![]() ![]() This results in a potentially exploitableĬrash when triggered. Security researcher Luke Li reported a pointer underflowīug in the Brotli library's decompression that leads to aīuffer overflow. High CVE-2016-1624: Buffer overflow in Brotli. 109 firefox linux-firefox 45.0,1 seamonkey linux-seamonkey 2.42 firefox-esr 38.7.0,1 libxul thunderbird linux-thunderbird 38.7.0 CVE-2015-8833 libotr - integer overflow libotr 4.1.1 libotr3 0Ī remote attacker may crash or execute arbitrary code in Happens in the function create_smp_dialog. The bug is triggered when a user tries to authenticate a buddy and The pidgin-otr plugin version 4.0.2 fixes a heap use after pidgin-otr - use after free pidgin-otr 4.0.2 Without Tor after the request is accepted, which would reveal the user's Request, an attacker could cause Ricochet to make network requests CVE-2016-2342 ricochet - information disclosure ricochet 1.1.2īy sending a nickname with some HTML tags in a contact Particularly configured remote bgpd hosts. CVE-2016-3115 quagga - stack based buffer overflow vulnerability quagga 0309Ī malicious BGP peer may execute arbitrary code in This is the default.įor authorized_keys that specify a "command" restriction,Īlso set the "restrict" (available in OpenSSH >=7.2) or Which was not written with a hostile user in mind, as an Other xauth commands allow limited information leakage,įile overwrite, port probing and generally expose xauth(1), Injection of xauth commands grants the ability to readĪrbitrary files under the authenticated user's privilege, Missing sanitisation of untrusted input allows anĪuthenticated user who is able to request X11 forwarding openssh - command injection when X11Forwarding is enabled openssh-portable 7.2.p2,1
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |