Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
x.org libxfont vulnerabilities and exploits
(subscribe to this query)
3.6
CVSSv2
CVE-2017-13720
In the PatternMatch function in fontfile/fontdir.c in libXfont up to and including 1.5.2 and 2.x prior to 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of servi...
X.org Libxfont 2.0.0
X.org Libxfont 2.0.1
X.org Libxfont
3.6
CVSSv2
CVE-2017-13722
In the pcfGetProperties function in bitmap/pcfread.c in libXfont up to and including 1.5.2 and 2.x prior to 2.0.2, a missing boundary check (for PCF files) could be used by local attackers authenticated to an Xserver for a buffer over-read, for information disclosure or a crash o...
X.org Libxfont 2.0.0
X.org Libxfont 2.0.1
X.org Libxfont
7.5
CVSSv2
CVE-2008-0006
Buffer overflow in (1) X.Org Xserver prior to 1.4.1, and (2) the libfont and libXfont libraries on some platforms including Sun Solaris, allows context-dependent malicious users to execute arbitrary code via a PCF font with a large difference between the last col and first col va...
Sun Solaris Libfont
Sun Solaris Libxfont
X.org Xserver
9.3
CVSSv2
CVE-2011-2895
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont prior to 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD prior to 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x prior to 5.0.3 and 5.1.x prior to 5.1.1, FreeTyp...
Openbsd Openbsd 3.5
Openbsd Openbsd 3.4
Openbsd Openbsd 3.3
Openbsd Openbsd 2.6
Openbsd Openbsd 2.0
Freebsd Freebsd
Netbsd Netbsd
Openbsd Openbsd 3.0
Openbsd Openbsd 2.9
Openbsd Openbsd 2.3
Openbsd Openbsd 2.4
X Libxfont 1.2.0
X Libxfont 1.2.1
X Libxfont 1.2.9
X Libxfont 1.3.0
X Libxfont 1.4.2
Openbsd Openbsd 3.6
Openbsd Openbsd 2.8
Openbsd Openbsd 2.7
Openbsd Openbsd 2.5
Openbsd Openbsd
X Libxfont 1.2.2
5
CVSSv2
CVE-2007-6428
The ProcGetReservedColormapEntries function in the TOG-CUP extension in X.Org Xserver prior to 1.4.1 allows context-dependent malicious users to read the contents of arbitrary memory locations via a request containing a 32-bit value that is improperly used as an array index.
X.org Xserver
X.org Tog-cup
9.3
CVSSv2
CVE-2007-6429
Multiple integer overflows in X.Org Xserver prior to 1.4.1 allow context-dependent malicious users to execute arbitrary code via (1) a GetVisualInfo request containing a 32-bit value that is improperly used to calculate an amount of memory for allocation by the EVI extension, or ...
X.org Xserver
X.org Evi
X.org Mit-shm
7.5
CVSSv2
CVE-2007-5199
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote malicious users to have unspecified impact.
X Libxfont 1.3.1
7.2
CVSSv2
CVE-2006-3739
Integer overflow in the CIDAFM function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code via crafted Adobe Font Metrics (AFM) files with a modified number of character metrics (StartCharMetrics), which leads to a heap-based buffer overflow.
X.org X.org 6.8.2
Xfree86 Project Xfree86 X
7.2
CVSSv2
CVE-2006-3740
Integer overflow in the scan_cidfont function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code via crafted (1) CMap and (2) CIDFont font data with modified item counts in the (a) begincodespacerange, (b) cidrange, and (c) notdefrange sections.
X.org X.org 6.8.2
Xfree86 Project Xfree86 X
9
CVSSv2
CVE-2007-1003
Integer overflow in ALLOCATE_LOCAL in the ProcXCMiscGetXIDList function in the XC-MISC extension in the X.Org X11 server (xserver) 7.1-1.1.0, and other versions prior to 20070403, allows remote authenticated users to execute arbitrary code via a large expression, which results in...
X.org X11 7.1 1.1.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »