Page 117 of 3742 results (0.014 seconds)

CVSS: 9.8EPSS: 16%CPEs: 7EXPL: 0

19 Dec 2018 — LibVNC before commit 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d contains heap out-of-bound write vulnerability inside structure in VNC client code that can result remote code execution LibVNC antes del commit con ID 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d contiene una vulnerabilidad de escritura de memoria dinámica (heap) fuera de límites en la estructura del código del cliente VNC que puede resultar en la ejecución remota de código. Nicolas Ruff discovered that iTALC had buffer overflows, divide-by-zero err... • https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-030-libvnc-heap-out-of-bound-write • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 5%CPEs: 7EXPL: 0

19 Dec 2018 — LibVNC before 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838 contains multiple weaknesses CWE-665: Improper Initialization vulnerability in VNC client code that allows attacker to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR LibVNC en versiones anteriores a la 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838 contiene múltiples debilidades CWE-665: inicialización incorrecta en el código del cliente VNC q... • https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-032-libvnc-multiple-memory-leaks • CWE-665: Improper Initialization •

CVSS: 7.5EPSS: 2%CPEs: 7EXPL: 0

19 Dec 2018 — LibVNC before commit 4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7 contains null pointer dereference in VNC client code that can result DoS. LibVNC antes del commit con ID 4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7 contiene una desreferencia de puntero NULL en el código del cliente VNC que puede resultar en una denegación de servicio (DoS). It was discovered that an information disclosure vulnerability existed in the LibVNCServer vendored in iTALC when sending a ServerCutText message. An attacker could possibly us... • https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-034-libvnc-null-pointer-dereference • CWE-476: NULL Pointer Dereference •

CVSS: 8.1EPSS: 11%CPEs: 7EXPL: 0

19 Dec 2018 — LibVNC before commit ca2a5ac02fbbadd0a21fabba779c1ea69173d10b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution. LibVNC antes del commit con ID ca2a5ac02fbbadd0a21fabba779c1ea69173d10b contiene una vulnerabilidad de uso de memoria dinámica (heap) previamente liberada en el código del servidor de la extensión de transferencia de archivos que puede resultar en la ejecución remota de código. Pavel Cheremushkin discovered several vulnerabi... • https://github.com/LibVNC/libvncserver/issues/241 • CWE-416: Use After Free •

CVSS: 9.8EPSS: 15%CPEs: 13EXPL: 0

19 Dec 2018 — LibVNC before commit 502821828ed00b4a2c4bef90683d0fd88ce495de contains heap out-of-bound write vulnerability in server code of file transfer extension that can result remote code execution LibVNC antes del commit con ID 502821828ed00b4a2c4bef90683d0fd88ce495de contiene una vulnerabilidad de escritura de memoria dinámica (heap) fuera de límites en el código del servidor de la extensión de transferencia de archivos que puede resultar en la ejecución remota de código. It was discovered that an information disc... • https://access.redhat.com/errata/RHSA-2019:0059 • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 7%CPEs: 7EXPL: 0

19 Dec 2018 — LibVNC before commit 73cb96fec028a576a5a24417b57723b55854ad7b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution LibVNC antes del commit con ID 73cb96fec028a576a5a24417b57723b55854ad7b contiene una vulnerabilidad de uso de memoria dinámica (heap) previamente liberada en el código del servidor de la extensión de transferencia de archivos que puede resultar en la ejecución remota de código. It was discovered that LibVNCServer incorrectly ... • https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-027-libvnc-heap-use-after-free • CWE-416: Use After Free •

CVSS: 5.3EPSS: 0%CPEs: 7EXPL: 0

18 Dec 2018 — An issue was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9, and 4.2.x before 4.2.1. When using the scalar type hint `string` in a setter method (e.g. `setName(string $name)`) of a class that's the `data_class` of a form, and when a file upload is submitted to the corresponding field instead of a normal text input, then `UploadedFile::__toString()` is called which will then return and disclose the path of the uploaded file. If combi... • http://www.securityfocus.com/bid/106249 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 8.0EPSS: 0%CPEs: 12EXPL: 0

18 Dec 2018 — A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. Se ha encontrado un error en el subsistema de archivos NFS41+ del kernel de Linux. • http://www.securityfocus.com/bid/106253 • CWE-416: Use After Free •

CVSS: 6.1EPSS: 0%CPEs: 8EXPL: 0

18 Dec 2018 — An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restrictions and effectively redirect the user to any domain after login. Se ha descubierto una redirección abierta en Symfony en versiones 2.7.x anteriores a la 2.7.50, versiones 2.8.x anteriores a la 2.8.49, versiones 3... • http://www.securityfocus.com/bid/106249 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

18 Dec 2018 — There is a stack-based buffer overflow in the third instance of the calculate_gain function in libfaad/sbr_hfadj.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. A crafted input will lead to a denial of service or possibly unspecified other impact because the S_M array is mishandled. Hay un desbordamiento de búfer basado en pila en la tercera instancia de la función calculate_gain en libfaad/sbr_hfadj.c en Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. Se podría realizar un ataque de denegación de se... • https://github.com/knik0/faad2/issues/19 • CWE-787: Out-of-bounds Write •