[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:17344
The host is installed with VideoLAN VLC Media Player before 2.0.7 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted playlist file, Successful exploitation allows attackers to cause a denial of service (memory consumption).

oval:org.secpod.oval:def:25651
The host is installed with VideoLAN VLC Media Player 2.1.5 or earlier and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unknown impact.

oval:org.secpod.oval:def:33993
The host is installed with VideoLAN vlc media player before 2.2.0 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted wav file, related to "seek across EOF". Successful exploitation could allow remote attackers to cause a denial of s ...

oval:org.secpod.oval:def:25652
The host is installed with VideoLAN VLC Media Player 2.1.5 or earlier and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unknown impact.

oval:org.secpod.oval:def:25653
The host is installed with VideoLAN VLC Media Player 2.1.5 or earlier and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unknown impact.

oval:org.secpod.oval:def:25654
The host is installed with VideoLAN VLC Media Player 2.1.5 or earlier and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unknown impact.

oval:org.secpod.oval:def:25655
The host is installed with VideoLAN VLC Media Player 2.1.5 or earlier and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unknown impact.

oval:org.secpod.oval:def:25656
The host is installed with VideoLAN VLC Media Player 2.1.5 or earlier and is prone to an invalid memory access vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unknown impact.

oval:org.secpod.oval:def:34971
The host is installed with VideoLAN vlc media player before 2.2.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted QuickTime IMA file. Successful exploitation could allow remote attackers to cause a denial of service (crash) or po ...

oval:org.secpod.oval:def:55468
The host is installed with VideoLAN VLC media player before 3.0.7 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an invalid AVI file. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:20724
The host is installed with VideoLAN VLC Media Player before 2.1.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle an IDAT chunk with a length of zero. Successful exploitation allows attackers to cause a denial of service.

oval:org.secpod.oval:def:40645
The host is installed with VideoLAN vlc media player before 2.2.5 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted subtitle file. Successful exploitation could allow remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:40646
The host is installed with VideoLAN vlc media player before 2.2.5 and is prone to a heap out-of-bound read vulnerability. A flaw is present in the application, which fails to handle a crafted subtitle file. Successful exploitation could allow remote attackers to read data beyond allocated memory and ...

oval:org.secpod.oval:def:14950
The host is installed with VideoLAN VLC media player before 2.0.4 and is prone to denial of service vulnerability. The flaw is present in the SHAddToRecentDocs function, which fails to handle a crafted file name that triggers an incorrect string-length calculation when the file is added to VLC. Succ ...

oval:org.secpod.oval:def:16011
The host is installed with VideoLAN VLC media player 2.0.8 or earlier and is prone to an unspecified vulnerability. The flaw is present in the application, which fails to handle a long string in a URL in a m3u file. Successful exploitation allows remote attackers to cause a denial of service (crash) ...

oval:org.secpod.oval:def:14949
The host is installed with VideoLAN VLC media player before 2.0.4 and is prone to multiple buffer overflows vulnerability. The flaw is present in the application, which fails to handle vectors related to the (1) freetype renderer and (2) HTML subtitle parser. Successful exploitation could allow remo ...

oval:org.secpod.oval:def:39562
The host is installed with VideoLAN VLC Media Player before 2.1.5 and is prone to heap overflow vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation allows attackers to execute arbitrary code or crash the service.

oval:org.secpod.oval:def:26776
The host is installed with VideoLAN VLC Media Player before 2.2.0 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle crafted path info. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

oval:org.secpod.oval:def:16871
The host is installed with vlc media player before 2.1.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle via a space character at the beginning of an RTSP message. Successful exploitation could allow attackers to execute arbitr ...

oval:org.secpod.oval:def:40667
The host is installed with VideoLAN VLC media player 2.2.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted FLAC file. Successful exploitation could allow remote attackers to cause a denial of service (heap corruption and applic ...

oval:org.secpod.oval:def:40668
The host is installed with VideoLAN VLC media player 2.2.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation could allow remote attackers denial of service (invalid read and application crash) or pos ...

oval:org.secpod.oval:def:16870
The host is installed with vlc media player before 2.1.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a (1) space or (2) tab character. Successful exploitation could allow attackers to execute arbitrary code or crash the ser ...

oval:org.secpod.oval:def:7978
The host is installed with VideoLAN VLC media player 2.0.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted PNG file. Successful exploitation allows remote attackers to cause an application crash.

oval:org.secpod.oval:def:57421
The host is installed with VideoLAN VLC media player through 3.0.7.1 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in modules/demux/mp4/mp4.c file. Successful exploitation could allow remote attackers to cause a deni ...

oval:org.secpod.oval:def:26245
The host is installed with VideoLAN VLC Media Player 2.2.1 or earlier and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted 3GP file. Successful exploitation allows attackers to crash the service or execute arbitrary code.

oval:org.secpod.oval:def:15830
VLC media player (64 bit) is installed

oval:org.secpod.oval:def:30727
The host is installed with VLC Media Player 2.1.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted .png file, as demonstrated by a png in a .wave file. Successful exploitation allows remote attacker to cause a denial of service (c ...

oval:org.secpod.oval:def:20756
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors involving the NPUSHB and NPUSHW instructions in a TrueType font. Successful exploitation allows remote attackers to c ...

oval:org.secpod.oval:def:20754
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted glyph or bitmap data in a BDF font. Successful exploitation allows remote attackers to cause a denial of service (inv ...

oval:org.secpod.oval:def:20759
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors involving the MIRP instruction in a TrueType font. Successful exploitation allows remote attackers to cause a denial ...

oval:org.secpod.oval:def:20749
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted TrueType font. Successful exploitation allows remote attackers to cause a denial of service (NULL pointer dereferen ...

oval:org.secpod.oval:def:20750
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted SFNT string in a Type 42 font. Successful exploitation allows remote attackers to cause a denial of service (invali ...

oval:org.secpod.oval:def:20757
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted glyph or bitmap data in a BDF font that lacks an ENCODING field. Successful exploitation allows remote attackers to c ...

oval:org.secpod.oval:def:20758
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted header in a BDF font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap wr ...

oval:org.secpod.oval:def:20755
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted private-dictionary data in a Type 1 font. Successful exploitation allows remote attackers to cause a denial of servic ...

oval:org.secpod.oval:def:20753
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted dictionary data in a Type 1 font. Successful exploitation allows remote attackers to cause a denial of service (inval ...

oval:org.secpod.oval:def:20751
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted property data in a PCF font. Successful exploitation allows remote attackers to cause a denial of service (invalid he ...

oval:org.secpod.oval:def:20752
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to the cell table of a font. Successful exploitation allows remote attackers to cause a denial of service (in ...

oval:org.secpod.oval:def:20760
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted glyph data in a BDF font. Successful exploitation allows remote attackers to cause a denial of service (invalid stack ...

oval:org.secpod.oval:def:20761
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted PostScript font object. Successful exploitation allows remote attackers to cause a denial of service (invalid stack ...

oval:org.secpod.oval:def:20747
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted property data in a BDF font. Successful exploitation allows attackers to cause a denial of service.

oval:org.secpod.oval:def:20748
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted glyph or bitmap data in a BDF font. Successful exploitation allows remote attackers to cause a denial of service (inv ...

oval:org.secpod.oval:def:20764
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted font. Successful exploitation allows remote attackers to cause a denial of service (divide-by-zero error).

oval:org.secpod.oval:def:20765
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted TrueType font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap write op ...

oval:org.secpod.oval:def:20762
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted ASCII string in a BDF font. Successful exploitation allows remote attackers to cause a denial of service (invalid s ...

oval:org.secpod.oval:def:20763
The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted glyph-outline data in a font. Successful exploitation allows remote attackers to cause a denial of service (invalid s ...

oval:org.secpod.oval:def:16939
The host is installed with VideoLAN VLC Media Player before 2.1.3 and is prone to divide-by-zero error vulnerability. A flaw is present in the application, which fails to handle a zero minimum and maximum data packet size in an ASF file. Successful exploitation allows attackers to cause a denial of ...

oval:org.secpod.oval:def:16010
The host is installed with VideoLAN VLC media player before 2.0.8 and is prone to buffer overflow vulnerability. The flaw is present in the mp4a packetizer (modules/packetizer/mpeg4audio.c), which fails to perform adequate boundary checks on user-supplied input. Successful exploitation allows remote ...

oval:org.secpod.oval:def:14948
The host is installed with VideoLAN VLC media player before 2.0.5 and is prone to buffer overflow vulnerability. The flaw is present in the ASF Demuxer (modules/demux/asf/asf.c), which fails to handle a crafted ASF movie that triggers an out-of-bounds read. Successful exploitation could allow remote ...

oval:org.secpod.oval:def:20725
The host is installed with VideoLAN VLC Media Player before 2.0.7 and is prone to memory exhaustion vulnerability. A flaw is present in the application, which fails to handle crafted playlist files. Successful exploitation allows attackers to cause a denial of service.

oval:org.secpod.oval:def:6387
The host is installed with VideoLAN VLC media player before 2.0.2 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted OGG file. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:43235
The host is installed with VideoLAN VLC media player through 2.2.8 and is prone to a type conversion vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation could allow remote attackers to change the type of a box between a read operation an ...

oval:org.secpod.oval:def:45743
The host is installed with VideoLAN VLC media player 3.0.1 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to handle a crafted .swf file. Successful exploitation could allow remote attackers to cause a denial-of-service.

oval:org.secpod.oval:def:50018
The host is installed with VideoLAN VLC media player 3.0.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the magic cookies in CAF files. Successful exploitation could allow attackers to perform a denial of service or a potenti ...

oval:org.secpod.oval:def:5220
The host is installed with VideoLAN VLC media player 2.0.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted MP4 file. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:55536
The host is installed with VideoLAN VLC media player through 3.0.7 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle an issue in modules/demux/mkv/util.cpp file. Successful exploitation could allow attackers to execute arbitrary code.

oval:org.secpod.oval:def:58168
The host is installed with VideoLAN VLC media player before 3.0.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to trigger either a crash of VLC or an arbit ...

oval:org.secpod.oval:def:58169
The host is installed with VideoLAN VLC media player before 3.0.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to trigger either a crash of VLC or an arbit ...

oval:org.secpod.oval:def:58170
The host is installed with VideoLAN VLC media player before 3.0.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to trigger either a crash of VLC or an arbit ...

oval:org.secpod.oval:def:58171
The host is installed with VideoLAN VLC media player before 3.0.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to trigger either a crash of VLC or an arbit ...

oval:org.secpod.oval:def:58172
The host is installed with VideoLAN VLC media player before 3.0.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to trigger either a crash of VLC or an arbit ...

oval:org.secpod.oval:def:58173
The host is installed with VideoLAN VLC media player before 3.0.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to trigger either a crash of VLC or an arbit ...

oval:org.secpod.oval:def:58174
The host is installed with VideoLAN VLC media player before 3.0.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to trigger either a crash of VLC or an arbit ...

oval:org.secpod.oval:def:58175
The host is installed with VideoLAN VLC media player before 3.0.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to trigger either a crash of VLC or an arbit ...

oval:org.secpod.oval:def:58176
The host is installed with VideoLAN VLC media player before 3.0.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to trigger either a crash of VLC or an arbit ...

oval:org.secpod.oval:def:58177
The host is installed with VideoLAN VLC media player before 3.0.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to trigger either a crash of VLC or an arbit ...

oval:org.secpod.oval:def:74289
The host is installed with VideoLAN VLC media player 3.0.11 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in the __Parse_indx component. Successful exploitation allows attackers to cause an out-of-bounds read via a craf ...

oval:org.secpod.oval:def:74290
The host is installed with VideoLAN VLC media player 3.0.11 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in the AVI_ExtractSubtitle component. Successful exploitation allows attackers to cause an out-of-bounds read via ...

oval:org.secpod.oval:def:74291
The host is installed with VideoLAN VLC media player 3.0.11 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in the vlc_input_attachment_New component. Successful exploitation allows attackers to cause an out-of-bounds rea ...

oval:org.secpod.oval:def:74292
The host is installed with VideoLAN VLC media player 3.0.11 and is prone to a NULL-pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle an issue in the Open component in avi.c. Successful exploitation allows attackers to cause a denial of service (D ...

oval:org.secpod.oval:def:4207
The host is installed with Google Chrome before 17.0.963.56 or vlc media player before 2.0.1 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors that trigger an integer truncation. Successful exploitation could allow attacker ...

oval:org.secpod.oval:def:46746
The host is installed with VideoLAN VLC media player through 2.2.8 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle crafted MKV files. Successful exploitation could allow attackers to execute arbitrary code in the context of the log ...

oval:org.secpod.oval:def:71628
The host is installed with VideoLAN VLC media player 3.0.0 before 3.0.9 and is prone to an arbitrary code execution vulnerability. A flaw is present in the libmicrodns, which fails to properly handle compressed labels in mDNS messages. Successful exploitation allows attacker to execute arbitrary cod ...

oval:org.secpod.oval:def:71627
The host is installed with VideoLAN VLC media player 3.0.0 before 3.0.9 and is prone to a denial of service vulnerability. A flaw is present in the libmicrodns, which fails to properly handle compressed labels in mDNS messages. Successful exploitation can cause denial of service.

oval:org.secpod.oval:def:71629
The host is installed with VideoLAN VLC media player 3.0.0 before 3.0.9 and is prone to a denial of service vulnerability. A flaw is present in the libmicrodns, which fails to properly handle the RDATA section in a TXT record in mDNS messages. Successful exploitation cause a denial of service.

oval:org.secpod.oval:def:71631
The host is installed with VideoLAN VLC media player 3.0.0 before 3.0.9 and is prone to a denial of service vulnerability. A flaw is present in the libmicrodns, which fails to properly handle the parsing of mDNS messages. Successful exploitation cause a denial of service.

oval:org.secpod.oval:def:71630
The host is installed with VideoLAN VLC media player 3.0.0 before 3.0.9 and is prone to a denial of service vulnerability. A flaw is present in the libmicrodns, which fails to properly handle the parsing of mDNS messages. Successful exploitation cause an out-of-bounds read that would result in a den ...

oval:org.secpod.oval:def:71632
The host is installed with VideoLAN VLC media player 3.0.0 before 3.0.9 and is prone to a denial of service vulnerability. A flaw is present in the libmicrodns, when encountering errors while parsing mDNS messages, some allocated data is not freed. Successful exploitation cause a denial of service.

oval:org.secpod.oval:def:20723
The host is installed with VideoLAN VLC Media Player before 2.1.5 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long session id in a ServerHello message. Successful exploitation allows attackers to cause a denial of service.

*CPE
cpe:/a:videolan:vlc_media_player:::x64

© SecPod Technologies