[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87888

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 235 Download | Alert*

The host is installed with libXi before 1.7.2 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle vectors related to the (1) XGetDeviceControl, (2) XGetFeedbackControl, (3) XGetDeviceDontPropagateList, (4) XGetDeviceMotionEvents, (5) XIGetProperty, (6) XIGetSelectedEvents, (7) XGetDeviceProperties, and (8) XListInputDe ...

The host is installed with libXi before 1.7.2 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle vectors related to an unexpected sign extension in the XListInputDevices function. Successful exploitation could allow attackers to trigger allocation of insufficient memory and a buffer overflow.

The host is installed with libXi before 1.7.2 and is prone to multiple array index vulnerabilities. The flaws are present in the application, which fails to properly handle crafted length or index values. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with libX11 before 1.5.99.902 and is prone to multiple array index vulnerabilities. The flaws are present in the application, which fails to properly handle crafted length or index values. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with libX11 before 1.5.99.902 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unbounded recursion. Successful exploitation could allow attackers to crash the service.

The host is installed with kernel before 2.6.38 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted instruction that triggers an L2 emulation failure report. Successful exploitation allow remote attackers to cause a denial of service (crash).

The host is installed with kernel before 3.17.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows guest OS users to cause a denial of service (guest OS crash).

The host is installed with Linux kernel through 3.17 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag. Successful exploitation allows local users to cause a denial of service (file unavailability).

The host is installed with kernel before 3.17.4 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a large message length in an ioctl call. Successful exploitation allows local users to cause a denial of service (system crash) or possibly gain privileges.

The host is installed with gnutls before 3.1.0 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate. Successful exploitation could allow remote attackers to conduct downgrade attacks.


Pages:      Start    11    12    13    14    15    16    17    18    19    20    21    22    23    ..   23

© SecPod Technologies