[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

The host is installed with VideoLAN VLC Media Player before 0.8.6h and is prone to a buffer overflow vulnerability. The flaw is present in the application, which does not properly handle a TLS message containing multiple Client Hello messages. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with VideoLAN VLC Media Player before 0.8.6h and is prone to a integer signedness error vulnerability. The flaw is present in the application, which does not properly handle a certain integer value in the random field. Successful exploitation allows remote attackers to cause a denial of service (buffer over-read and crash).

The host is installed with VideoLAN VLC Media Player before 0.8.6g and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to handle a malicious library under the modules/ or plugins/ subdirectories of the current working directory. Successful exploitation allows local users to execute arbitrary code.

Flaws discovered in versions prior to 2.2.4 and 2.3.10 of GnuTLS allow an attacker to cause denial of service , and maybe execute arbitrary code. The updated packages have been patched to fix these flaws. Note that any applications using this library must be restarted for the update to take effect.

The host is installed with VideoLAN VLC Media Player before 0.8.6h and is prone to a buffer overflow vulnerability. The flaw is present in the application, which does not properly handle a zero value for the length of Server Names, which leads to a buffer overflow. Successful exploitation allows remote attackers to cause a denial of service (crash).

Testing using the Codenomicon TLS test suite discovered a flaw in the handling of server name extension data in OpenSSL 0.9.8f and OpenSSL 0.9.8g. If OpenSSL has been compiled using the non-default TLS server name extensions, a remote attacker could send a carefully crafted packet to a server application using OpenSSL and cause a crash. Testing using the Codenomicon TLS test suite discovered a fl ...

The host is installed with OpenSSL 0.9.8f or 0.9.8g and is prone to double free vulnerability. A flaw is present in the application, which fails to properly handle a malformed Client Hello packet. Successful exploitation could allow remote attackers to cause a denial of service (crash).

Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel: Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel before 2.6.25.3 allows remote attackers to cause a denial of service via network traffic to a Simple Internet Transition tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count. The utimen ...

An off-by-one error was found in nasm 2.02 that allowed context-dependent attackers to cause a denial of service or possibly execute arbitrary code via a crafted file that triggers a stack-based buffer overflow . The updated packages have been patched to prevent this issue.

A denial of service vulnerability was discovered in the way the OpenLDAP slapd daemon processed certain network messages. An unauthenticated remote attacker could send a specially crafted request that would crash the slapd daemon . The updated packages have been patched to correct this issue.


Pages:      Start    9438    9439    9440    9441    9442    9443    9444    9445    9446    9447    9448    9449    9450    9451    ..   19630

© SecPod Technologies