Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
x.org xorg-server vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2017-12182
xorg-x11-server prior to 1.19.5 was missing length validation in XFree86 DRI extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
Debian Debian Linux 8.0
Debian Debian Linux 9.0
X.org Xorg-server
668
VMScore
CVE-2017-12187
xorg-x11-server prior to 1.19.5 was missing length validation in RENDER extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
Debian Debian Linux 8.0
Debian Debian Linux 9.0
X.org Xorg-server
668
VMScore
CVE-2017-12183
xorg-x11-server prior to 1.19.5 was missing length validation in XFIXES extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
Debian Debian Linux 9.0
Debian Debian Linux 8.0
X.org Xorg-server
668
VMScore
CVE-2017-12185
xorg-x11-server prior to 1.19.5 was missing length validation in MIT-SCREEN-SAVER extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
Debian Debian Linux 8.0
Debian Debian Linux 9.0
X.org Xorg-server
668
VMScore
CVE-2017-12180
xorg-x11-server prior to 1.19.5 was missing length validation in XFree86 VidModeExtension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
Debian Debian Linux 8.0
Debian Debian Linux 9.0
X.org Xorg-server
409
VMScore
CVE-2017-13723
In X.Org Server (aka xserver and xorg-server) prior to 1.19.4, a local attacker authenticated to the X server could overflow a global buffer, causing crashes of the X server or potentially other problems by injecting large or malformed XKB related atoms and accessing them via xkb...
X.org Xorg-server
Debian Debian Linux 8.0
Debian Debian Linux 9.0
169
VMScore
CVE-2017-13721
In X.Org Server (aka xserver and xorg-server) prior to 1.19.4, an attacker authenticated to an X server with the X shared memory extension enabled can cause aborts of the X server or replace shared memory segments of other X clients in the same session.
X.org Xorg-server
Debian Debian Linux 8.0
Debian Debian Linux 9.0
578
VMScore
CVE-2017-10971
In the X.Org X server prior to 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events.
X.org Xorg-server
356
VMScore
CVE-2017-10972
Uninitialized data in endianness conversion in the XEvent handling of the X.Org X Server prior to 2017-06-19 allowed authenticated malicious users to access potentially privileged data from the X server.
X.org Xorg-server
320
VMScore
CVE-2015-3164
The authentication setup in XWayland 1.16.x and 1.17.x prior to 1.17.2 starts the server in non-authenticating mode, which allows local users to read from or send information to arbitrary X11 clients via vectors involving a UNIX socket.
Opensuse Opensuse 13.2
X.org Xorg-server 1.16.3
X.org Xorg-server 1.16.4
X.org Xorg-server 1.16.0
X.org Xorg-server 1.16.1
X.org Xorg-server 1.17.0
X.org Xorg-server 1.17.1
X.org Xorg-server 1.16.99.901
X.org Xorg-server 1.16.99.902
X.org Xorg-server 1.16.2
X.org Xorg-server 1.16.1.901
X.org Xorg-server 1.16.2.901
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »