CVE-2015-0471
https://notcve.org/view.php?id=CVE-2015-0471
Unspecified vulnerability in Oracle Sun Solaris 10 and 11.2 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to libelfsign. Vulnerabilidad no especificada en Oracle Sun Solaris 10 y 11.2 permite a usuarios locales afectar la confidencialidad, la integridad y la disponibilidad a través de vectores desconocido relacionados con libelfsign. • http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html http://www.securityfocus.com/bid/74138 http://www.securitytracker.com/id/1032132 •
CVE-2015-2574
https://notcve.org/view.php?id=CVE-2015-2574
Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect confidentiality via unknown vectors related to Text Utilities. Vulnerabilidad no especificada en Oracle Sun Solaris 10 permite a usuarios locales afectar la confidencialidad a través de vectores desconocidos relacionados con Text Utilities. • http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html http://www.securityfocus.com/bid/74142 http://www.securitytracker.com/id/1032132 •
CVE-2015-2577
https://notcve.org/view.php?id=CVE-2015-2577
Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Accounting commands. Vulnerabilidad no especificada en Oracle Sun Solaris 10 permite a usuarios locales afectar la confidencialidad, la integridad y la disponibilidad a través de vectores desconocidos relacionados con comandos de contabilidad. • http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html http://www.securityfocus.com/bid/74122 http://www.securitytracker.com/id/1032132 •
CVE-2014-9512
https://notcve.org/view.php?id=CVE-2014-9512
rsync 3.1.1 allows remote attackers to write to arbitrary files via a symlink attack on a file in the synchronization path. rsync 3.1.1 permite a atacantes remotos escribir a ficheros arbitrarios a través de un ataque de enlace simbólico sobre un fichero en la ruta de sincronización. • http://lists.opensuse.org/opensuse-updates/2015-02/msg00041.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00095.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00112.html http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html http://www.securityfocus.com/bid/76093 http://www.securitytracker.com/id/1034786 http://www.ubuntu.com/usn/USN-2879-1 http://xteam.baidu.com/?p=169 https://bugzilla.samba.org/show_bug.cgi?id=10977 https: • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2014-9666
https://notcve.org/view.php?id=CVE-2014-9666
The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap. La función tt_sbit_decoder_init en sfnt/ttsbit.c en FreeType anterior a 2.5.4 proceda con una asociación de contar a tamaño (count-to-size) sin restringir el valor de la cuenta, lo que permite a atacantes remotos causar una denegación de servicio (desbordamiento de enteros y lectura fuera de rango o posiblemente tener otro impacto a través de un bitmap embebido manipulado. • http://advisories.mageia.org/MGASA-2015-0083.html http://code.google.com/p/google-security-research/issues/detail?id=167 http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=257c270bd25e15890190a28a1456e7623bba4439 http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html http://www.debian.org/security/2015/dsa-3188 http • CWE-189: Numeric Errors •