Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
x x.org x11 4.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-8093
Multiple integer overflows in the GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) prior to 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code vi...
X.org X11 6.7
X.org Xorg-server
X.org Xfree86 4.0
NA
CVE-2014-8099
The XVideo extension in XFree86 4.0.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) prior to 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via ...
X.org X11 6.7
X.org Xorg-server
X.org Xfree86 4.0
NA
CVE-2012-0064
xkeyboard-config prior to 2.5 in X.Org prior to 7.6 enables certain XKB debugging functions by default, which allows physically proximate malicious users to bypass an X screen lock via keyboard combinations that break the input grab.
X X.org X11 7.1
Xkeyboard Config Project Xkeyboard-config 2.0
X X.org X11 1.0
Xkeyboard Config Project Xkeyboard-config 2.2
X X.org X11 4.0
Xkeyboard Config Project Xkeyboard-config 2.1
X X.org X11 7.2
X X.org X11 7.3
X X.org X11 6.4
X X.org X11 6.6
X X.org X11 7.5
X X.org X11 5.0
X X.org X11 6.3
X X.org X11 7.0
Xkeyboard Config Project Xkeyboard-config 2.3
X X.org X11 6.0
X X.org X11 6.5.1
X X.org X11 6.7
X X.org X11 6.8.2
X X.org X11 7.4
X X.org X11 6.1
X X.org X11 6.8
NA
CVE-2007-3103
The init.d script for the X.Org X11 xfs font server on various Linux distributions might allow local users to change the permissions of arbitrary files via a symlink attack on the /tmp/.font-unix temporary file.
Fedoraproject Fedora Core 6.0
Redhat Linux
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux 4.0
1 EDB exploit
NA
CVE-2007-1351
Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont prior to 20070403 and (2) freetype 2.3.2 and previous versions allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.
Ubuntu Ubuntu Linux 6.10
Ubuntu Ubuntu Linux 5.10
Ubuntu Ubuntu Linux 6.06 Lts
Xfree86 Project X11r6 4.3.0.2
Xfree86 Project X11r6 4.3.0
X.org Libxfont 1.2.2
Xfree86 Project X11r6 4.3.0.1
Rpath Rpath Linux 1
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux Desktop 3.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 4.0
Openbsd Openbsd 3.9
Openbsd Openbsd 4.0
Mandrakesoft Mandrake Multi Network Firewall 2.0
NA
CVE-2007-1352
Integer overflow in the FontFileInitTable function in X.Org libXfont prior to 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
Mandrakesoft Mandrake Multi Network Firewall 2.0
X.org Libxfont 1.2.2
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 3.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux 3.0
Redhat Fedora Core Core 1.0
Redhat Linux 9.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Desktop 4.0
Slackware Slackware Linux 9.0
Slackware Slackware Linux 9.1
Slackware Slackware Linux Current
Turbolinux Turbolinux Desktop 10.0
Ubuntu Ubuntu Linux 6.10
Ubuntu Ubuntu Linux 4.1
Ubuntu Ubuntu Linux 5.10
Ubuntu Ubuntu Linux 6.06 Lts
Rpath Linux 1
Openbsd Openbsd 3.9
Openbsd Openbsd 4.0
NA
CVE-2005-0605
scan.c for LibXPM may allow malicious users to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow.
Xfree86 Project X11r6 3.3.4
Xfree86 Project X11r6 4.1.0
Xfree86 Project X11r6 3.3.6
X.org X11r6 6.8.1
Xfree86 Project X11r6 4.0.2.11
Sgi Propack 3.0
Xfree86 Project X11r6 4.3.0.2
Xfree86 Project X11r6 4.0.3
Lesstif Lesstif 0.93.94
X.org X11r6 6.7.0
Xfree86 Project X11r6 4.3.0
Xfree86 Project X11r6 3.3
Xfree86 Project X11r6 4.2.1
X.org X11r6 6.8
Xfree86 Project X11r6 4.0
Xfree86 Project X11r6 3.3.2
Xfree86 Project X11r6 3.3.5
Xfree86 Project X11r6 4.0.1
Xfree86 Project X11r6 4.2.0
Xfree86 Project X11r6 4.1.12
Xfree86 Project X11r6 4.3.0.1
Xfree86 Project X11r6 3.3.3
NA
CVE-2004-0688
Multiple integer overflows in (1) the xpmParseColors function in parse.c, (2) XpmCreateImageFromXpmImage, (3) CreateXImage, (4) ParsePixels, and (5) ParseAndPutPixels for libXpm prior to 6.8.1 may allow remote malicious users to execute arbitrary code via a malformed XPM image fi...
Xfree86 Project X11r6 4.1.0
Xfree86 Project X11r6 3.3.6
Xfree86 Project X11r6 4.0.2.11
Xfree86 Project X11r6 4.0.3
X.org X11r6 6.7.0
Xfree86 Project X11r6 4.3.0
Xfree86 Project X11r6 4.2.1
X.org X11r6 6.8
Xfree86 Project X11r6 4.0
Xfree86 Project X11r6 4.0.1
Xfree86 Project X11r6 4.2.0
Xfree86 Project X11r6 4.1.12
Xfree86 Project X11r6 4.1.11
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Suse Suse Linux 8
Suse Suse Linux 9.1
Openbsd Openbsd 3.5
Openbsd Openbsd 3.4
Suse Suse Linux 8.1
NA
CVE-2004-0687
Multiple stack-based buffer overflows in (1) xpmParseColors in parse.c, (2) ParseAndPutPixels in create.c, and (3) ParsePixels in parse.c for libXpm prior to 6.8.1 allow remote malicious users to execute arbitrary code via a malformed XPM image file.
Xfree86 Project X11r6 4.1.0
Xfree86 Project X11r6 3.3.6
Xfree86 Project X11r6 4.0.2.11
Xfree86 Project X11r6 4.0.3
X.org X11r6 6.7.0
Xfree86 Project X11r6 4.3.0
Xfree86 Project X11r6 4.2.1
X.org X11r6 6.8
Xfree86 Project X11r6 4.0
Xfree86 Project X11r6 4.0.1
Xfree86 Project X11r6 4.2.0
Xfree86 Project X11r6 4.1.12
Xfree86 Project X11r6 4.1.11
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Suse Suse Linux 8
Suse Suse Linux 9.1
Openbsd Openbsd 3.5
Openbsd Openbsd 3.4
Suse Suse Linux 8.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started