Vulnerabilities > Redhat > Spice XPI
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2011-04-18 | CVE-2011-1179 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Redhat Spice-Xpi 2.2/2.3/2.4 The SPICE Firefox plug-in (spice-xpi) 2.4, 2.3, 2.2, and possibly other versions allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to (1) plugin/nsScriptablePeer.cpp and (2) plugin/plugin.cpp, which trigger multiple uses of an uninitialized pointer. | 5.1 |
2011-04-18 | CVE-2011-0012 | Link Following vulnerability in Redhat Spice-Xpi 2.2/2.3/2.4 The SPICE Firefox plug-in (spice-xpi) 2.4, 2.3, 2.2, and possibly other versions allows local users to overwrite arbitrary files via a symlink attack on the usbrdrctl log file, which has a predictable name. | 3.3 |
2010-08-30 | CVE-2010-2794 | Link Following vulnerability in Redhat Spice-Xpi 2.2 The SPICE (aka spice-xpi) plug-in 2.2 for Firefox allows local users to overwrite arbitrary files via a symlink attack on an unspecified log file. | 3.3 |
2010-08-30 | CVE-2010-2792 | Race Condition vulnerability in Redhat Spice-Xpi 2.2 Race condition in the SPICE (aka spice-xpi) plug-in 2.2 for Firefox allows local users to obtain sensitive information, and conduct man-in-the-middle attacks, by providing a UNIX socket for communication between this plug-in and the client (aka qspice-client) in qspice 0.3.0, and then accessing this socket. | 3.3 |