[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256148

 
 

909

 
 

199106

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17572 Download | Alert*

The host is installed with VideoLAN vlc media player before 2.2.5 and is prone to a heap out-of-bound read vulnerability. A flaw is present in the application, which fails to handle a crafted subtitle file. Successful exploitation could allow remote attackers to read data beyond allocated memory and potentially crash the process.

The host is installed with VideoLAN VLC media player 2.2.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted FLAC file. Successful exploitation could allow remote attackers to cause a denial of service (heap corruption and application crash) or possibly have unspecified other impact.

The host is installed with VideoLAN VLC media player 2.2.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation could allow remote attackers denial of service (invalid read and application crash) or possibly have unspecified other impact.

The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted IPv4 address. Successful exploitation could allow remote attackers to crash the service.

The host is installed with Wireshark 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted IPv6 address. Successful exploitation could allow remote attackers to crash the service.

The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the service.

The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the Vendor Class Identifier. Successful exploitation could allow remote attackers to read past the end of a buffer.

The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly check for a negative length. Successful exploitation could allow remote attackers to crash the service.

The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the service.

The host is installed with Wireshark 2.2.x before 2.2.7 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted size value. Successful exploitation could allow remote attackers to read past the end of a buffer.


Pages:      Start    1660    1661    1662    1663    1664    1665    1666    1667    1668    1669    1670    1671    1672    1673    ..   1757

© SecPod Technologies