Page 85 of 2170 results (0.015 seconds)

CVSS: 8.1EPSS: 63%CPEs: 7EXPL: 0

LibVNC before commit ca2a5ac02fbbadd0a21fabba779c1ea69173d10b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution. LibVNC antes del commit con ID ca2a5ac02fbbadd0a21fabba779c1ea69173d10b contiene una vulnerabilidad de uso de memoria dinámica (heap) previamente liberada en el código del servidor de la extensión de transferencia de archivos que puede resultar en la ejecución remota de código. • https://github.com/LibVNC/libvncserver/issues/241 https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-026-libvnc-heap-use-after-free https://lists.debian.org/debian-lts-announce/2018/12/msg00017.html https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html https://usn.ubuntu.com/3877-1 https://www.debian.org/security/2019/dsa-4383 • CWE-416: Use After Free •

CVSS: 9.8EPSS: 13%CPEs: 7EXPL: 0

LibVNC before commit 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d contains heap out-of-bound write vulnerability inside structure in VNC client code that can result remote code execution LibVNC antes del commit con ID 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d contiene una vulnerabilidad de escritura de memoria dinámica (heap) fuera de límites en la estructura del código del cliente VNC que puede resultar en la ejecución remota de código. • https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-030-libvnc-heap-out-of-bound-write https://lists.debian.org/debian-lts-announce/2018/12/msg00017.html https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html https://lists.debian.org/debian-lts-announce/2019/11/msg00033.html https://security.gentoo.org/glsa/201908-05 https://security.gentoo.org/glsa/202006-06 https://usn.ubuntu.com/3877-1 https://usn.ubuntu.com/4547-1 https:/& • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 3%CPEs: 20EXPL: 0

LibVNC before commit a83439b9fbe0f03c48eb94ed05729cb016f8b72f contains multiple heap out-of-bound write vulnerabilities in VNC client code that can result remote code execution LibVNC antes del commit con ID a83439b9fbe0f03c48eb94ed05729cb016f8b72f contiene múltiples vulnerabilidades de escritura de memoria dinámica (heap) fuera de límites en el código del cliente VNC que pueden resultar en la ejecución remota de código. • https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-029-libvnc-multiple-heap-out-of-bound-vulnerabilities https://lists.debian.org/debian-lts-announce/2018/12/msg00017.html https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html https://security.gentoo.org/glsa/201908-05 https://usn.ubuntu.com/3877-1 https://usn.ubuntu.com/4547-1 https://usn.ubuntu.com/4587-1 https:// • CWE-787: Out-of-bounds Write •

CVSS: 8.0EPSS: 0%CPEs: 12EXPL: 0

A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. Se ha encontrado un error en el subsistema de archivos NFS41+ del kernel de Linux. • http://www.securityfocus.com/bid/106253 https://access.redhat.com/errata/RHSA-2019:1873 https://access.redhat.com/errata/RHSA-2019:1891 https://access.redhat.com/errata/RHSA-2019:2696 https://access.redhat.com/errata/RHSA-2019:2730 https://access.redhat.com/errata/RHSA-2019:3309 https://access.redhat.com/errata/RHSA-2019:3517 https://access.redhat.com/errata/RHSA-2020:0204 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16884 https://lists.debian.org/debian-lts • CWE-416: Use After Free •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

pvrdma_realize in hw/rdma/vmw/pvrdma_main.c in QEMU has a Memory leak after an initialisation error. pvrdma_realize en hw/rdma/vmw/pvrdma_main.c en QEMU tiene una fuga de memoria tras un error de inicialización. • http://www.openwall.com/lists/oss-security/2018/12/13/4 http://www.securityfocus.com/bid/106219 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7 https://lists.gnu.org/archive/html/qemu-devel/2018-12/msg02817.html https://usn.ubuntu.com/3923-1 • CWE-772: Missing Release of Resource after Effective Lifetime •