8bfdf2acef73f85c2fc139
Red Hat Security Advisory 2019-4240-01 - OpenSLP is an open source implementation of the Service Location Protocol which is an Internet Engineering Task Force standards track protocol and provides a framework to allow networking applications to discover the existence, location, and configuration of networked services in enterprise networks. Issues addressed include buffer overflow and code execution vulnerabilities.
986031b7b9d42331efccab56752cc939788ba78b0721fb9de1932a2a9d6318b4