X.Org Input Device Format String Vulnerability

Attackers can use readily available command-line tools to exploit this issue.


 

Privacy Statement
Copyright 2010, SecurityFocus