[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26443 Download | Alert*

The host is installed with VideoLAN VLC Media Player before 0.8.6f and is prone to a stack-based buffer overflow vulnerability. The flaw is present in the application, which does not properly handle a long subtitle in an SSA file. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with vlc media player before 0.9.0 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a large fmt chunk in a WAV file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with vlc media player 0.9.x before 0.9.6 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an invalid RealText (rt) subtitle file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with vlc media player 0.9.0 through 0.9.7 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a malformed RealMedia. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Pidgin before 2.5.6 and is prone to buffer overflow vulnerability. The flaw is present in the XMPP SOCKS5 bytestream server in Pidgin, which fails to handle vectors involving an outbound XMPP file transfer. Successful exploitation could allow remote authenticated users to execute arbitrary code.

The host is installed with VLC Media Player 0.9.9 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long smb URI in a playlist file. Successful exploitation allows remote attacker to cause a denial of service (application crash) and possibly execute arbitrary code.

The host is installed with Oracle Java SE 6 Update 18 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle Java SE 6 Update 18 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to affect confidentiality.

The host is installed with Oracle Java SE 6 Update 18 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle Java SE 6 Update 18 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to affect confidentiality, integrity and availability.


Pages:      Start    1568    1569    1570    1571    1572    1573    1574    1575    1576    1577    1578    1579    1580    1581    ..   2644

© SecPod Technologies