Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
x x11 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2017-12176
xorg-x11-server prior to 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
Debian Debian Linux 8.0
Debian Debian Linux 9.0
X.org Xorg-server
7.5
CVSSv2
CVE-2017-12178
xorg-x11-server prior to 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
Debian Debian Linux 9.0
Debian Debian Linux 8.0
X.org Xorg-server
7.5
CVSSv2
CVE-2017-12179
xorg-x11-server prior to 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
Debian Debian Linux 9.0
Debian Debian Linux 8.0
X.org Xorg-server
7.5
CVSSv2
CVE-2017-12180
xorg-x11-server prior to 1.19.5 was missing length validation in XFree86 VidModeExtension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
Debian Debian Linux 8.0
Debian Debian Linux 9.0
X.org Xorg-server
7.5
CVSSv2
CVE-2017-12181
xorg-x11-server prior to 1.19.5 was missing length validation in XFree86 DGA extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
Debian Debian Linux 8.0
Debian Debian Linux 9.0
X.org Xorg-server
7.5
CVSSv2
CVE-2017-12183
xorg-x11-server prior to 1.19.5 was missing length validation in XFIXES extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
Debian Debian Linux 9.0
Debian Debian Linux 8.0
X.org Xorg-server
7.5
CVSSv2
CVE-2017-12184
xorg-x11-server prior to 1.19.5 was missing length validation in XINERAMA extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
Debian Debian Linux 8.0
Debian Debian Linux 9.0
X.org Xorg-server
7.5
CVSSv2
CVE-2017-12186
xorg-x11-server prior to 1.19.5 was missing length validation in X-Resource extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
Debian Debian Linux 8.0
Debian Debian Linux 9.0
X.org Xorg-server
7.5
CVSSv2
CVE-2013-7439
Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 prior to 1.6.0 allow remote malicious users to have unspecified impact via a crafted request, which triggers a buffer overflow.
X.org Libx11 1.4.99.902
X.org Libx11 1.4.99.901
X.org Libx11 1.3.99.901
X.org Libx11 1.3.6
X.org Libx11 1.2.2
X.org Libx11 1.2.1
X.org Libx11 1.1.99.1
X.org Libx11 1.1
X.org Libx11 1.4.4
X.org Libx11 1.4.3
X.org Libx11 1.3.5
X.org Libx11 1.3.4
X.org Libx11 1.2
X.org Libx11 1.1.6
X.org Libx11 1.0.1
X.org Libx11 1.5.99.902
X.org Libx11 1.4.2
X.org Libx11 1.4.1
X.org Libx11 1.3.3
X.org Libx11 1.3.2
X.org Libx11 1.1.5
X.org Libx11 1.1.4
7.5
CVSSv2
CVE-2007-4752
ssh in OpenSSH prior to 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows malicious users to violate intended policy and gain privileges by causing an X client to be treated as trusted.
Openbsd Openssh 4.3p2
Openbsd Openssh 4.3p1
Openbsd Openssh 4.0
Openbsd Openssh 4.3
Openbsd Openssh 4.2p1
Openbsd Openssh 4.4p1
Openbsd Openssh 4.4
Openbsd Openssh 4.1
Openbsd Openssh 4.0p1
Openbsd Openssh
Openbsd Openssh 4.5
Openbsd Openssh 4.2
Openbsd Openssh 4.1p1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »