It appears that Virtual Floppy Drive is susceptible to an old zlib vulnerability associated with version 1.2.2.
3daf388470e7d15edc4431b7389876a80edcbb536864ae8adc82a4c291b0bb1d
The Microsoft Windows binary of curl contains a vulnerable version of zlib.
23ffc0004b9551d2eac301f99d76817eaf4fd4cb36162d70811e58df6ded7a07
The Microsoft Windows binary GSV48W32.EXE of gsview contains a vulnerable version of zlib.
4f5970a0b756c59df38bb2646529f1f975572ff3992b0be14d2bee4befb49e8c
VMware Security Advisory - ESX 3.0.1 and 3.0.0 patches address several security issues.
00501d3613c989dc8596886834f4aebb712f92e614164602fc56e3fbe61fd121
HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running Secure Shell. The vulnerability could be remotely exploited to allow a remote unauthorized user to create a Denial of Service (DoS).
dc02c527d36d623d913743e0c14161f5abf473d8d08eff7f578d31a6215fb07c
Ubuntu Security Notice USN-151-3 - USN-148-1 and USN-151-1 fixed two security flaws in zlib, which could be exploited to cause Denial of Service attacks or even arbitrary code execution with malicious data streams. Since aide is statically linked against the zlib library, it is also affected by these issues.
e648bcae15214f4071931ab9828a2a130291bfc0ecfc2a39cc9d2a7b39d43c78
Debian Security Advisory DSA 797-1 - zsync, a file transfer program, includes a modified local copy of the zlib library, and is vulnerable to certain bugs fixed previously in the zlib package.
974b95d3160474ce193e25a58a06b9f3ec51396dd5957e989da3dfe46ddd1a6f
Gentoo Linux Security Advisory GLSA 200508-01 - Compress::Zlib 1.34 contains a local vulnerable version of zlib, which may lead to a buffer overflow. Versions less than 1.35 are affected.
bc9a69053ab214f7d9b24fa169499b25dd37e79dc612b68d4e5870746dbaa76e
Gentoo Linux Security Advisory GLSA 200507-28 - Earlier versions of emul-linux-x86-baselibs contain a vulnerable version of zlib, which may lead to a buffer overflow. Versions less than 2.2 are affected.
089895ad37abaac24f0dad3f6afe89af8a82368d5cba6cecff5434588a1426fb
Gentoo Linux Security Advisory GLSA 200507-05 - Tavis Ormandy of the Gentoo Linux Security Audit Team discovered a buffer overflow in zlib. A bounds checking operation failed to take invalid data into account, allowing a specifically malformed deflate data stream to overrun a buffer. Versions less than 1.2.2-r1 are affected.
63f68356a58d88284addd99b7f7714f60f275a5674597e8a3ec1dd09f4e6c7de