[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252588

 
 

909

 
 

196930

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26875 Download | Alert*

The host is installed with Opera before 11.01 and is prone to denial of service vulnerability. A flaw is present in the Opera application, which fails to properly handle large form inputs. Successful exploitation could let remote attackers to execute arbitrary code and cause Opera due to memory corruption.

The host is installed with VLC media player and is prone to multiple heap-based buffer overflow vulnerabilities. The flaws are present in cdg.c in the CDG decoder in VideoLAN VLC Media Player before 1.1.6, which are caused by array indexing errors in the "DecodeTileBlock()" and "DecodeScroll()" [modules/codec/cdg.c] functions within the CDG decoder module when processing malformed data. Successful ...

The host is installed with VideoLAN VLC Media Player 1.1 before 1.1.6 and is prone to Heap based memory corruption vulnerability. A flaw is present in the "StripTags()" function within the USF and Text subtitles decoders ["modules/codec/subtitles/subsdec.c" and "modules/codec/subtitles/subsusf.c"], which fails to restrict malformed data processing. Successful exploitation could let remote attacker ...

The host is installed with PostgreSQL 9.0.x before 9.0.3, 8.4.x before 8.4.7, 8.3.x before 8.3.14 or 8.2.x before 8.2.20 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle integers with a large number of digits to unspecified functions. Successful exploitation allows remote authenticated users to cause a denial of service (crash) a ...

The host is installed with VideoLAN VLC Media Player before 1.1.7 and is prone to Denial of service vulnerability. A flaw is present in the MKV demuxer plugin in VideoLAN VLC media player, which fails to validate input within the "MKV_IS_ID" macro in modules/demux/mkv/mkv.hpp of the MKV demuxer. Successful exploitation could let remote attackers to execute arbitrary code on the system using a craf ...

The host is installed with VideoLAN VLC media player 0.5.0 before 1.0.6 and is prone to an invalid memory access and application crash vulnerability. A flaw is present in the application, which fails to handle a crafted byte stream to the (1) AVI, (2) ASF, or (3) Matroska (aka MKV) demuxer. Successful exploitation could allow attackers to crash the service or execute arbitrary code or crash the se ...

The host is installed with VideoLAN VLC media player 0.5.0 before 1.0.6 and is prone to multiple heap-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a crafted byte stream to the (1) A/52, (2) DTS, or (3) MPEG Audio decoder. Successful exploitation could allow attackers to crash the service or execute arbitrary code or crash the service.

The host is installed with Apache Tomcat and is prone to denial of service vulnerability. A flaw is present in the application which is caused by an error in the NIO connector when processing a request line. Successful exploitation allow remote attackers to cause an OutOfMemory error and crash the server.

The host is installed with Apache Tomcat and is prone to security bypass vulnerability. A flaw is present in web.xml in the application which is caused by an error related to ignoring ServletSecurity annotations. Successful exploitation allow attackers to bypass security restrictions and launch further attacks on the system.

The host is installed with Apache Tomcat and is prone to security bypass vulnerability. A flaw is present in the browser, which fails to implement security constraints when login configuration is not present in the web.xml and the web application is marked as meta-data complete. Successful exploitation could allow remote attackers to bypass security restrictions to obtain sensitive data.


Pages:      Start    1666    1667    1668    1669    1670    1671    1672    1673    1674    1675    1676    1677    1678    1679    ..   2687

© SecPod Technologies