Page 133 of 1430 results (0.025 seconds)

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 1

driver/subprocs.c in XScreenSaver before 5.34 does not properly perform an internal consistency check, which allows physically proximate attackers to bypass the lock screen by hot swapping monitors. driver/subprocs.c en XScreenSaver en versiones anteriores a 5.34 no lleva a cabo correctamente una comprobación de consistencia interna, lo que permite a atacantes físicamente próximos eludir la pantalla de bloqueo cambiando los monitores sin apagar el dispositivo. • http://lists.opensuse.org/opensuse-updates/2015-11/msg00102.html http://www.debian.org/security/2016/dsa-3438 http://www.openwall.com/lists/oss-security/2015/10/24/2 http://www.openwall.com/lists/oss-security/2015/10/25/1 http://www.openwall.com/lists/oss-security/2015/10/29/12 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securitytracker.com/id/1034052 http://www.ubuntu.com/usn/USN-2789-1 https://twitter.com/Thaolia& • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 4%CPEs: 7EXPL: 0

Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (infinite loop) via empty bzip2 data in a ZIP archive. Info-ZIP UnZip 6.0 permite a atacantes remotos provocar una denegación de servicio (bucle infinito) a través de dato bzip2 vacío en un archivo ZIP. • http://sourceforge.net/p/infozip/patches/23 http://www.debian.org/security/2015/dsa-3386 http://www.openwall.com/lists/oss-security/2015/09/07/4 http://www.openwall.com/lists/oss-security/2015/09/15/6 http://www.openwall.com/lists/oss-security/2015/10/11/5 http://www.securityfocus.com/bid/76863 http://www.securitytracker.com/id/1034027 http://www.ubuntu.com/usn/USN-2788-1 http://www.ubuntu.com/usn/USN-2788-2 • CWE-399: Resource Management Errors •

CVSS: 6.8EPSS: 4%CPEs: 7EXPL: 0

Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly execute arbitrary code via a crafted password-protected ZIP archive, possibly related to an Extra-Field size value. Info-ZIP UnZip 6.0 permite a atacantes remotos provocar una denegación de servicio (sobre lectura de buffer basado en memoria dinámica y caída de aplicación) o posiblemente ejecutar código arbitrario a través de un archivo ZIP protegido con contraseña manipulado, posiblemente relacionado con un valor de tamaño Extra-Field. • http://www.debian.org/security/2015/dsa-3386 http://www.openwall.com/lists/oss-security/2015/09/07/4 http://www.openwall.com/lists/oss-security/2015/09/15/6 http://www.openwall.com/lists/oss-security/2015/09/21/6 http://www.openwall.com/lists/oss-security/2015/10/11/5 http://www.securityfocus.com/bid/76863 http://www.securitytracker.com/id/1034027 http://www.ubuntu.com/usn/USN-2788-1 http://www.ubuntu.com/usn/USN-2788-2 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.8EPSS: 1%CPEs: 6EXPL: 0

Buffer overflow in the afReadFrames function in audiofile (aka libaudiofile and Audio File Library) allows user-assisted remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted audio file, as demonstrated by sixteen-stereo-to-eight-mono.c. Un desbordamiento del búfer en la función afReadFrames en audiofile (también se conoce como libaudiofile and Audio File Library), permite a atacantes remotos asistidos por el usuario causar una denegación de servicio (bloqueo del programa) o posiblemente ejecutar código arbitrario por medio de un archivo de audio diseñado, como es demostrado por el archivo sixteen-stereo-to-eight-mono.c • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170387.html http://www.openwall.com/lists/oss-security/2015/10/06/2 http://www.ubuntu.com/usn/USN-2787-1 https://bugs.launchpad.net/ubuntu/+source/audiofile/+bug/1502721 https://github.com/ccrisan/motioneyeos/blob/master/package/audiofile/0008-CVE-2015-7747.patch https://www.openwall.com/lists/oss-security/2015/10/08/1 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 4%CPEs: 18EXPL: 1

ntp_openssl.m4 in ntpd in NTP before 4.2.7p112 allows remote attackers to cause a denial of service (segmentation fault) via a crafted statistics or filegen configuration command that is not enabled during compilation. ntp_openssl.m4 en ntpd en NTP anterior a 4.2.7p112, permite a los atacantes remotos causar una denegación de servicio (fallo de segmentación) por medio de un comando de configuración statistics o filegen creadas que no está habilitado durante la compilación. It was found that ntpd would exit with a segmentation fault when a statistics type that was not enabled during compilation (e.g. timingstats) was referenced by the statistics or filegen configuration command. • https://github.com/theglife214/CVE-2015-5195 http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.html http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169167.html http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166992.html http://rhn.redhat.com/errata/RHSA-2016-0780.html http://rhn.redhat.com/errata/RHSA-2016-2583.html http://www.debian.org/security/2015/dsa-3388 http://www.openwall.com/lists/oss-security/2015/08/25& • CWE-20: Improper Input Validation CWE-476: NULL Pointer Dereference •